Downloads: 4 | Views: 86 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Research Paper | Information Technology | United States of America | Volume 12 Issue 2, February 2023 | Popularity: 5.7 / 10
Security is the Best Enabler and Blocker of AI Adoption
Laxminarayana Korada, Satyaveda Somepalli
Abstract: The adoption of artificial intelligence (AI) presents both opportunities and challenges, with security being a critical factor that can either enable or hinder success. This study explores the dual role of security in AI, emphasizing the need for robust measures to protect sensitive data, mitigate adversarial risks, and ensure proper access controls. This study highlights the security pitfalls in AI implementation, such as data poisoning, lack of encryption, and insufficient access control, and discusses the phases of AI implementation where security is crucial. Real-world examples illustrate the consequences of weak security, while the study also outlines best practices for securing AI systems, including the use of encryption, access control, and continuous monitoring. Additionally, this study examines the challenges of securing AI in public cloud and multi-cloud environments and emphasizes the importance of ongoing security services. The conclusion underscores the necessity of strong security frameworks to enable the successful adoption of AI while mitigating potential risks.
Keywords: Artificial intelligence (AI), security, data poisoning, encryption, access control, adversarial risks, cloud security, multi-cloud environments, continuous monitoring, AI adoption, cybersecurity, threat detection, vulnerability management, incident response
Edition: Volume 12 Issue 2, February 2023
Pages: 1759 - 1765
DOI: https://www.doi.org/10.21275/SR24919131620
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017
Pages: 2495 - 2503Migrations: Challenges and Best Practices for Migrating Legacy Systems to Cloud-Based Platforms
Kishore Gade
Downloads: 0
Research Paper, Information Technology, India, Volume 10 Issue 8, August 2021
Pages: 1309 - 1318Performance Analysis of Data Exchange Protocols in Cloud Environments
Sai Kumar Reddy Thumburu
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Student Project, Information Technology, India, Volume 11 Issue 10, October 2022
Pages: 959 - 963Medical Data Security using RSA and Visual Cryptography
Bency Wilson, Jesline Abraham
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, United States of America, Volume 13 Issue 10, October 2024
Pages: 914 - 917Data Governance and Security - A Comprehensive Review of Snowflake and Databricks
Rameshbabu Lakshmanasamy
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020
Pages: 1850 - 1857Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms
Jeevan Manda