With the adoption of AI at the edge, companies will expand their business into new territories out of their physical control. ChatGPT is a typical example of this adoption acceleration. These new capabilities expose sensitive data, intellectual properties and know-how, critical business processes to potential new cyberthreats. ARCA Trusted OS can help to secure the IT infrastructure on which those AI models and data operate from the core up to the edge. It protects the data confidentiality of edge devices in the field and limits the attack propagation through containerized microservices.
The adoption of artificial intelligence (AI) across industries is growing fast. It is helped by the democratization of many AI tools such as ChatGPT which reached more than 100 million monthly active users in January, just two months after launch, making it the fastest-growing consumer application in history, according to a UBS study. In healthcare, AI is being used for medical diagnosis and drug discovery. In finance, AI can improve credit scoring, fraud detection and risk assessment. In manufacturing, AI is being used to optimize production processes and improve quality control.
AI gets nourished from enormous amounts of data. One of the main sources of data is definitely the edge. By 2025, Gartner predicts 75% of enterprise-generated data will be created and processed outside a traditional data center or cloud. So. it is natural that AI may expand its footprint at the edge. In autonomous vehicles, it makes a safer solution thanks to the rapid data processing enabled by edge AI that allows the system to respond quickly to the world around it. In security cameras, Edge AI’s use of computer vision, object detection and facial recognition makes some security cameras particularly effective. In Smarthome, from video doorbells to voice controlled light bulbs and refrigerators that monitor things like food consumption and expiration dates, smart homes contain a web of IoT devices that are meant to work together to make the residents’ lives easier without the need to send back all the data centrally for processing.
There are indeed mainly advantages to run AI at the edge in terms of privacy and data security, low latency, offline functionality, bandwidth usage reduction, user experience enhancement and customized edge deployments. It expands the range of applications where visual recognition, business logic, intelligent and interactive conversational capabilities,… are required, even in resource-constrained or disconnected environments.
However, deploying edge AI poses some challenges in particular around security. Like other AI models, edge AI has to be trained on a regular and ongoing basis — just using data from edge devices. This often means creating an important data flow from the edge to the cloud or the datacenter, which can be rather complex (bandwidth, connectivity) and requires security features in place. Additionally, the environment on which the edge AI is operating has to be trusted to protect business operation processes and intellectual properties.
Security cameras for access authorization are a growing technology that may be used in many different contexts such as electric power plants, laboratories, hospitals, remote offices,… Often these cases require operations to run offline without Internet connection. In this situation, the visual analytics application, the personal data of the authorized people and the cryptographics elements are hosted locally. These data have to be protected to guarantee their privacy and the integrity of the process to keep its “raison d’etre”.
CYSEC’s ARCA Trusted OS has been specifically designed to provide a full security solution through the whole distributed architecture from the core to the edge. Arca Trusted OS is a hardened Linux-based operating system combined with container management or orchestration systems such as Docker or Kubernetes.
The OS hardening aims at containing system intrusion and avoiding data compromission of containerized services on premise, on the cloud, and in the edge. It provides confidentiality of data collected at the edge, trust in application logic, and ensures attackers cannot use the edge to access your data and compromise your services. In the edge context, ARCA Trusted OS has been designed to run on all x86 architecture hardware from large server up to mini-server such as AMD Ryzen or on some selected ARM architecture hardwares such as STM32 families or Raspberry Pi 4B both able to run containerised applications.
It is a trustworthy OS, designed to protect specific nodes from the core, the cloud and up to the edge. It benefits particularly companies looking to protect sensitive data and mission critical applications such as Edge AI solutions.
Do you want to know more ?
Get more details by exploring the use case of Chat GPT with Arca Trusted OS