Privacy-Preserving AI/ML Application Architectures: Techniques, Trade-offs, and Case Studies

Authors

  • Lavanya Shanmugam Tata Consultancy Services, USA Author
  • Ravish Tillu RBC Capital Markets, USA Author
  • Suhas Jangoan Zendesk, USA Author

DOI:

https://doi.org/10.60087/jklst.vol2.n2.p420

Keywords:

Artificial Intelligence, Blockchain Privacy Protection, Data Encryption, De-identification, Access Control

Abstract

Given the widespread adoption and fusion of artificial intelligence (AI) and blockchain technologies, safeguarding privacy has become paramount. These techniques not only ensure the confidentiality of individuals' data but also uphold the integrity and reliability of the information. This study provides an introductory overview of AI and blockchain, elucidating their fusion and subsequent emergence of privacy protection methodologies. It delves into specific application contexts such as data encryption, de-identification, multi-tier distributed ledgers, and k-anonymity techniques. Furthermore, the paper critically assesses five pivotal dimensions of privacy protection systems within AI-blockchain integration: authorization management, access control, data security, network integrity, and scalability. Additionally, it conducts a thorough analysis of existing shortcomings, pinpointing their root causes and proposing corresponding remedies. The study also categorizes and synthesizes privacy protection methodologies based on AI-blockchain application contexts and technical frameworks. In conclusion, it outlines prospective avenues for the evolution of privacy protection technologies stemming from the integration of AI and blockchain, emphasizing the need to enhance efficiency and security for a more holistic safeguarding of privacy.

Downloads

Download data is not yet available.

Downloads

Published

16-06-2024

How to Cite

Shanmugam, L., Tillu, R., & Jangoan, S. (2024). Privacy-Preserving AI/ML Application Architectures: Techniques, Trade-offs, and Case Studies. Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online), 2(2), 398-420. https://doi.org/10.60087/jklst.vol2.n2.p420

Most read articles by the same author(s)

1 2 > >>