IEEE Access (Jan 2024)

AICyber-Chain: Combining AI and Blockchain for Improved Cybersecurity

  • Zia Ullah,
  • Abdul Waheed,
  • Muhammad Ismail Mohmand,
  • Sadia Basar,
  • Mahdi Zareei,
  • Fausto Granda

DOI
https://doi.org/10.1109/ACCESS.2024.3463976
Journal volume & issue
Vol. 12
pp. 142194 – 142214

Abstract

Read online

Artificial intelligence (AI) is one of the key technologies emerging in the Industrial Revolution that could protect against cybersecurity threats. AI is a key component of big data analytics and enables accurate real-time data analysis. AI can analyze big data, but it has some issues with security, privacy, and centralization of data. Moreover, cybercriminals continue to advance, so law enforcement faces more threats. With traditional cybersecurity solutions, sophisticated cyber-attacks are harder to detect and defend against. In complex cyberspaces, AI algorithms mine valuable features from data. However, the data on the Internet is scattered and controlled by different parties, making it challenging to authorize and validate its use. The AICyber-Chain model is presented in this paper for securely storing, calculating, and distributing data on the Internet at an enterprise scale. In a large-scale Internet environment, our proposed AICyber-Chain model integrates three key components to ensure a more secure cyberspace, enhancing AI, namely: Firstly, blockchain-based data sharing guarantees ownership at a large scale, enabling real-time data sharing. Secondly, a platform powered by AI makes cyberspace more trustworthy. Thirdly, sharing data or services rewards participants financially, which promotes sharing. We also discuss a typical use scenario, an alternative deployment method, and its security and commercial efficacy. Also, we simulated our model on Ethereum’s official test network, called Rinkeby, to demonstrate its practicality and efficiency. This model speeds up authentication by 1.8 times compared to the centralized model. In addition, our proposed solution reduces gas consumption by 20 to 25%. Our paper aims to serve as a guide and reference point for cybersecurity researchers and industry practitioners, especially from an intelligent computing or AI-based technical standpoint.

Keywords