Пропуск в контексте

Prospects for Combining Distributed Ledger Technology (Blockchain Technology) and the Process of Federal Machine Training of Artificial Intelligence (AI) in the Form of a Unified Information-Protected Structure

The paper addresses the challenge of ensuring the integrity of AI training data by integrating distributed ledger systems with blockchain technology, leveraging cryptographic methods and federal AI training techniques. Ensuring the confidentiality of data and its protection from falsification, modif...

Полное описание

Сохранить в:
Библиографические подробности
Главные авторы: Suyunova, G. B., Суюнова, Г. Б.
Формат: Статья
Язык:English
Опубликовано: Springer Nature 2025
Темы:
Online-ссылка:https://dspace.ncfu.ru/handle/123456789/30673
Метки: Добавить метку
Нет меток, Требуется 1-ая метка записи!
Описание
Краткое описание:The paper addresses the challenge of ensuring the integrity of AI training data by integrating distributed ledger systems with blockchain technology, leveraging cryptographic methods and federal AI training techniques. Ensuring the confidentiality of data and its protection from falsification, modification, and destruction is currently an important task in producing AI systems. Thus, the solution to the above-listed tasks in terms of ensuring information security of data in all their variety is rather relevant. The paper identifies five key “ifs” that define the properties a distributed ledger system using blockchain technology must possess. From this, five imperative principles, with unique characteristics not found in existing systems, have been developed for designing such systems. The inclusion of timestamps in the protocols of a notary cryptographer, in the form of an additional hash linked to the main hash that connects blocks within a peer-to-peer network, is considered valuable for transparent control of document creation time by all participants in the blockchain network. The use of timestamps alongside traditional cryptographic authentication and identification technologies, which ensure subscriber trust, is shown to be beneficial. This method enables all network participants to verify the “freshness” of the information provided by other subscribers.