Homomorphic Encryption for AI-Based Applications: Challenges and Opportunities DOI
Rafik Hamza

Published: Oct. 18, 2023

Homomorphic encryption is a technique that allows computations with encrypted data without revealing the or requiring decryption. This has many potential applications in artificial intelligence (AI), where privacy and security are critical. However, implementing homomorphic for AI also presents challenges opportunities from software engineering perspective. In this paper, we provide comprehensive overview of current state art AI-based discuss some important aspects solutions scenarios. We review recent research applying to their aspects. compare different algorithms libraries terms security, performance, usability, interoperability, functionality, scalability. Finally, highlight open future directions development area.

Language: Английский

Privacy preservation in Artificial Intelligence and Extended Reality (AI-XR) metaverses: A survey DOI Creative Commons
Mahdi Alkaeed, Adnan Qayyum, Junaid Qadir

et al.

Journal of Network and Computer Applications, Journal Year: 2024, Volume and Issue: 231, P. 103989 - 103989

Published: Aug. 2, 2024

The metaverse is a nascent concept that envisions virtual universe, collaborative space where individuals can interact, create, and participate in wide range of activities. Privacy the critical concern as evolves immersive experiences become more prevalent. privacy problem refers to challenges concerns surrounding personal information data within Virtual Reality (VR) environments shared VR becomes accessible. Metaverse will harness advancements from various technologies such Artificial Intelligence (AI), Extended (XR) Mixed (MR) provide personalized services its users. Moreover, enable experiences, relies on collection fine-grained user leads issues. Therefore, before potential be fully realized, related must addressed. This includes safeguarding users' control over their data, ensuring security information, protecting in-world actions interactions unauthorized sharing. In this paper, we explore future metaverses are expected face, given reliance AI for tracking users, creating XR MR facilitating interactions. thoroughly analyze technical solutions differential privacy, Homomorphic Encryption, Federated Learning discuss sociotechnical issues regarding privacy.

Language: Английский

Citations

16

A comprehensive survey and taxonomy on privacy-preserving deep learning DOI Creative Commons
Anh-Tu Tran, The-Dung Luong, Van‐Nam Huynh

et al.

Neurocomputing, Journal Year: 2024, Volume and Issue: 576, P. 127345 - 127345

Published: Feb. 1, 2024

Language: Английский

Citations

8

Vaccine development using artificial intelligence and machine learning: A review DOI
Varun Asediya, Pranav Anjaria, R. A. Mathakiya

et al.

International Journal of Biological Macromolecules, Journal Year: 2024, Volume and Issue: unknown, P. 136643 - 136643

Published: Oct. 1, 2024

Language: Английский

Citations

6

Blockchain-Based Decentralised Privacy-Preserving Machine Learning Authentication and Verification With Immersive Devices in the Urban Metaverse Ecosystem DOI Open Access
Kaya Kuru,

Kaan Kuru

Published: Feb. 6, 2024

Through the development of metaverse concept from Sumerian myth (5500 - 1800 BC) and mind-altering novel, “Snow Crash” in 1992, to today’s information age, human- society-centred urban worlds, an extension residents society where virtual physically real blend are more organically integrated, meant mirror fabric life with no harm their residents. The success cybercommunities depends on quality data-driven Smart City (SC) Digital Twins (DTs), seamless exchange data between cyber physical worlds (e.g. counterpart “Avatars’’) processing effectively efficiently vicious interventions. potential risks this ecosystem that incorporates Web3 can be extremer than ones Web2 since users immersed multiple tightly coupled wearable sensor-rich devices perceiving possible imminent negative experiences. This study, by analysing cyberthreats cyberspaces, proposes a blockchain-based Decentralised Privacy-Preserving Machine Learning (DPPML) authentication verification technique, which uses immersive instrumented against identity impersonation theft credentials, identity, or avatars.

Language: Английский

Citations

4

The Social Network Dilemma: Safeguarding Privacy and Security in an Online Community DOI Creative Commons
Thulasi Bikku,

Narasimha Swamy Biyyapu,

J. C. Sekhar

et al.

International Journal of Safety and Security Engineering, Journal Year: 2024, Volume and Issue: 14(1), P. 125 - 133

Published: Feb. 29, 2024

Social networks have become integral to our daily lives, facilitating connections, information sharing, and community engagement.However, concerns regarding privacy security emerged with their widespread use.This paper delves into specific risks associated social media use, including data breaches, identity theft, cyberstalking.The analysis extends various measures, such as encryption protocols, two-factor authentication, advanced browsing techniques enhance user protection.In study, 78% of users reported experiencing issues, shedding light on the prevalence nature challenges individuals face platforms.These issues encompassed cyberstalking, underscoring urgency addressing these concerns.Moreover, research explores strategic approaches for mitigate challenges.This involves implementing stringent protection policies, increasing transparency usage, empowering exert greater control over personal information.Beyond academic inquiry, practical implications are significant, they directly impact well-being users.This provides a comprehensive overview current landscape emphasizes importance proactive measures safeguarding networks.

Language: Английский

Citations

4

ThorPIR: Single Server PIR via Homomorphic Thorp Shuffles DOI Creative Commons

Ben Fisch,

Arthur Lazzaretti,

Zeyu Liu

et al.

Published: Dec. 2, 2024

Private Information Retrieval (PIR) is a two player protocol where the client, given some query x ε [N], interacts with server, which holds N-bit string DB, in order to privately retrieve DB[x]. In this work, we focus on single-server client-preprocessing model, initially proposed by Corrigan-Gibbs and Kogan (EUROCRYPT 2020), client server first run joint preprocessing algorithm, after can elements from DB time sublinear N. Most known constructions of PIR follow one paradigms: They feature either (1) linear-bandwidth offline phase downloads whole database or (2) sublinear-bandwidth however has compute large-depth (Ωλ(N)) circuit under fully-homomorphic encryption (FHE) execute phase.

Language: Английский

Citations

4

PQC meets ML or AI: Exploring the Synergy of Machine Learning and Post-quantum Cryptography DOI Creative Commons
Saleh Darzi, Attila A. Yavuz, Rouzbeh Behnia

et al.

Published: Feb. 13, 2024

Artificial Intelligence and Machine Learning are widely integrated into real-world applications, facing security privacy risks. The emergence of quantum computers poses a substantial threat to ML's long-term security. Our study delves the intersection ML with in post-quantum era, where Post-Quantum Cryptography meets ML/AI.

Language: Английский

Citations

3

Low Multiplicative Depth Polynomial Evaluation Architectures for Homomorphic Encrypted Data DOI
Jianfei Wang, Jia Hou,

F. Zhang

et al.

Proceedings of the 28th Asia and South Pacific Design Automation Conference, Journal Year: 2025, Volume and Issue: unknown, P. 1302 - 1307

Published: Jan. 20, 2025

Language: Английский

Citations

0

UMetaBE-DPPML: Urban Metaverse & Blockchain-Enabled Decentralised Privacy-Preserving Machine Learning Verification And Authentication With Metaverse Immersive Devices DOI Creative Commons
Kaya Kuru,

Kaan Kuru

Internet of Things and Cyber-Physical Systems, Journal Year: 2025, Volume and Issue: unknown

Published: March 1, 2025

Language: Английский

Citations

0

Optimizing Privacy-Preserving Continuous Authentication of Mobile Devices DOI
David Monschein, Oliver P. Waldhorst

Lecture notes in computer science, Journal Year: 2025, Volume and Issue: unknown, P. 63 - 81

Published: Jan. 1, 2025

Language: Английский

Citations

0