Artificial Intelligence Cyber Security Strategy

Nowadays, STEM (science, technology, engineering and mathematics) have never been treated so seriously before. Artificial Intelligence (AI) has played an important role currently in STEM. Under the 2020 COVID-19 pandemic crisis, coronavirus disease across over the world we are living in. Every government seek advices from scientist before making their strategic plan. Most of countries collect data from hospitals (and care home and so on in the society), carried out data analysis, using formula to make some AI models, to predict the potential development patterns, in order to make their government strategy. AI security become essential. If a security attack make the pattern wrong, the model is not a true prediction, that could result in thousands life loss. The potential consequence of this non-accurate forecast would be even worse. Therefore, take security into account during the forecast AI modelling, step-by-step data governance, will be significant. Cyber security should be applied during this kind of prediction process using AI deep learning technology and so on. Some in-depth discussion will follow.AI security impact is a principle concern in the world. It is also significant for both nature science and social science researchers to consider in the future. In particular, because many services are running on online devices, security defenses are essential. The results should have properly data governance with security. AI security strategy should be up to the top priority to influence governments and their citizens in the world. AI security will help governments’ strategy makers to work reasonably balancing between technologies, socially and politics. In this paper, strategy related challenges of AI and Security will be discussed, along with suggestions AI cyber security and politics trade-off consideration from an initial planning stage to its near future further development.

[1]  Enjie Liu,et al.  Trustworthiness in the Patient Centred Health Care System , 2013, ISCTCS.

[2]  Xiaohua Feng,et al.  Challenges in ROS Forensics , 2019, 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).

[3]  Sijing Zhang,et al.  Mobile Computing and IoT: Radio Spectrum Requirement for Timely and Reliable Message Delivery Over Internet of Vehicles (IoVs) , 2020 .

[4]  Vladimir Dyo,et al.  Practical Hash-based Anonymity for MAC Addresses , 2020, ICETE.

[5]  Alan F. Westin,et al.  Special report: legal safeguards to insure privacy in a computer society , 1967, CACM.

[6]  Adam Vaughan The problems with contact-tracing apps , 2020, New Scientist.

[7]  Daniel Riccio,et al.  Biometric Authentication , 2014, Lecture Notes in Computer Science.

[8]  J. Freedman,et al.  Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .

[9]  Serge Vaudenay,et al.  Analysis of DP3T , 2020, IACR Cryptol. ePrint Arch..

[10]  Ben Coppin,et al.  Artificial Intelligence Illuminated , 2004 .

[11]  S. Margulis Privacy as a Social Issue and Behavioral Concept , 2003 .

[12]  Hannes Federrath,et al.  Hashing of personally identifiable information is not sufficient , 2018, Sicherheit.

[13]  Garrett A. Johnson,et al.  Consumer Privacy Choice in Online Advertising: Who Opts Out and at What Cost to Industry? , 2020, Mark. Sci..

[14]  Xiaohua Feng,et al.  Computer Laws Consideration on Smart City Data Planning of Chongli 2022 , 2019, 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).

[15]  Alfred C. Weaver,et al.  Biometric authentication , 2006, Computer.

[16]  Josh Patterson,et al.  Deep Learning: A Practitioner's Approach , 2017 .

[17]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .