Artificial Intelligence Data Security Evaluation in Big Data Cloud Computing Environment
DOI: 10.23977/jeis.2025.100202 | Downloads: 7 | Views: 199
Author(s)
Hui Chen 1, Hua Yuan 1
Affiliation(s)
1 The 15th Research Institute of China Electronics Technology Group Corporation, Beijing, China
Corresponding Author
Hui ChenABSTRACT
With the increasing popularity of network technology and information concepts, Big Data (BD) and cloud computing technologies have emerged and are widely used in all industries. BD technology can fully utilize the application value of information. Cloud computing can store a large amount of data, and improve data usage efficiency, so as to make full use of the value of data. At the same time, data security issues have become increasingly important. However, due to various factors, many users are faced with data breaches and privacy violations in the BD cloud computing environment. In this case, there are some data security risks, and the key issue is to consider how to avoid these risks. By analyzing the relationship and differences between BD and cloud computing, this article studied the issues and influencing factors of Artificial Intelligence (AI) data security in the BD cloud computing environment, and proposed corresponding optimization strategies, so as to improve data security and provide users with a brand new experience. Through comparison, it could be seen that the data processing speed and legal integrity after using the optimization strategy significantly improved. Among them, data processing speed increased by 7.2% and legal integrity increased by 10.4%. BD cloud computing could effectively improve AI data security performance.
KEYWORDS
Artificial Intelligence, Data Security, Big Data, Cloud ComputingCITE THIS PAPER
Hui Chen, Hua Yuan, Artificial Intelligence Data Security Evaluation in Big Data Cloud Computing Environment. Journal of Electronics and Information Science (2025) Vol. 10: 10-21. DOI: http://dx.doi.org/10.23977/10.23977/jeis.2025.100202.
REFERENCES
[1] Esposito, Christian. "Blockchain: A panacea for healthcare cloud-based data security and privacy?." IEEE Cloud Computing 5.1 (2018): 31-37.
[2] Isaak, Jim, and Mina J. Hanna. "User data privacy: Facebook, Cambridge Analytica, and privacy protection." Computer 51.8 (2018): 56-59.
[3] Abouelmehdi, Karim, Abderrahim Beni-Hessane, and Hayat Khaloufi. "Big healthcare data: preserving security and privacy." Journal of big data 5.1 (2018): 1-18.
[4] Salman, Tara. "Security services using blockchains: A state of the art survey." IEEE Communications Surveys & Tutorials 21.1 (2018): 858-880.
[5] Xiao, Liang. "IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?." IEEE Signal Processing Magazine 35.5 (2018): 41-49.
[6] Lu, Yunlong. "Blockchain and federated learning for privacy-preserved data sharing in industrial IoT." IEEE Transactions on Industrial Informatics 16.6 (2019): 4177-4186.
[7] Taylor, Paul J. "A systematic literature review of blockchain cyber security." Digital Communications and Networks 6.2 (2020): 147-156.
[8] Lo’ai, A. Tawalbeh, and Gokay Saldamli. "Reconsidering big data security and privacy in cloud and mobile cloud systems." Journal of King Saud University-Computer and Information Sciences 33.7 (2021): 810-819.
[9] Sharma, Abhishek, and Umesh Kumar Singh. "Modelling of smart risk assessment approach for cloud computing environment using AI & supervised machine learning algorithms." Global Transitions Proceedings 3.1 (2022): 243-250.
[10] Ray, Soumya, Kamta Nath Mishra, and Sandip Dutta. "Big data security issues from the perspective of IoT and cloud computing: A review." Recent Advances in Computer Science and Communications 12.1 (2020): 1-22.
[11] Shakya, Subarana. "An efficient security framework for data migration in a cloud computing environment." Journal of Artificial Intelligence 1.01 (2019): 45-53.
[12] Bai, Xiang. "Advancing COVID-19 diagnosis with privacy-preserving collaboration in artificial intelligence." Nature Machine Intelligence 3.12 (2021): 1081-1089.
[13] Puthal, Deepak. "The blockchain as a decentralized security framework [future directions]." IEEE Consumer Electronics Magazine 7.2 (2018): 18-21.
[14] Bosri, Rabeya. "Integrating blockchain with artificial intelligence for privacy-preserving recommender systems." IEEE Transactions on Network Science and Engineering 8.2 (2020): 1009-1018.
[15] Hesamifard, Ehsan. "Privacy-preserving machine learning as a service." Proc. Priv. Enhancing Technol. 2018.3 (2018): 123-142.
Downloads: | 12710 |
---|---|
Visits: | 493208 |
Sponsors, Associates, and Links
-
Information Systems and Signal Processing Journal
-
Intelligent Robots and Systems
-
Journal of Image, Video and Signals
-
Transactions on Real-Time and Embedded Systems
-
Journal of Electromagnetic Interference and Compatibility
-
Acoustics, Speech and Signal Processing
-
Journal of Power Electronics, Machines and Drives
-
Journal of Electro Optics and Lasers
-
Journal of Integrated Circuits Design and Test
-
Journal of Ultrasonics
-
Antennas and Propagation
-
Optical Communications
-
Solid-State Circuits and Systems-on-a-Chip
-
Field-Programmable Gate Arrays
-
Vehicular Electronics and Safety
-
Optical Fiber Sensor and Communication
-
Journal of Low Power Electronics and Design
-
Infrared and Millimeter Wave
-
Detection Technology and Automation Equipment
-
Journal of Radio and Wireless
-
Journal of Microwave and Terahertz Engineering
-
Journal of Communication, Control and Computing
-
International Journal of Surveying and Mapping
-
Information Retrieval, Systems and Services
-
Journal of Biometrics, Identity and Security
-
Journal of Avionics, Radar and Sonar