A Framework for Privacy-preserving AI Models in Cloud Computing: Challenges and Solutions

Year : 2024 | Volume : 11 | Issue : 03 | Page : 1 12
    By

    Harshvardhan Chunawala,

  • Pratikkumar Chunawala,

  1. Cloud Infrastructure Architect, Amazon Web Services (AWS) – 10 Exchange Place, Jersey City, New Jersey, USA
  2. Principal Cloud Architect, Amazon Web Services (AWS) – 10 Exchange Place, Jersey City, New Jersey, USA

Abstract

The growing adoption of cloud computing for deploying artificial intelligence (AI) models has led to significant advancements in sectors such as healthcare, finance, and e-commerce. However, the integration of AI with cloud computing raises critical privacy concerns, particularly when handling sensitive data. This paper presents a comprehensive framework for implementing privacy-preserving AI models in cloud environments, addressing the unique challenges, and proposing effective solutions. The suggested framework employs advanced privacy-preserving methods, such as differential privacy, homomorphic encryption, and federated learning, to ensure that AI models function securely without jeopardizing data confidentiality. This study identifies key challenges associated with cloud-based AI models, such as data leakage, model inversion attacks, and the trade-off between privacy and model accuracy. The framework incorporates robust encryption methods to protect data during transmission and storage, while federated learning allows for decentralized training of AI models across multiple devices without sharing raw data. The paper also explores how to balance high model performance with strong privacy guarantees, emphasizing the need to optimize these techniques to meet industry standards. A series of experiments and simulations were conducted to evaluate the effectiveness of the proposed framework. The results show that the framework enhances data privacy while maintaining the accuracy and efficiency of AI models in cloud environments. The findings suggest that adopting such a framework can mitigate privacy risks, thereby fostering greater trust and adoption of AI-driven cloud services. This research contributes to the ongoing discourse on privacy in AI, offering practical insights and a solid foundation for future developments in privacy-preserving technologies within cloud computing.

Keywords: Privacy-preserving AI, cloud computing, differential privacy, homomorphic encryption, federated learning, data security, model accuracy, cloud-based AI models

[This article belongs to Journal of Operating Systems Development & Trends ]

How to cite this article:
Harshvardhan Chunawala, Pratikkumar Chunawala. A Framework for Privacy-preserving AI Models in Cloud Computing: Challenges and Solutions. Journal of Operating Systems Development & Trends. 2024; 11(03):1-12.
How to cite this URL:
Harshvardhan Chunawala, Pratikkumar Chunawala. A Framework for Privacy-preserving AI Models in Cloud Computing: Challenges and Solutions. Journal of Operating Systems Development & Trends. 2024; 11(03):1-12. Available from: https://journals.stmjournals.com/joosdt/article=2024/view=180714


References

  1. Ahmad W, Rasool A, Javed AR, Baker T, Jalil Z. Cyber security in IoT-based cloud computing: A comprehensive survey. Electronics. 2021;11:16. DOI: 10.3390/electronics11010016.
  2. Ali M, Khan SU, Vasilakos AV. Security in cloud computing: Opportunities and challenges. Inf Sci. 2015;305:357–83. DOI: 10.1016/j.ins.2015.01.025.
  3. Xiao Z, Xiao Y. Security and privacy in cloud computing. IEEE Commun Surv Tutor. 2012;15:843–59. DOI: 10.1109/SURV.2012.060912.00182.
  4. Singh S, Chana I. A survey on resource scheduling in cloud computing: Issues and challenges. J Grid Comput. 2016;14:217–64. DOI: 10.1007/s10723-015-9359-2.
  5. Zhang X, Guo L, Xue Y, Zhang Q. A two-way VoLTE covert channel with feedback adaptive to mobile network environment. IEEE Access. 2019;7:122214–23. DOI: 10.1109/ACCESS.2019.
  6. Yang P, Xiong N, Ren J. Data security and privacy protection for cloud storage: A survey. IEEE Access. 2020;8:131723–40. DOI: 10.1109/ACCESS.2020.3009876.
  7. Dhaygude AD, Varma RA, Yerpude P, Swarnkar SK, Jindal RK, Rabbi F. Deep learning approaches for feature extraction in big data analytics. 2023 10th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), Gautam Buddha Nagar, India. 2023. pp. 964–9. DOI: 10.1109/UPCON59197.2023.10434607.
  8. Fredrikson M, Jha S, Ristenpart T. Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015 Oct 12. p. 1322–33. DOI: 10.1145/2810103.2813677.
  9. Swarnkar SK, Dewangan L, Dewangan O, Prajapati TM, Rabbi F. AI-enabled crop health monitoring and nutrient management in smart agriculture. 2023 6th International Conference on Contemporary Computing and Informatics (IC3I), Gautam Buddha Nagar, India. 2023. pp. 2679–83. DOI: 10.1109/IC3I59117.2023.10398035.
  10. Shokri R, Stronati M, Song C, Shmatikov V. Membership inference attacks against machine learning models. 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA. 2017. pp. 3–18. DOI: 10.1109/SP.2017.41.
  11. Dwork C, Roth A. The algorithmic foundations of differential privacy. Found Trends Theor Comput Sci. 2013;9:211–407. DOI: 10.1561/0400000042.
  12. Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, et al. Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016 Oct 24. p. 308–18. DOI: 10.1145/2976749.2978318.
  13. Devarajan HR, Balasubramanian S, Swarnkar SK, Kumar P, Jallepalli VR. Deep learning for automated detection of lung cancer from medical imaging data. 2023 International Conference on Artificial Intelligence for Innovations in Healthcare Industries (ICAIIHI), Raipur, India. 2023. pp. 1–5. DOI: 10.1109/ICAIIHI57871.2023.10488962.
  14. Gaikwad S, Gupta T, Singh A, Jaiswal RC. Algo-powered banking: Enhancing investment decisions through machine learning. In: International Conference on Smart Computing and Communication. Springer Nature Singapore: Singapore. 2024. p. 127–36.
  15. Popa RA, Redfield CMS, Zeldovich N, Balakrishnan H. CryptDB: Protecting confidentiality with encrypted query processing. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. 2011 Oct 23. p. 85–100. DOI: 10.1145/2043556.2043566.
  16. Wang C, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for data storage security in cloud computing. 2010 Proceedings IEEE INFOCOM, San Diego, CA, USA. 2010. pp. 1–9. DOI: 10.1109/INFCOM.2010.5462173.
  17. Pathak M, Rane S, Sun W, Raj B. Privacy-preserving probabilistic inference with hidden Markov models. 011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic. 2011. pp. 5868–71. DOI: 10.1109/ICASSP.2011.5947696.
  18. Chhabra GS, Guru A, Rajput BJ, Dewangan L, Swarnkar SK. Multimodal neuroimaging for early Alzheimer’s detection: A deep learning approach. 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), Delhi, India. 2023. pp. 1-5. DOI: 10.1109/ICCCNT56998.2023.10307780.
  19. Shokri R, Shmatikov V. Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015 Oct 12. p. 1310–21. DOI: 10.1145/2810103.2813687.
  20. Gentry C. Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing. 2009 May 31. p. 169–78. DOI: 10.1145/153
    1536440.
  21. McMahan B, Moore E, Ramage D, Hampson S, Arcas BA. Communication-efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics. PMLR; 2017. p. 1273–82.
  22. Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, et al. Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017. p. 1175–91. DOI: 10.1145/3133956.3133982.
  23. Swarnkar SK, Ambhaikar A, Swarnkar VK, Sinha U. Optimized convolution neural network (OCNN) for voice-based sign language recognition: Optimization and regularization. In: Information and Communication Technology for Competitive Strategies (ICTCS 2020) ICT: Applications and Social Interfaces. Singapore: Springer; 2022. p. 633–9.
  24. Al-Rubaie M, Chang JM. Privacy-preserving machine learning: Threats and solutions. IEEE Security Privacy. 2019;17:49–58. DOI: 10.1109/MSEC.2018.2888775.
  25. Dwork C, McSherry F, Nissim K, Smith A. Calibrating noise to sensitivity in private data analysis. In: Theory of Cryptography. Proceedings: Third Theory of Cryptography Conference, TCC 2006, New York, USA, 4–7 March 2006. Berlin, Heidelberg: Springer; 2006. Vol. 3. p. 265–84.
  26. Swarnkar DM, Ambhaikar A. Improved convolutional neural network based sign language recognition. Int J Adv Sci Technol. 2019;27:302–17.
  27. Li N, Qardaji W, Su D. On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. 2012. p. 32–3. DOI: 10.1145/2414456.2414474.
  28. Xu J, Hua C, Zhang Y. A blockchain-based framework for the supervision of livelihood issues: Proof of concept with optimized consensus. IEEE Access. 2023;11:73414–34. DOI: 10.1109/ACCESS.2023.3295696.
  29. He Z, Zhang T, Lee RB. Model inversion attacks against collaborative inference. In: Proceedings of the 35th Annual Computer Security Applications Conference. 2019. p. 148–62. DOI: 10.1145/3359789.3359824.
  30. Jagarlamudi GK, Yazdinejad A, Parizi RM, Pouriyeh S. Exploring privacy measurement in federated learning. J Supercomput. 2024;80:10511–51. DOI: 10.1007/s11227-023-05846-4.
  31. Singh S, Rathore S, Alfarraj O, Tolba A, Yoon B. A framework for privacy-preservation of IoT healthcare data using Federated Learning and blockchain technology. Future Gener Comput Syst. 2022;129:380–8. DOI: 10.1016/j.future.2021.11.028.

Regular Issue Subscription Review Article
Volume 11
Issue 03
Received 18/10/2024
Accepted 22/10/2024
Published 04/11/2024


Login


My IP

PlumX Metrics