Security Challenges for Cloud or Fog Computing-Based AI Applications
- URL: http://arxiv.org/abs/2310.19459v3
- Date: Wed, 20 Dec 2023 12:06:17 GMT
- Title: Security Challenges for Cloud or Fog Computing-Based AI Applications
- Authors: Amir Pakmehr, Andreas A{\ss}muth, Christoph P. Neumann, Gerald Pirkl
- Abstract summary: Securing the underlying Cloud or Fog services is essential.
Because the requirements for AI applications can also be different, we differentiate according to whether they are used in the Cloud or in a Fog Computing network.
We conclude by outlining specific information security requirements for AI applications.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Security challenges for Cloud or Fog-based machine learning services pose
several concerns. Securing the underlying Cloud or Fog services is essential,
as successful attacks against these services, on which machine learning
applications rely, can lead to significant impairments of these applications.
Because the requirements for AI applications can also be different, we
differentiate according to whether they are used in the Cloud or in a Fog
Computing network. This then also results in different threats or attack
possibilities. For Cloud platforms, the responsibility for security can be
divided between different parties. Security deficiencies at a lower level can
have a direct impact on the higher level where user data is stored. While
responsibilities are simpler for Fog Computing networks, by moving services to
the edge of the network, we have to secure them against physical access to the
devices. We conclude by outlining specific information security requirements
for AI applications.
Related papers
- Cloud Security and Security Challenges Revisited [0.0]
We revisit attacks on Cloud services and Cloud-related attack vectors that have been published in recent years.
Based on these findings, we apply a security metric in order to rank all these Cloud-related security challenges concerning their severity.
arXiv Detail & Related papers (2024-05-18T17:42:02Z) - Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks [55.340315838742015]
Negligence on the security of infotainment data communication in IoV networks can unintentionally open an easy access point for social engineering attacks.
In particular, we first classify data communication in the IoV network, examine the security focus of each data communication, and then develop a differentiated security architecture to provide security protection on a file-to-file basis.
arXiv Detail & Related papers (2024-03-29T12:01:31Z) - Leveraging AI Planning For Detecting Cloud Security Vulnerabilities [15.503757553097387]
Cloud computing services provide scalable and cost-effective solutions for data storage, processing, and collaboration.
Access control misconfigurations are often the primary driver for cloud attacks.
We develop a PDDL model for detecting security vulnerabilities which can for example lead to widespread attacks such as ransomware.
arXiv Detail & Related papers (2024-02-16T03:28:02Z) - Feature Selection using the concept of Peafowl Mating in IDS [2.184775414778289]
Cloud computing provides services that are Infrastructure based, Platform based and Software based.
The popularity of this technology is due to its superb performance, high level of computing ability, low cost of services, scalability, availability and flexibility.
The obtainability and openness of data in cloud environment make it vulnerable to the world of cyber-attacks.
To detect the attacks Intrusion Detection System is used, that can identify the attacks and ensure information security.
arXiv Detail & Related papers (2024-02-03T06:04:49Z) - The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective [64.36680481458868]
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network's edge.
This paper provides a survey of security and privacy in MEC from the perspective of Artificial Intelligence (AI)
We focus on new security and privacy issues, as well as potential solutions from the viewpoints of AI.
arXiv Detail & Related papers (2024-01-03T07:47:22Z) - Toward a real-time TCP SYN Flood DDoS mitigation using Adaptive Neuro-Fuzzy classifier and SDN Assistance in Fog Computing [0.31318403497744784]
We propose mitigation of Fog computing-based SYN Flood DDoS attacks using an Adaptive Neuro-Fuzzy Inference System (ANFIS) and Software Defined Networking (SDN) Assistance (FASA)
The simulation results show that FASA system outperforms other algorithms in terms of accuracy, precision, recall, and F1-score.
arXiv Detail & Related papers (2023-11-27T08:54:00Z) - A Review of Machine Learning-based Security in Cloud Computing [5.384804060261833]
Cloud Computing (CC) is revolutionizing the way IT resources are delivered to users, allowing them to access and manage their systems with increased cost-effectiveness and simplified infrastructure.
With the growth of CC comes a host of security risks, including threats to availability, integrity, and confidentiality.
Machine Learning (ML) is increasingly being used by Cloud Service Providers (CSPs) to reduce the need for human intervention in identifying and resolving security issues.
arXiv Detail & Related papers (2023-09-10T01:52:23Z) - Not what you've signed up for: Compromising Real-World LLM-Integrated
Applications with Indirect Prompt Injection [64.67495502772866]
Large Language Models (LLMs) are increasingly being integrated into various applications.
We show how attackers can override original instructions and employed controls using Prompt Injection attacks.
We derive a comprehensive taxonomy from a computer security perspective to systematically investigate impacts and vulnerabilities.
arXiv Detail & Related papers (2023-02-23T17:14:38Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Measurement-driven Security Analysis of Imperceptible Impersonation
Attacks [54.727945432381716]
We study the exploitability of Deep Neural Network-based Face Recognition systems.
We show that factors such as skin color, gender, and age, impact the ability to carry out an attack on a specific target victim.
We also study the feasibility of constructing universal attacks that are robust to different poses or views of the attacker's face.
arXiv Detail & Related papers (2020-08-26T19:27:27Z) - A Privacy-Preserving Distributed Architecture for
Deep-Learning-as-a-Service [68.84245063902908]
This paper introduces a novel distributed architecture for deep-learning-as-a-service.
It is able to preserve the user sensitive data while providing Cloud-based machine and deep learning services.
arXiv Detail & Related papers (2020-03-30T15:12:03Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.