PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Improved Association Rule Mining-Based Data Sanitization for Privacy Preservation Model in Cloud

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Data security in cloud services is achieved by imposing a broad range of privacy settings and restrictions. However, the different security techniques used fail to eliminate the hazard of serious data leakage, information loss and other vulnerabilities. Therefore, better security policy requirements are necessary to ensure acceptable data protection levels in the cloud. The two procedures presented in this paper are intended to build a new cloud data security method. Here, sensitive data stored in big datasets is protected from abuse via the data sanitization procedure relying on an improved apriori approach to clean the data. The main objective in this case is to generate a key using an optimization technique known as Corona-integrated Archimedes Optimization with Tent Map Estimation (CIAO-TME). Such a technique deals with both restoration and sanitization of data. The problem of optimizing the data preservation ratio (IPR), the hiding ratio (HR), and the degree of modification (DOM) is formulated and researched as well.
Rocznik
Tom
Strony
51--59
Opis fizyczny
Bibliogr. 31 poz., rys., tab.
Twórcy
  • Department of Computer Science Engineering, GITAM (Deemed to be) University, Hyderabad, Telangana, India
  • Department of Computer Science Engineering, GITAM (Deemed to be) University, Hyderabad, Telangana, India
Bibliografia
  • [1] Y. Wang, A. Zhang, P. Zhang, and H. Wang, “Cloud-assisted HER sharing with security and privacy preservation via consortium blockchain”, IEEE Access, vol. 7, pp. 136704 –136719, 2019 (https://doi.org/10.1109/ACCESS.2019.2943153).
  • [2] X. Yang, M. Wang, X. Wang, G. Chen, and C. Wang, “Stateless cloud auditing scheme for non-manager dynamic group data with privacy preservation”, IEEE Access, vol. 8, pp. 212888 –212903, 2020 (https://doi.org/10.1109/ACCESS.2020.3039981).
  • [3] H. Liu, X. Yao, T. Yang, and H. Ning, “Cooperative privacy preservation for wearable devices in hybrid computing-based smart health”, IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1352–1362, 2019 (https://doi.org/10.1109/JIOT.2018.2843561).
  • [4] H. Yan and W. Gui, “Efficient identity-based public integrity auditing of shared data in cloud storage with user privacy preserving”, IEEE Access, vol. 9, pp. 45822– 45831, 2021 (https://doi.org/10.1109/ACCESS.2021.3066497).
  • [5] C. Xu, N. Wang, L. Zhu, K. Sharif, and C. Zhang, “Achieving searchable and privacy-preserving data sharing for cloud-assisted e-healthcare system”, IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8345–8356 , 2019 (https://doi.org/10.1109/JIOT.2019.2917186).
  • [6] B.A. Jalil, T.M. Hasan, G.S. Mahmood, and H.N. Abed, “A secure and efficient public auditing system of cloud storage based on BLS signature and automatic blocker protocol”, Journal of King Saud University – Computer and Information Sciences, vol. 34, no. 7, pp. 4008–4021 , 2022 (https://doi.org/ 10.1016/j.jksuci.2021.04.001).
  • [7] K. Wang, C.-M. Chen, Z. Tie, M. Shojafar, S. Kumar, and S. Kumari, “Forward privacy preservation in IoT-enabled healthcare systems”, IEEE Transactions on Industrial Informatics, vol. 18, no. 3, pp. 1991–1999, 2022 (https://doi.org/10.1109/TII.2021.3064691).
  • [8] Q. Kong, R. Lu, F. Yin, and S. Cui, “Privacy-preserving continuous data collection for predictive maintenance in vehicular fog-cloud”, IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 8, pp. 5060–5070 , 2021 (https://doi.org/10.1109/TITS.2020.3011931).
  • [9] J. Wang, D. Shi, J. Chen, and C.-C. Liu, “Privacy-preserving hierarchical state estimation in untrustworthy cloud environments”, IEEE Transactions on Smart Grid, vol. 12, no. 2, pp. 1541– 1551, 2021 (https://doi.org/10.1109/TSG.2020.3023891).
  • [10] M. Fernandes, J. Decouchant, M. Völp, F.M. Couto, and P. Esteves Verissimo, “DNA-SeAl: Sensitivity levels to optimize the performance of privacy-preserving DNA alignment”, IEEE Journal of Biomedical and Health Informatics, vol. 24, no. 3, pp. 907– 915, 2020 (https://doi.org/10.1109/JBHI.2019.2914952).
  • [11] R. Li, T. Song, B. Mei, C. Hu, W. Li, M. Larson, X. Cheng, and R. Bie, “A cloud-based framework for verifiable privacy-preserving spectrum auction”, High-Confidence Computing, vol. 2, 2022 (https://doi.org/10.1016/j.hcc.2021.100037).
  • [12] S. Mewada, “Data mining-based privacy preservation technique for medical dataset over horizontal partitioned”, International Journal of E-Health and Medical Communications (IJEHMC), vol. 12, no. 5, pp. 50–66, 2021 (https://doi.org/10.4018/IJEHMC.20210901.oa4).
  • [13] X. Xu, S. Fu, L. Qi, X. Zhang, Q. Liu, Q. He, and S. Li, “An IoT-oriented data placement method with privacy preservation in cloud environment”, Journal of Network and Computer Applications, vol. 124, pp. 148–157, 2018 (https://doi.org/10.1016/j.jnca.2018.09.006).
  • [14] C. Fang, Y. Guo, N. Wang, and A. Ju, “Highly efficient federated learning with strong privacy preservation in cloud computing”, Computers & Security, vol. 96 , Article 101889, 2020 (https://doi.org/10.1016/j.cose.2020.101889).
  • [15] K.M. Prabha and P.V. Saraswathi, “Suppressed K-anonymity multifactor authentication based Schmidt-Samoa cryptography for privacy preserved data access in cloud computing”, Computer Communications, vol. 158, pp. 85– 94, 2020 (https://doi.org/10.1016/j.comcom.2020.04.057).
  • [16] C.-T. Li, D.-H. Shih, and C.-C. Wang, “Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems”, Computer Methods and Programs in Biomedicine, vol. 157, pp. 191–203, 2018 (https://doi.org/10.1016/j.cmpb.2018.02.002).
  • [17] J. Mandala and M.V.P. Chandra Sekhara Rao, “Privacy preservation of data using crow search with adaptive awareness probability”, Journal of Information Security and Applications, vol. 44, pp. 157–169 , 2019 (https://doi.org/10.1016/j.jisa.2018.12.005).
  • [18] D. Ahamad, S.A. Hameed, and M. Akhtar, “A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization”, Journal of King Saud University – Computer and Information Sciences, vol. 34, no. 6, part A, pp. 2343 –2358, 2020 (https://doi.org/10.1016/j.jksuci.2020.10.015).
  • [19] A. Mondal and R.T. Goswami, “Enhanced HoneyPot cryptographic scheme and privacy preservation for an effective prediction in cloud security”, Microprocessors and Microsystems, vol. 81, 2021 (https://doi.org/10.1016/j.micpro.2020.103719).
  • [20] X. Yao, F. Farha, R. Li, I. Psychoula, L. Chen, and H. Ning, “Security and privacy issues of physical objects in the IoT: Challenges and opportunities”, Digital Communications and Networks, vol. 7, no. 3, pp. 373–384, 2021 (https://doi.org/10.1016/j.dcan.2020.09.001).
  • [21] T. Kanwal, A. Anjum, S.U.R. Malik, A. Khan, and M.A. Khan, “Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud”, Computer Standards & Interfaces, vol. 78, 2021 (https://doi.org/10.1016/j.csi.2021.103522).
  • [22] N. Tian, Q. Guo, and H. Sun, “Privacy preservation method for MIQP-based energy management problem: A cloud-edge framework”, Electric Power Systems Research, vol. 190 , 2021 (https://doi.org/10.1016/j.epsr.2020.106850).
  • [23] L. Hernández-Álvarez, J. María de Fuentes, L. González-Manzano, and L.H. Encinas, “SmartCAMPP – Smartphone-based continuous authentication leveraging motion sensors with privacy preservation”, Pattern Recognition Letters, vol. 147, pp. 189– 196, 2021 (https://doi.org/10.1016/j.patrec.2021.04.013).
  • [24] P.J. Sun, “Security and privacy protection in cloud computing: Discussions and challenges”, Journal of Network and Computer Applications, vol. 160 , 2020 (https://doi.org/10.1016/j.jnca.2020.102642).
  • [25] F. A. Hashim, K. Hussain, E.H. Houssein, M.S. Mabrouk, and W. Al-Atabany, “Archimedes optimization algorithm: a new metaheuristic algorithm for solving optimization problems”, Applied Intelligence, vol. 51, pp. 1531– 1551, 2021 (https://doi.org/10.1007/s 10489-020-01893-z).
  • [26] F. Martínez-Álvarez, G. Asencio-Cortés, J.F. Torres, D. Gutiérrez-Avilés, L. Melgar-García, R. Pérez-Chacón, C. Rubio-Escudero, J.C. Riquelme, and A. Troncoso, “Coronavirus optimization algorithm: A bioinspired metaheuristic based on the COVID- 19 propagation model”, Big Data, vol. 8, no. 4, 2020 (https://doi.org/10.1089/big.2020.0051).
  • [27] M.M. Beno, I.R. Valarmathi, S.M. Swamy, and B.R. Rajakumar, “Threshold prediction for segmenting tumour from brain MRI scans”, International Journal of Imaging Systems and Technology, vol. 24, no. 2, pp. 129– 137, 2014 (https://doi.org/10.1002/ima.22087).
  • [28] R. Thomas and M.J.S. Rangachar, “Hybrid optimization based DBN for face recognition using low-resolution images”, Multimedia Research, vol. 1, no. 1, pp. 33–43, 2018 (DOI: 10.46253/j.mr.v1i1.a5).
  • [29] J. Devagnanam and N.M. Elango, “Optimal resource allocation of cluster using hybrid grey wolf and cuckoo search algorithm in cloud computing”, Journal of Networking and Communication Systems, vol. 3, no. 1, pp. 31–40, 2020 (https://doi.org/10.46253/jnacs.v3i1.a4).
  • [30] R.A. Mustafa, H.S. Chyad, and J.R. Mutar, “Enhancement in privacy preservation in cloud computing using apriori algorithm”, Indonesian Journal of Electrical Engineering and Computer Science, vol. 26, no. 3, pp. 1747– 1757, 2022 (https://doi.org/10.11591/ijeecs.v26.i3.pp1747-1757).
  • [31] M.M. Annie Alphonsa and P. Amudhavalli, “Genetically modified glowworm swarm optimization based privacy preservation in cloud computing for healthcare sector”, Evolutionary Intelligence, vol. 11, pp. 101– 116, 2018 (https://doi.org/10.1007/s12065- 018-0162-4).
Uwagi
Opracowanie rekordu ze środków MEiN, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2022-2023).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-e5ea53b1-45a5-4a1e-b932-30ae9a25bde0
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.