Securing Generative AI: A Survey on the Role of Secure Access Service Edge (SASE) in Mitigating Exploitability


Authors : Padmapriya V; Kaviyaa V; Kaviya B; Rubini S

Volume/Issue : Volume 9 - 2024, Issue 12 - December

Google Scholar : https://tinyurl.com/mrxphwcs

Scribd : https://tinyurl.com/yufurds3

DOI : https://doi.org/10.5281/zenodo.14575878

Abstract : This survey paper explores the intersection of generative AI and network security, emphasizing the role of Secure Access Service Edge (SASE) in addressing challenges. Generative AI’s transformative impact on content creation, analytics, and automation introduces risks like adversarial attacks (e.g., DeepFool), JSON Web Token (JWT) vulnerabilities, and data breaches. Existing security measures struggle with AI’s dynamic nature, highlighting SASE as a unified framework integrating Zero Trust Network Access (ZTNA), Cloud Access Security Broker (CASB), and real-time threat detection. The paper recommends research into Joint Energy-Based Models (JEMs) and collaboration to enhance SASE’s synergy with AI-driven threat intelligence.

Keywords : Generative AI, Secure Access Service Edge (SASE), Zero Trust Network Access (ZTNA), AI-powered Anomaly Detection, JSON Web Tokens (JWT), Adversarial Attacks, Behavioural Analysis, Real-Time Threat Mitigation, Cloud Access Security Broker (CASB), Secure Web Gateway (SWG), DeepFool, Joint Energy-based Model (JEM), Token Misuse, Scalability, Cybersecurity Frameworks.

References :

  1. M. Gupta, C. Akiri, K. Aryal, E. Parker, and L. Praharaj, "From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy," Department of Computer Science, Tennessee Tech University, Cookeville, TN, USA, 2023. http://dx.doi.org/10.48550/arXiv.2307.00691
  2. L. Liu, C. Huang, D. Zhu, D. Liu, J. Ni, and X. S. Shen, "Secure and Distributed Access Control for Dynamic Pervasive Edge Computing Services," in GLOBECOM 2022 - IEEE Global Communications Conference, Rio de Janeiro, Brazil, 2022, pp. 5487-5492. doi: 10.1109/GLOBECOM48099.2022.10000715.
  3. N. Din, M. Waheed, M. Zareei, and F. Alanazi, "An Improved Identity-Based Generalized Signcryption Scheme for Secure Multi-Access Edge Computing Empowered Flying Ad Hoc Networks," IEEE Access, vol. 9, pp. 120704-120714, 2021. doi: 10.1109/ACCESS.2021.3108130.
  4. Y. Xia, J. Zhang, and K. L. Man, "A Survey on Handover Authentication for Multi-Access Edge Computing: Classification, Analysis, and Future Directions," in International Conference on Platform Technology and Service (PlatCon), Busan, Korea Republic, 2023, pp. 79-84. doi: 10.1109/PlatCon60102.2023.10255209.
  5. S. A. Wright, A. Sathyagiri, and R. Tayal, "Machine Learning and the Secure Access Service Edge," in Congress in Computer Science, Computer Engineering & Applied Computing (CSCE), Las Vegas, NV, USA, 2023, pp. 2251-2258. doi: 10.1109/CSCE60160.2023.00367.
  6. J. Liu et al., "SDSS: Secure Data Sharing Scheme for Edge Enabled IoV Networks," IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 11, pp. 12038-12049, Nov. 2023. doi: 10.1109/TITS.2023.3287643.
  7. W. Jin, R. Xu, T. You, Y.-G. Hong, and D. Kim, "Secure Edge Computing Management Based on Independent Microservices Providers for Gateway-Centric IoT Networks," IEEE Access, vol. 8, pp. 187975-187990, 2020. doi: 10.1109/ACCESS.2020.3030297.
  8. S. Saha, B. Bera, A. K. Das, N. Kumar, S. H. Islam, and Y. Park, "Private Blockchain Envisioned Access Control System for Securing Industrial IoT-Based Pervasive Edge Computing," IEEE Access, vol. 11, pp. 130206-130229, 2023. doi: 10.1109/ACCESS.2023.3333441.
  9. L. Yuan et al., "CoopEdge+: Enabling Decentralized Secure and Cooperative Multi-Access Edge Computing Based on Blockchain," IEEE Transactions on Parallel and Distributed Systems, vol. 34, no. 3, pp. 894-908, Mar. 2023. doi: 10.1109/TPDS.2022.3231296.
  10. P. Ranaweera, V. N. Imrith, M. Liyanag, and A. D. Jurcut, "Security as a Service Platform Leveraging Multi-Access Edge Computing Infrastructure Provisions," in IEEE International Conference on Communications (ICC), Dublin, Ireland, 2020, pp. 1-6. doi: 10.1109/ICC40277.2020.9148660.
  11. M. Kim et al., "A Secure Batch Authentication Scheme for Multi-access Edge Computing in 5G-Enabled Intelligent Transportation System," IEEE Access, vol. 10, pp. 96224-96238, 2022. doi: 10.1109/ACCESS.2022.3205001.
  12. Q. Huang, C. Wang, and L. Chen, "Secure and Fine-Grained Flow Control for Subscription-Based Data Services in Cloud-Edge Computing," IEEE Transactions on Services Computing, vol. 16, no. 3, pp. 2165-2177, May-June 2023. doi: 10.1109/TSC.2022.3203378.
  13. Y. Guan, S. Guo, P. Li, and Y. Yang, "Secure and Verifiable Data Access Control Scheme With Policy Update and Computation Outsourcing for Edge Computing," in IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS), Hong Kong, 2020, pp. 398-405. doi: 10.1109/ICPADS51040.2020.00060.
  14. J. P. Queralta, L. Qingqing, Z. Zou, and T. Westerlund, "Enhancing Autonomy with Blockchain and Multi-Access Edge Computing in Distributed Robotic Systems," in Fifth International Conference on Fog and Mobile Edge Computing (FMEC), Paris, France, 2020, pp. 180-187. doi: 10.1109/FMEC49853.2020.9144809.
  15. Khan, A. Ghani, S. M. Saqlain, M. U. Ashraf, A. Alzahrani, and D.-H. Kim, "Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks," IEEE Access, vol. 11, pp. 144560-144573, 2023. doi: 10.1109/ACCESS.2023.3344168.
  16. X. Zhou, D. He, J. Ning, M. Luo, and X. Huang, "AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services," IEEE Transactions on Information Forensics and Security, vol. 18, pp. 290-303, 2023. doi: https://doi.org/10.1109/TMC.2023.332330
  17. Nimeshkumar Patel, "Secure Access Service Edge (Sase): Evaluating The Impact Of Convereged Network Security Architectures In Cloud Computing," © 2024 JETIR March 2024, Volume 11, Issue 3 www.jetir.org(ISSN-2349-5162)
  18. Sivakameni Indran, Najwa Hayaati Mohd Alwi, “Systematic Literature Review on Secure Access Service Edge (SASE) and Zero Trust Network Access (ZTNA) Implementation to Ensure Secure Access,” Journal of Advanced Research in Applied Sciences and Engineering Technology56, Issue 2(2026) 182-19, https://doi.org/10.37934/araset.56.2.182195
  19. Taurai Hungwe and Hein Venter, “An AI Model for Digital Forensic Readiness in the Cloud Using Secure Access Service Edge” Proceedings of the 19th International Conference on Cyber Warfare and Security, ICCWS 2024 https://doi.org/10.34190/iccws.19.1.2132 .
  20. Zohaib S.M., Sajjad, S.M., Iqbal, Z., Yousaf, M., Haseeb, M., Muhammad, Z “Zero Trust VPN (ZT-VPN): A Systematic Literature Review and Cybersecurity Framework for Hybrid and Remote Work,” Information 2024, 15, 734. https://doi.org/10.3390/info15110734

This survey paper explores the intersection of generative AI and network security, emphasizing the role of Secure Access Service Edge (SASE) in addressing challenges. Generative AI’s transformative impact on content creation, analytics, and automation introduces risks like adversarial attacks (e.g., DeepFool), JSON Web Token (JWT) vulnerabilities, and data breaches. Existing security measures struggle with AI’s dynamic nature, highlighting SASE as a unified framework integrating Zero Trust Network Access (ZTNA), Cloud Access Security Broker (CASB), and real-time threat detection. The paper recommends research into Joint Energy-Based Models (JEMs) and collaboration to enhance SASE’s synergy with AI-driven threat intelligence.

Keywords : Generative AI, Secure Access Service Edge (SASE), Zero Trust Network Access (ZTNA), AI-powered Anomaly Detection, JSON Web Tokens (JWT), Adversarial Attacks, Behavioural Analysis, Real-Time Threat Mitigation, Cloud Access Security Broker (CASB), Secure Web Gateway (SWG), DeepFool, Joint Energy-based Model (JEM), Token Misuse, Scalability, Cybersecurity Frameworks.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe