Generative AI-based privacy protection and security management mechanism for distributed financial systems
DOI:
https://doi.org/10.4108/eetsis.12262Keywords:
distributed financial system, privacy computing, generative artificial intelligence, access control, anomaly detection, data security, federated learningAbstract
In distributed financial systems, cross-institutional data sharing faces significant security challenges, including sensitive data leakage risks, unauthorized access, and inadequate privacy protection mechanisms. To address these issues, this paper proposes a generative AI-based privacy protection and security management mechanism for distributed financial systems. The proposed method employs a Gradient Penalty Generative Adversarial Network (GP-GAN) to generate privacy-preserving synthetic data that retains the statistical distribution characteristics of original financial data without exposing sensitive information such as account details and transaction records. A blockchain-based fine-grained access control model is constructed to allocate data access permissions according to user roles (ordinary users, financial institution administrators, regulators) and standardize access processes through smart contracts. The Probabilistic Neural Network (PNN) is restructured from risk prediction to abnormal attack detection, enabling real-time identification of side-channel attacks and data injection attacks by analyzing node data transmission characteristics. Furthermore, a game-theoretic weighting method balances multi-node security collaboration and data sharing efficiency. Experimental results demonstrate that the proposed mechanism achieves a privacy protection strength of 92.6%, an access control accuracy of 96.3%, an attack detection recall rate of 89.7%, and an edge node processing latency below 50 ms, effectively ensuring data security in distributed financial systems.
References
[1] Adam S, Setiawan AD, Dewi MP. Robust geothermal investment decisions under uncertainty: An exploratory financial modeling and analysis approach. Energy. 2025;314:134302.
[2] Olorunnimbe K, Viktor H. Ensemble of temporal Transformers for financial time series. J Intell Inf Syst. 2024;62(4):1087.
[3] Hameed J, Huo C, Albasher G, Naeem MA. Revisiting the nexus between financialization and natural resource efficiency through the lens of financial development and green industrial optimization. J Clean Prod. 2024;468:143066.
[4] Freitas WB, Bertini JR. Random walk through a stock network and predictive analysis for portfolio optimization. Expert Syst Appl. 2023;218:119597.
[5] Lyocsa S, Todorova N. What drives the uranium sector risk? The role of attention, economic and geopolitical uncertainty. Energy Econ. 2024;140:107980.
[6] Kandpal B, Backe S, Crespo dGP. Power purchase agreements for plus energy neighbourhoods: Financial risk mitigation through predictive modelling and bargaining theory. Appl Energy. 2024;358:122589.
[7] Siami M, Naderpour M, Ramezani F, Lu J. Risk assessment through big data: An autonomous fuzzy decision support system. IEEE Trans Intell Transp Syst. 2024;25(8):9016-9027.
[8] Surange VG, Bokade SU. Modeling interactions among critical risk factors in the Indian manufacturing industries using ISM and DEMATEL. J Inst Eng India Ser C. 2023;104(1):123-147.
[9] Qayyum M, Ahmad E, Tahir A, Acharya S. Modeling and analysis of the fuzzy-fractional chaotic financial system using the extended He-Mohand algorithm in a fuzzy-Caputo sense. Int J Intell Syst. 2023;2023(Pt.1):3028824.
[10] Veljanovski N, Epin M. Event tree-based risk and financial assessment for power plants. Reliab Eng Syst Saf. 2024;247:110122.
[11] Beccaluva EA, Catania F, Garzotto AF. Predicting developmental language disorders using artificial intelligence and a speech data analysis tool. Hum-Comput Interact. 2024;39(1/2):8-42.
[12] Bordas A, Le Masson P, Thomas M, Weil B. What is generative in generative artificial intelligence? A design-based perspective. Res Eng Des. 2024;35(4):427-443.
[13] Cornwell N, Bilson C, Gepp A, Stern S, Vanstone BJ. The role of data analytics within operational risk management: A systematic review from the financial services and energy sectors. J Oper Res Soc. 2023;74(1):374-402.
[14] Tang HT, Chen DS, Fan GY. Analysis of falsification data behavior using integration Benford law and restricted value model. Comput Simul. 2024;41(8):549-556.
[15] Dorigoni S, Anzalone GA. Production of energy from renewable sources and financial performance of European utilities: A panel-data analysis. Energy Policy. 2024;194:114323.
[16] Kshetri N. Generative artificial intelligence in the financial services industry. Computer. 2024;57(6):102-108.
[17] Yang Q, Liu Y, Chen T, Tong Y. Federated machine learning: Concept and applications. ACM Trans Intell Syst Technol. 2019;10(2):1-19.
[18] He K, Jia D, Ye X, Wang S, Yang X, Yue C. Cross domain and cross application architecture for sharing operational data in distribution networks. In: IEEE. Proceedings of the 2023 IEEE 7th Conference on Energy Internet and Energy System Integration (EI2); 2023 Dec 15-17; Hangzhou, China. Piscataway (NJ): IEEE; 2023. p. 1465-1471.
[19] Akkarajitsakul K, Hossain E, Niyato D. Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game. IEEE Commun Mag. 2011;49(8):120-127.
[20] Bogdanov D, Niitsoo M, Toft T, Willemson J. High-performance secure multi-party computation for data mining applications. Int J Inf Secur. 2012;11(6):403-418.
[21] Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y. Generative adversarial networks. Commun ACM. 2020;63(11):139-144.
[22] Naif JR. Optimized security for blockchain edge-fog systems performance analysis and optimization strategies. Iraqi J Comput Inform. 2025;51(2):144-155.
[23] Abbas S, Ojo S, Bouazzi I, Sampedro GA, Al Hejaili A, Almadhor AS, Kulhánek R. Securing data from side-channel attacks: A graph neural network-based approach for smartphone-based side channel attack detection. IEEE Access. 2024;12:138904-138920.
[24] Aldeen YAAS, Salleh M, Razzaque MA. A comprehensive review on privacy preserving data mining. SpringerPlus. 2015;4(1):694.
[25] AlSalamah S. VCAC: A blockchain-based virtual care access control model for transforming legacy healthcare information systems and EMRs into secure, interoperable patient-centered virtual hospital systems. Information. 2025;16(11):972.
[26] Orthi SM, Rahman MH, Siddiqa KB, Uddin M, Hossain S, Al Mamun A, Khan MN. Federated learning with privacy-preserving big data analytics for distributed healthcare systems. J Comput Sci Technol Stud. 2025;7(8):269-281.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Xiaochuan Tian

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.