IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Securing Web Data and Privacy in AIoT Systems

Securing Web Data and Privacy in AIoT Systems
View Sample PDF
Author(s): Marius Iulian Mihailescu (Universitatea Spiru Haret Bucureşti, Romania)and Stefania Loredana Nita (Military Technical Academy “Ferdinand I”, Romania)
Copyright: 2024
Pages: 45
Source title: Semantic Web Technologies and Applications in Artificial Intelligence of Things
Source Author(s)/Editor(s): Fernando Ortiz-Rodriguez (Tamaulipas Autonomous University, Mexico), Amed Leyva-Mederos (Universidad Central "Marta Abreu" de Las Villas, Cuba), Sanju Tiwari (Tamaulipas Autonomous University, Mexico), Ania R. Hernandez-Quintana (Universidad de La Habana, Cuba)and Jose L. Martinez-Rodriguez (Autonomous University of Tamaulipas, Mexico)
DOI: 10.4018/979-8-3693-1487-6.ch007

Purchase

View Securing Web Data and Privacy in AIoT Systems on the publisher's website for pricing and purchasing information.

Abstract

The exponential growth of Artificial Intelligence of Things (AIoT) has resulted in an unparalleled fusion of AI with IoT technologies, giving rise to intricate systems that present vast opportunities for automation, productivity, and data-centric decision-making. Nevertheless, this amalgamation also poses substantial obstacles regarding safeguarding online information and upholding confidentiality. The chapter extensively examines the difficulties associated with these issues and the tactics employed to surmount them. The chapter commences by delineating the distinctive susceptibilities inherent in AIoT systems, with a particular emphasis on how the interconnection of AI and IoT technologies gives rise to novel avenues for data breaches and privacy infringements. It then explores the most recent approaches and technologies used to protect data sent over AIoT networks. These include improved encryption methods, secure data transfer protocols, and solutions based on blockchain technology. A substantial chunk of the chapter focuses on privacy-preserving strategies in AIoT. The text examines the equilibrium between data usefulness and privacy protection. It delves into techniques like anonymization, differential privacy, and federated learning as means to safeguard user data while ensuring the effectiveness of AIoT systems. The chapter also examines regulatory and ethical factors, thoroughly examining current and developing legislation and regulations that oversee data security and privacy in AIoT. The content incorporates case studies and real-world examples to demonstrate the pragmatic implementation of theoretical principles. Ultimately, the chapter predicts forthcoming patterns and difficulties in this swiftly progressing domain, providing valuable perspectives on possible AIoT security and privacy protocol advancements. This resource is vital for professionals, researchers, and students engaged in AIoT, cybersecurity, and data privacy. It provides them with the necessary information and tools to protect against the ever-changing threats in this dynamic field.

Related Content

R. Sundar, P. Balaji Srikaanth, Darshana A. Naik, V. P. Murugan, Madhavi Karumudi, Sampath Boopathi. © 2024. 26 pages.
Kamalendu Pal. © 2024. 26 pages.
Hayder Luis Endo Pérez, Amed Abel Leiva Mederos, José Antonio Senso-Ruíz, Ghislain Auguste Atemezing, Daniel Gálvez Lio, Jose Luis Sánchez-Chávez, Alfredo Simón Cueva. © 2024. 13 pages.
Graveth Uzoma Ejekwu, Samson Ajodo, O. Mashood Lawal, Oluwafemi S. Balogun. © 2024. 20 pages.
Marwa Ben Arab, Mouna Rekik, Lotfi Krichen. © 2024. 18 pages.
J. Vimala Devi, Rajesh Vyankatesh Argiddi, P. Renuka, K. Janagi, B. S. Hari, S. Boopathi. © 2024. 24 pages.
Marius Iulian Mihailescu, Stefania Loredana Nita. © 2024. 45 pages.
Body Bottom