SlideShare a Scribd company logo
2
Most read
4
Most read
6
Most read
1
“Securing Data With Blockchain and AI”
BACHELOR OF ENGINEERING IN COMPUTER SCIENCE AND
ENGINEERING
Submitted by
Amrutha S H (1HM20CS006)
Anusha D (1HM20CS008)
Kavyashree M (1HM20CS018)
Suma C R (1HM20CS037)
Under the guidance of
Wasimuddin,Asst professor,
Dept. of CSE
HMSIT,TUMAKURU
Presentation
on
Abstract
Data is the input for various artificial intelligence (AI) algorithms to mine valuable features, yet
data in Internet is scattered everywhere and controlled by different stakeholders who cannot
believe in each other, and usage of the data in complex cyberspace is difficult to authorize or to
validate. As a result, it is very difficult to enable data sharing in cyberspace for the real big data,
as well as a real powerful AI. In this paper, we propose the SecNet, an architecture that can enable
secure data storing, computing, and sharing in the large-scale Internet environment, aiming at a
more secure cyberspace with real big data and thus enhanced AI with plenty of data source, by
integrating three key components:
 blockchain-based data sharing with ownership guarantee, which enables trusted data sharing
in the large-scale environment to form real big data;
 AI-based secure computing platform to produce more intelligent security rules, which helps
to construct a more trusted cyberspace;
 trusted value-exchange mechanism for purchasing security service, providing a way for
participants to gain economic rewards when giving out their data or service, which promotes
the data sharing and thus achieves better performance of AI. Moreover, we discuss the typical
use scenario of SecNet as well as its potentially alternative way to deploy, as well as analyze
its effectiveness from the aspect of network security and economic revenue.
 INDEX TERMS: Data security, data systems, artificial intelligence, cyberspace.
2
Introduction
 In cyber world everything is dependent on data and all Artificial Intelligence algorithms
discover knowledge from past data only, for example in online shopping application
users review data is very important for new comers to take decision on which product
to purchase or not to purchase, we can take many examples like health care to know
good hospitals or education institutions etc. Not all cyber data can be made publicly
available such as Patient Health Data which contains patient disease details and contact
information and if such data available publicly then there is no security for that patient
data.
 Now a days all service providers such as online social networks or cloud storage will
store some type of users data and they can sale that data to other organization for their
own benefits and user has no control on his data as that data is saved on third party
servers.
3
4
System Requirements and Specification
Hardware Requirement
1. Processor Type: Pentium –IV.
2. ROM: 512 MB.
3. RAM: 4 GB.
4. Hard disk: 20 GB.
 Software Requirement
1. Operating System: Windows 2007/8/10/11
2. Script: python
3. Blockchain technology
5
Literature Survey
6
Proposed Methodology
Contd.. 7
 To overcome the issue we describe the concept called Private Data Centres (PDC) with
Blockchain and AI technique to provide security to user’s data. In this technique 3 functions will
work which describe below.
1) Blockchain: Blockchain-based data sharing with ownership guarantee, which enables trusted data
sharing in the large-scale environment to form real big data. In this technique users can define
access control which means which user has permission to access data and which user cannot
access data and Blockchain object will be generate on that access data and allow only those users
to access data which has permissions. In Blockchain object user will add/subscribe share data and
give permission.
2) Artificial Intelligence: AI-based secure computing platform to produce more intelligent security
rules, which helps to construct a more trusted cyberspace. AI work similar to human brain and
responsible to execute logic to check whether requesting user has permission to access shared
data. If access is available then AI allow Blockchain to display share data otherwise ignore
request.
3) Rewards: In this technique all users who is sharing the data will earn rewards point upon any
user access his data. trusted value-exchange mechanism for purchasing security service, providing
a way for participants to gain economic rewards when giving out their data or service, which
promotes the data sharing and thus achieves better performance of AI.
8
 An increasing amount of personal data, including location information, web searching behavior,
user calls, user preference, is being silently collected by the built - in sensors inside the products
from those big companies, which brings in huge risk on privacy leakage of data owners.
 Moreover, the usage of those data is out of control of their owners, since currently there is not a
reliable way to record how the data is used and by who, and thus has little methods to trace or
punish the violators who abuse those data. That is, lack of ability to effectively manage data makes
it very difficult for an individual to control the potential risks associated with the collected data. In
cyber world everything is dependent on data and all artificial algorithms will gain knowledge from
previous data only.
 As the technology is increasing day by day, some of service providers such online social network
or cloud storage will store some type of users data and they can sale that data for their benefits and
user has no control on his/her data because the data is saved on third party servers.
 Drawbacks
1) There is no security for the user’s data. 2) User has no control on his data.
Existing System
Problem statement
 An increasing amount of personal data, including location information, web
searching behavior, user calls, user preference, is being silently collected by the built
- in sensors inside the products from those big companies, which brings in huge risk
on privacy leakage of data owners.
 Moreover, the usage of those data is out of control of their owners, since currently
there is not a reliable way to record how the data is used and by who, and thus has
little methods to trace or punish the violators who abuse those data.
 Lack of ability to effectively manage data makes it very difficult for an individual to
control the potential risks associated with the collected data.
9
10
[1] Health Insurance. (2021). Health Insurance in India. [Online]. Available:
https://en.wikipedia.org/wiki/Health_insurance_in_India
[2] A. Sheshasaayee and S. S. Thomas, ‘‘A purview of the impact of supervised learning methodologies on health
insurance fraud detection,’’ in Information Systems Design and Intelligent Applications (Advances in Intelligent
Systems and Computing). Singapore: Springer, 2018, pp. 978–984.
[3] H. K. Patil and R. Seshadri, ‘‘Big data security and privacy issues in healthcare,’’ in Proc. IEEE Int. Congr. Big
Data, Jun. 2014, pp. 762–765.
[4] M. Ojha and K. Mathur, ‘‘Proposed application of big data analytics in healthcare at Maharaja Yeshwantrao
hospital,’’ in Proc. 3rd MEC Int. Conf. Big Data Smart City (ICBDSC), Mar. 2016, pp. 1–7.
[5] M. Eling and M. Lehmann, ‘‘The impact of digitalization on the insurance value chain and the insurability of
risks,’’ Geneva Papers Risk InsuranceIssues Pract., vol. 43, no. 3, pp. 359–396, Jul. 2018.
[6] R. Dutt, ‘‘The impact of artificial intelligence on healthcare insurances,’’ in Artificial Intelligence in Healthcare.
Amsterdam, Netherlands: Elsevier, 2020, pp. 271–293.
[7] P. Kumar and H.-J. Lee, ‘‘Security issues in healthcare applications using wireless medical sensor networks: A
survey,’’ Sensors, vol. 12, no. 1, pp. 55–91, 2012.
[8] M. Li, W. Lou, and K. Ren, ‘‘Data security and privacy in wireless body area networks,’’ IEEE Wireless Commun.,
vol. 17, no. 1, pp. 51–58, Feb. 2010.
[9] J. Heurix, M. Karlinger, and T. Neubauer, ‘‘Pseudonymization with metadata encryption for privacy-preserving
searchable documents,’’ in Proc. 45th Hawaii Int. Conf. Syst. Sci., Jan. 2012, pp. 3011–3020.
[10] K. M. Kumar, S. Tejasree, and S. Swarnalatha, ‘‘Effective implementation of data segregation & extraction using
big data in E—Health insurance as a service,’’ in Proc. 3rd Int. Conf. Adv. Comput. Commun. Syst. (ICACCS), Jan.
2016, pp. 1–5.
References
11

More Related Content

PPTX
Diabetes Mellitus
PPTX
Hypertension
PPTX
Republic Act No. 11313 Safe Spaces Act (Bawal Bastos Law).pptx
PPTX
Power Point Presentation on Artificial Intelligence
PDF
Caça palavras - Bullying
PPTX
PDF
Atividade ortográfica - Caçada aos erros
Diabetes Mellitus
Hypertension
Republic Act No. 11313 Safe Spaces Act (Bawal Bastos Law).pptx
Power Point Presentation on Artificial Intelligence
Caça palavras - Bullying
Atividade ortográfica - Caçada aos erros

What's hot (20)

PDF
Lecture 6 Addis Ababa style Architecture
PDF
harar architecture re
PPTX
Nuijie Great Mosque
PPTX
ETHIOPIAN VERNACULAR ARCHITECTURE.pptx
PDF
Lecture 4 gondarian architecture
PDF
Project 1-Lighting & Acoustic Performance Evaluation and Design
PDF
Ketchawa mosque
PPTX
Schroder house
PPTX
Renaissance in italy (2)
PPTX
Seattle public library
PPTX
Presentation1: Surry Hills Community Centre and Library
PPTX
PPTX
Gurage vernacular architecture presentation.pptx
PDF
Al hambra palace- a design research
PPT
Wall and floor systems for Office spaces
DOCX
Palazzo Medici Riccardi - Precedent Studies
PPTX
Heydar Aliyev Centre
PDF
Gothic Architecture
PDF
8 house - The ininity loop - Sheet 2
PDF
Centre culturel havre larabi marwa
Lecture 6 Addis Ababa style Architecture
harar architecture re
Nuijie Great Mosque
ETHIOPIAN VERNACULAR ARCHITECTURE.pptx
Lecture 4 gondarian architecture
Project 1-Lighting & Acoustic Performance Evaluation and Design
Ketchawa mosque
Schroder house
Renaissance in italy (2)
Seattle public library
Presentation1: Surry Hills Community Centre and Library
Gurage vernacular architecture presentation.pptx
Al hambra palace- a design research
Wall and floor systems for Office spaces
Palazzo Medici Riccardi - Precedent Studies
Heydar Aliyev Centre
Gothic Architecture
8 house - The ininity loop - Sheet 2
Centre culturel havre larabi marwa
Ad

Similar to Securing Data with Block chain and AI ppt (20)

PDF
The Weakest Point of Security in IoT
PDF
I want you to Read intensively papers and give me a summary for ever.pdf
PPTX
Trust Based Packet Filtering.pptx
PDF
IRJET - Securing Aadhaar Details using Blockchain
DOCX
Cloud assisted mobile-access of health data with privacy and auditability
PDF
MEDBLOCK
PDF
5.[40 44]enhancing security in cloud computing
PDF
5.[40 44]enhancing security in cloud computing
PDF
Big Data and Information Security
PDF
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
PDF
Blockchain And Digital Twin Enabled Iot Networks Privacy And Security Perspec...
PDF
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
PDF
Mi health care - multi-tenant health care system
PPTX
Advanced Topics in Data Science_ An Exploration into AI, IoT, and Blockchain....
PDF
Deep Learning and Big Data technologies for IoT Security
PDF
Cloud assisted mobile-access of health data with privacy and auditability
PDF
IRJET -Securing Data in Distributed System using Blockchain and AI
PDF
The Role of AI in Web3 Development - SoluLab
PDF
The Role of AI in Web3 Development serives
PDF
COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ...
The Weakest Point of Security in IoT
I want you to Read intensively papers and give me a summary for ever.pdf
Trust Based Packet Filtering.pptx
IRJET - Securing Aadhaar Details using Blockchain
Cloud assisted mobile-access of health data with privacy and auditability
MEDBLOCK
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Big Data and Information Security
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
Blockchain And Digital Twin Enabled Iot Networks Privacy And Security Perspec...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
Mi health care - multi-tenant health care system
Advanced Topics in Data Science_ An Exploration into AI, IoT, and Blockchain....
Deep Learning and Big Data technologies for IoT Security
Cloud assisted mobile-access of health data with privacy and auditability
IRJET -Securing Data in Distributed System using Blockchain and AI
The Role of AI in Web3 Development - SoluLab
The Role of AI in Web3 Development serives
COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ...
Ad

Recently uploaded (20)

PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPTX
Database Infoormation System (DBIS).pptx
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
PPTX
oil_refinery_comprehensive_20250804084928 (1).pptx
PPT
ISS -ESG Data flows What is ESG and HowHow
PDF
Introduction to the R Programming Language
PDF
.pdf is not working space design for the following data for the following dat...
PPT
Quality review (1)_presentation of this 21
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PPTX
Introduction to Knowledge Engineering Part 1
PDF
Clinical guidelines as a resource for EBP(1).pdf
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PPTX
Supervised vs unsupervised machine learning algorithms
PDF
Fluorescence-microscope_Botany_detailed content
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PDF
Business Analytics and business intelligence.pdf
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PPT
Reliability_Chapter_ presentation 1221.5784
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
Database Infoormation System (DBIS).pptx
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
oil_refinery_comprehensive_20250804084928 (1).pptx
ISS -ESG Data flows What is ESG and HowHow
Introduction to the R Programming Language
.pdf is not working space design for the following data for the following dat...
Quality review (1)_presentation of this 21
STUDY DESIGN details- Lt Col Maksud (21).pptx
Introduction to Knowledge Engineering Part 1
Clinical guidelines as a resource for EBP(1).pdf
Galatica Smart Energy Infrastructure Startup Pitch Deck
Supervised vs unsupervised machine learning algorithms
Fluorescence-microscope_Botany_detailed content
IBA_Chapter_11_Slides_Final_Accessible.pptx
Business Analytics and business intelligence.pdf
Introduction-to-Cloud-ComputingFinal.pptx
Reliability_Chapter_ presentation 1221.5784

Securing Data with Block chain and AI ppt

  • 1. 1 “Securing Data With Blockchain and AI” BACHELOR OF ENGINEERING IN COMPUTER SCIENCE AND ENGINEERING Submitted by Amrutha S H (1HM20CS006) Anusha D (1HM20CS008) Kavyashree M (1HM20CS018) Suma C R (1HM20CS037) Under the guidance of Wasimuddin,Asst professor, Dept. of CSE HMSIT,TUMAKURU Presentation on
  • 2. Abstract Data is the input for various artificial intelligence (AI) algorithms to mine valuable features, yet data in Internet is scattered everywhere and controlled by different stakeholders who cannot believe in each other, and usage of the data in complex cyberspace is difficult to authorize or to validate. As a result, it is very difficult to enable data sharing in cyberspace for the real big data, as well as a real powerful AI. In this paper, we propose the SecNet, an architecture that can enable secure data storing, computing, and sharing in the large-scale Internet environment, aiming at a more secure cyberspace with real big data and thus enhanced AI with plenty of data source, by integrating three key components:  blockchain-based data sharing with ownership guarantee, which enables trusted data sharing in the large-scale environment to form real big data;  AI-based secure computing platform to produce more intelligent security rules, which helps to construct a more trusted cyberspace;  trusted value-exchange mechanism for purchasing security service, providing a way for participants to gain economic rewards when giving out their data or service, which promotes the data sharing and thus achieves better performance of AI. Moreover, we discuss the typical use scenario of SecNet as well as its potentially alternative way to deploy, as well as analyze its effectiveness from the aspect of network security and economic revenue.  INDEX TERMS: Data security, data systems, artificial intelligence, cyberspace. 2
  • 3. Introduction  In cyber world everything is dependent on data and all Artificial Intelligence algorithms discover knowledge from past data only, for example in online shopping application users review data is very important for new comers to take decision on which product to purchase or not to purchase, we can take many examples like health care to know good hospitals or education institutions etc. Not all cyber data can be made publicly available such as Patient Health Data which contains patient disease details and contact information and if such data available publicly then there is no security for that patient data.  Now a days all service providers such as online social networks or cloud storage will store some type of users data and they can sale that data to other organization for their own benefits and user has no control on his data as that data is saved on third party servers. 3
  • 4. 4 System Requirements and Specification Hardware Requirement 1. Processor Type: Pentium –IV. 2. ROM: 512 MB. 3. RAM: 4 GB. 4. Hard disk: 20 GB.  Software Requirement 1. Operating System: Windows 2007/8/10/11 2. Script: python 3. Blockchain technology
  • 7. Contd.. 7  To overcome the issue we describe the concept called Private Data Centres (PDC) with Blockchain and AI technique to provide security to user’s data. In this technique 3 functions will work which describe below. 1) Blockchain: Blockchain-based data sharing with ownership guarantee, which enables trusted data sharing in the large-scale environment to form real big data. In this technique users can define access control which means which user has permission to access data and which user cannot access data and Blockchain object will be generate on that access data and allow only those users to access data which has permissions. In Blockchain object user will add/subscribe share data and give permission. 2) Artificial Intelligence: AI-based secure computing platform to produce more intelligent security rules, which helps to construct a more trusted cyberspace. AI work similar to human brain and responsible to execute logic to check whether requesting user has permission to access shared data. If access is available then AI allow Blockchain to display share data otherwise ignore request. 3) Rewards: In this technique all users who is sharing the data will earn rewards point upon any user access his data. trusted value-exchange mechanism for purchasing security service, providing a way for participants to gain economic rewards when giving out their data or service, which promotes the data sharing and thus achieves better performance of AI.
  • 8. 8  An increasing amount of personal data, including location information, web searching behavior, user calls, user preference, is being silently collected by the built - in sensors inside the products from those big companies, which brings in huge risk on privacy leakage of data owners.  Moreover, the usage of those data is out of control of their owners, since currently there is not a reliable way to record how the data is used and by who, and thus has little methods to trace or punish the violators who abuse those data. That is, lack of ability to effectively manage data makes it very difficult for an individual to control the potential risks associated with the collected data. In cyber world everything is dependent on data and all artificial algorithms will gain knowledge from previous data only.  As the technology is increasing day by day, some of service providers such online social network or cloud storage will store some type of users data and they can sale that data for their benefits and user has no control on his/her data because the data is saved on third party servers.  Drawbacks 1) There is no security for the user’s data. 2) User has no control on his data. Existing System
  • 9. Problem statement  An increasing amount of personal data, including location information, web searching behavior, user calls, user preference, is being silently collected by the built - in sensors inside the products from those big companies, which brings in huge risk on privacy leakage of data owners.  Moreover, the usage of those data is out of control of their owners, since currently there is not a reliable way to record how the data is used and by who, and thus has little methods to trace or punish the violators who abuse those data.  Lack of ability to effectively manage data makes it very difficult for an individual to control the potential risks associated with the collected data. 9
  • 10. 10 [1] Health Insurance. (2021). Health Insurance in India. [Online]. Available: https://en.wikipedia.org/wiki/Health_insurance_in_India [2] A. Sheshasaayee and S. S. Thomas, ‘‘A purview of the impact of supervised learning methodologies on health insurance fraud detection,’’ in Information Systems Design and Intelligent Applications (Advances in Intelligent Systems and Computing). Singapore: Springer, 2018, pp. 978–984. [3] H. K. Patil and R. Seshadri, ‘‘Big data security and privacy issues in healthcare,’’ in Proc. IEEE Int. Congr. Big Data, Jun. 2014, pp. 762–765. [4] M. Ojha and K. Mathur, ‘‘Proposed application of big data analytics in healthcare at Maharaja Yeshwantrao hospital,’’ in Proc. 3rd MEC Int. Conf. Big Data Smart City (ICBDSC), Mar. 2016, pp. 1–7. [5] M. Eling and M. Lehmann, ‘‘The impact of digitalization on the insurance value chain and the insurability of risks,’’ Geneva Papers Risk InsuranceIssues Pract., vol. 43, no. 3, pp. 359–396, Jul. 2018. [6] R. Dutt, ‘‘The impact of artificial intelligence on healthcare insurances,’’ in Artificial Intelligence in Healthcare. Amsterdam, Netherlands: Elsevier, 2020, pp. 271–293. [7] P. Kumar and H.-J. Lee, ‘‘Security issues in healthcare applications using wireless medical sensor networks: A survey,’’ Sensors, vol. 12, no. 1, pp. 55–91, 2012. [8] M. Li, W. Lou, and K. Ren, ‘‘Data security and privacy in wireless body area networks,’’ IEEE Wireless Commun., vol. 17, no. 1, pp. 51–58, Feb. 2010. [9] J. Heurix, M. Karlinger, and T. Neubauer, ‘‘Pseudonymization with metadata encryption for privacy-preserving searchable documents,’’ in Proc. 45th Hawaii Int. Conf. Syst. Sci., Jan. 2012, pp. 3011–3020. [10] K. M. Kumar, S. Tejasree, and S. Swarnalatha, ‘‘Effective implementation of data segregation & extraction using big data in E—Health insurance as a service,’’ in Proc. 3rd Int. Conf. Adv. Comput. Commun. Syst. (ICACCS), Jan. 2016, pp. 1–5. References
  • 11. 11