Blockchain for Artificial Intelligence (AI): enhancing compliance with the EU AI Act through distributed ledger technology. A cybersecurity perspective

  • Ramos S
  • Ellul J
N/ACitations
Citations of this article
71Readers
Mendeley users who have this article in their library.

Abstract

The article aims to investigate the potential of blockchain technology in mitigating certain cybersecurity risks associated with artificial intelligence (AI) systems. Aligned with ongoing regulatory deliberations within the European Union (EU) and the escalating demand for more resilient cybersecurity measures within the realm of AI, our analysis focuses on specific requirements outlined in the proposed AI Act. We argue that by leveraging blockchain technology, AI systems can align with some of the requirements in the AI Act, specifically relating to data governance, record-keeping, transparency and access control. The study shows how blockchain can successfully address certain attack vectors related to AI systems, such as data poisoning in trained AI models and data sets. Likewise, the article explores how specific parameters can be incorporated to restrict access to critical AI systems, with private keys enforcing these conditions through tamper-proof infrastructure. Additionally, the article analyses how blockchain can facilitate independent audits and verification of AI system behaviour. Overall, this article sheds light on the potential of blockchain technology in fortifying high-risk AI systems against cyber risks, contributing to the advancement of secure and trustworthy AI deployments. By providing an interdisciplinary perspective of cybersecurity in the AI domain, we aim to bridge the gap that exists between legal and technical research, supporting policy makers in their regulatory decisions concerning AI cyber risk management.

Cite

CITATION STYLE

APA

Ramos, S., & Ellul, J. (2024). Blockchain for Artificial Intelligence (AI): enhancing compliance with the EU AI Act through distributed ledger technology. A cybersecurity perspective. International Cybersecurity Law Review, 5(1), 1–20. https://doi.org/10.1365/s43439-023-00107-9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free