Efficient Implementation of AES-256 for Secure Machine Learning Datasets: A Performance and Compatibility Study

Efficient Implementation of AES-256 for Secure Machine Learning Datasets: A Performance and Compatibility Study

  IJETT-book-cover           
  
© 2025 by IJETT Journal
Volume-73 Issue-9
Year of Publication : 2025
Author : Nandini Sharma, Pritaj Yadav
DOI : 10.14445/22315381/IJETT-V73I9P109

How to Cite?
Nandini Sharma, Pritaj Yadav,"Efficient Implementation of AES-256 for Secure Machine Learning Datasets: A Performance and Compatibility Study", International Journal of Engineering Trends and Technology, vol. 73, no. 9, pp.91-99, 2025. Crossref, https://doi.org/10.14445/22315381/IJETT-V73I9P109

Abstract
The present study explores a method combining machine learning with the AES-256-based encryption to protect the datasets while maintaining the accuracy. The presented approach addresses an increasing need for data security in the context of increased cyber threats that particularly focus on healthcare and finance. The AES-256 is one of the well-known algorithms that is susceptible to attempted attacks and ensures confidentiality throughout the transmission and storage to encrypt datasets. The neural network processes the data and attains an accuracy of 87% for binary classification tasks, which validates the effectiveness and compatibility of the model. Different performance indicators demonstrate the seamless trade-off between security and efficiency, which classifies accuracy and encryption overhead. The paper provides a framework customized for the different businesses that require stringent data protection and highlights the significance of handling data safety.

Keywords
Security, AES-256, Machine Learning, Neural Network, Federated Learning.

References
[1] Jagpreet Kaur, Shweta Lamba, and Preeti Saini, “Advanced Encryption Standard: Attacks and Current Research Trends,” 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India, pp. 112-116, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[2] D.M.G. Preethichandra et al., “Passive and Active Exoskeleton Solutions: Sensors, Actuators, Applications, and Recent Trends,” Sensors, vol. 24, no. 21, pp. 1-42, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Yassine Himeur et al., “Applications of Knowledge Distillation in Remote Sensing: A Survey,” Information Fusion, vol. 115, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Oussama Kerdjidj et al., “Uncovering the Potential of Indoor Localization: Role of Deep and Transfer Learning,” IEEE Access, vol. 12, pp. 73980-74010, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Hamed Alqahtani, and Gulshan Kumar, “Machine Learning for Enhancing Transportation Security: A Comprehensive Analysis of Electric and Flying Vehicle Systems,” Engineering Applications of Artificial Intelligence, vol. 129, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Siva Raja Sindiramutty, “Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence,” arXiv Preprint, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Nazish Khalid et al., “Privacy-Preserving Artificial Intelligence in Healthcare: Techniques and Applications,” Computers in Biology and Medicine, vol. 158, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Houda Hafi et al., “Split Federated Learning for 6G Enabled-Networks: Requirements, Challenges and Future Directions,” IEEE Access, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Krishnashree Achuthan et al., “Sustainable Cybersecurity Practices: Past Trends and Future Directions,” SSRN, 2024.
[Google Scholar]
[10] Rishabh Sharma, and Ashish Sharma, Fake Account Detection using the Machine Learning Technique, 1st ed., Smart Computing, pp. 197-203, 2021.
[Google Scholar] [Publisher Link]
[11] Waymond Rodgers, Artificial Intelligence in a Throughput Model: Some Major Algorithms, 1st ed., CRC Press, Boca Raton 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Deafallah Alsadie, “Artificial Intelligence Techniques for Securing fog Computing Environments: Trends, Challenges, and Future Directions,” IEEE Access, vol. 12, pp. 151598-151648, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Fadele Ayotunde Alaba et al., “Internet of Things Security: A Survey,” Journal of Network and Computer Applications, vol. 88, pp. 10-28, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Mosiur Rahaman et al., “Privacy-Centric AI and IoT Solutions for Smart Rural Farm Monitoring and Control,” Sensors, vol. 24, no. 13, pp. 1-24, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Yann LeCun, Yoshua Bengio, and Geoffrey Hinton, “Deep Learning,” Nature, vol. 521, no. 7553, pp. 436-444, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Ian Goodfellow, Yoshua Bengio, and Aaron Courville, Deep Learning, Healthcare Information Research, The MIT Press, Cambridge, MA, USA, 2016.
[Google Scholar]
[17] Sebastian Ruder, “An Overview of Gradient Descent Optimization Algorithms,” arXiv Preprint, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Laith Alzubaidi et al., “Review of Deep Learning: Concepts, CNN Architectures, Challenges, Applications, Future Directions,” Journal of Big Data, vol. 8, no. 1, pp. 1-74, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Nitish Srivastava et al., “Dropout: A Simple Way to Prevent Neural Networks from Overfitting,” The Journal of Machine Learning Research, vol. 15, no. 1, pp. 1929-1958, 2014.
[Google Scholar] [Publisher Link]
[20] Kaiming He et al., “Deep Residual Learning for Image Recognition,” 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, pp. 770-778, 2016.
[Google Scholar] [Publisher Link]
[21] Alexander Kirillov et al., “Segment Anything,” Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), pp. 4015-4026, 2023.
[Google Scholar] [Publisher Link]
[22] Samik Patel et al., “Use of Artificial Intelligence (AI) in Power Sector to Enhance Safety and Performance,” International Journal of Research and Analytical Reviews, vol. 11, no. 2, 2024.
[Google Scholar]
[23] Sunil Gupta, Hitesh Kumar Sharma, and Monit Kapoor, “Artificial Intelligence-Based Cloud Storage for Accessing and Prediction,” Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT), pp. 157-168, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[24] W. Villegas-Ch, and J. García-Ortiz, “Toward a Comprehensive Framework for Ensuring Security and Privacy in Artificial Intelligence,” Electronics, vol. 12, no. 18, pp. 1-17, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Harish Padmanaban, “Privacy-Preserving Architectures for AI/ML Applications: Methods, Balances, and Illustrations,” Journal of Artificial Intelligence General science (JAIGS), vol. 3, no. 1, pp. 235-245, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Keith Bonawitz et al., “Towards Federated Learning at Scale: System Design,” Proceedings of Machine Learning and Systems 1 (MLSys 2019), vol. 1, pp. 374-388, 2019.
[Google Scholar] [Publisher Link]
[27] Harry Chandra Tanuwidjaja et al., “Privacy-Preserving Deep Learning on Machine Learning as a Service-A Comprehensive Survey,” IEEE Access, vol. 8, pp. 167425-167447, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[28] James Bret Michael, “Security and Privacy for Edge Artificial Intelligence,” IEEE Security & Privacy, vol. 19, no. 4, pp. 4-7, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Davide Calvaresi et al., “Erebots: Privacy-Compliant Agent-Based Platform for Multi-Scenario Personalized Health-Assistant Chatbots,” Electronics, vol. 10, no. 6, pp. 4-7, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Samir Vinayak Bayani, Sanjeev Prakash, and Jesu Narkarunai Arasu Malaiyappan, “Unifying Assurance: A Framework for Ensuring Cloud Compliance in AIML Deployment,” Journal of Knowledge Learning and Science Technology, vol. 2, no. 3, pp. 457-472, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Vankamamidi S. Naresh, and Ayyappa D, “PPDNN-CRP: Privacy-Preserving Deep Neural Network Processing for Credit Risk Prediction in Cloud: A Homomorphic Encryption-Based Approach,” Journal of Cloud Computing, vol. 13, no. 1, pp. 1-21, 2024.
[CrossRef] [Google Scholar] [Publisher Link]