Toward Data Integrity Architecture for Cloud-Based AI Systems

  • Authors

    • Dr. Adeyemi Adebayo Department of Computer Science, Federal University of Technology, Akure, Nigeria. Author

    Published 2026-01-03

  • Data Integrity, Cloud Computing, Artificial Intelligence, Data Provenance, Cryptographic Verification, Cloud Security, AI Data Pipelines, Trustworthy AI, Distributed Systems, Access Control

    Issue

    Section

    Articles

    How to Cite

    [1]
    A. Adebayo, “Toward Data Integrity Architecture for Cloud-Based AI Systems”, IJDEIC, vol. 1, no. 1, pp. 01–10, Jan. 2026, Accessed: Mar. 02, 2026. [Online]. Available: https://worldcometresearchgroup.com/index.php/ijdeic/article/view/42
  • Abstract

    In cloud-based AI systems, maintaining data integrity is crucial for ensuring trustworthy model outcomes and preventing erroneous decision-making. However, the dynamic, distributed, and multi-tenant nature of cloud environments presents significant challenges to guaranteeing data authenticity, completeness, and consistency throughout AI data pipelines. This paper proposes a comprehensive data integrity architecture tailored for cloud-based AI systems, leveraging cryptographic techniques, provenance tracking, and access control mechanisms. The architecture is designed to seamlessly integrate with AI workflows, ensuring real-time verification of data integrity without compromising scalability or performance. Through a case study and experimental evaluation, we demonstrate the effectiveness of the proposed approach in enhancing trustworthiness and robustness of AI services deployed in the cloud. This work lays the foundation for future research on securing data integrity in evolving AI-cloud ecosystems.

  • References

    [1] Chen, L., & Zhao, J. (2020). Data integrity protection in cloud computing environments: A survey. Journal of Network and Computer Applications, 102785.

    [2] Li, H., & Liu, S. (2021). Blockchain-based data provenance in cloud environments. IEEE Access, 9, 23746–23759.

    [3] Shokri, R., & Shmatikov, V. (2015). Privacy-preserving deep learning. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 1310–1321.

    [4] Wang, W., Xu, B., & Liu, C. (2021). A survey on data integrity verification in cloud computing. Future Generation Computer Systems, 124, 680–692.

    [5] Rezaeifar, S., & Chen, J. (2019). AI security and privacy: Challenges and research directions. Computers & Security, 87, 101573.

    [6] Abadi, M., Chu, A., Goodfellow, I., & McMahan, H. B. (2016). Deep learning with differential privacy. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 308–318.

    [7] Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. 2015 IEEE Security and Privacy Workshops, 180–184.

    [8] Kshetri, N. (2018). 1 Blockchain’s roles in meeting key supply chain management objectives. International Journal of Information Management, 39, 80–89.

    [9] Al-Rubaie, M., & Chang, J. M. (2019). Privacy-preserving machine learning: Threats and solutions. IEEE Security & Privacy, 17(2), 49–58.

    [10] Zhang, Y., Kasera, S. K., & Smith, R. D. (2019). A trusted data provenance framework for cloud and IoT applications. IEEE Transactions on Services Computing, 13(4), 742–755.

    [11] Gai, K., & Qiu, M. (2017). Security and privacy in distributed cloud computing. Future Generation Computer Systems, 67, 384–390.

    [12] Meng, W., & Li, W. (2020). Intelligent auditing for cloud data integrity. Computers & Electrical Engineering, 83, 106588.

    [13] Samaniego, M., & Deters, R. (2017). Blockchain as a service for IoT. Proceedings of the IEEE International Conference on Internet of Things, 433–436.

    [14] Ristenpart, T., Tromer, E., Shacham, H., & Savage, S. (2009). Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. Proceedings of the 16th ACM Conference on Computer and Communications Security, 199–212.

    [15] Bhattacharya, S., & Islam, M. (2021). Ensuring data integrity in machine learning pipelines: A review. Journal of Systems and Software, 176, 110949.

  • Downloads