Enhanced Security Encryption and Data Driven Model for Digital transition using Artificial Intelligence

Authors

  • Dang Thanh Le, Nguyen Van Thanh

Keywords:

Digital transformation, security measures, sensitive data, enhanced security encryption, data-driven model,

Abstract

In an era of digital data security, ensuring robust security measures is paramount to safeguarding sensitive data. This paper proposes an innovative approach combining enhanced security encryption and a data-driven model empowered by artificial intelligence (AI) to fortify digital transitions. The methodology begins with a meticulous assessment of objectives, data inventory, and classification to discern the scope and sensitivity of information involved. An encryption strategy tailored to the data's sensitivity level is then devised, encompassing encryption at rest, in transit, and end-to-end encryption where applicable. Integrating AI into the security framework enables real-time threat detection through sophisticated algorithms analyzing network traffic, user behavior, and system logs. Moreover, AI-driven behavioral analytics augment monitoring capabilities, enabling the identification of anomalies indicative of potential security breaches. By amalgamating encryption with AI-driven insights, this approach presents a comprehensive solution to fortify digital transitions, ensuring data integrity, confidentiality, and compliance with regulatory standards.

Downloads

Download data is not yet available.

References

Developing an enhanced security encryption and data-driven model for digital transition using artificial intelligence (AI) involves several key steps and considerations. Here's a high-level overview of the process:

Identify Objectives and Requirements: Determine the specific goals of the digital transition and the requirements for security, privacy, and compliance. Consider factors such as data sensitivity, regulatory requirements (e.g., GDPR, HIPAA), and industry standards.

Data Inventory and Classification: Conduct a thorough inventory of the data that will be involved in the digital transition. Classify the data based on sensitivity and importance to ensure appropriate security measures are applied.

Encryption Strategy: Develop an encryption strategy based on the sensitivity of the data and the desired level of protection. This may include encryption at rest, encryption in transit, and end-to-end encryption for communication channels.

AI-Powered Threat Detection: Implement AI-powered threat detection mechanisms to identify and respond to security threats in real-time. This may involve using machine learning algorithms to analyze patterns in network traffic, user behavior, and system logs to detect anomalous activities indicative of security breaches.

K. Ingole and D. Padole, "Design Approaches for Internet of Things Based System Model for Agricultural Applications," 2023 11th International Conference on Emerging Trends in Engineering & Technology - Signal and Information Processing (ICETET - SIP), Nagpur, India, 2023, pp. 1-5, doi: 10.1109/ICETET-SIP58143.2023.10151606.

Stahl, B.C. (2021), Ethical Issues of AI. In: Artificial Intelligence for a Better Future, SpringerBriefs in Research and Innovation Governance, Springer, pp. 35-53.

Trung, N.S. (2022). “Digital transformation and conditions for implementing digital transformation in state management activities”. State Management Review,

Zemmar, A., Lozano, A.M., and Nelson, B.J. (2020). The rise of robots in surgical environments during COVID-19, Nature Machine Intelligence, vol. 2, pp. 566–572

Lee, K., & Trimi, S. (2020). The impact of artificial intelligence on public governance: Opportunities and challenges. Public Administration Review, 80(6), 992-1002. DOI: 10.1111/puar.13255

Lee, K., & Trimi, S. (2020). The impact of artificial intelligence on public governance: Opportunities and challenges. Public Administration Review, 80(6), 992-1002. DOI: 10.1111/puar.13255

Downloads

Published

26.03.2024

How to Cite

Nguyen Van Thanh, D. T. L. . (2024). Enhanced Security Encryption and Data Driven Model for Digital transition using Artificial Intelligence. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 1603–1607. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5635

Issue

Section

Research Article