Skip to main content
Erschienen in: International Journal of Machine Learning and Cybernetics 3/2024

07.09.2023 | Original Article

A novel model for enhancing cloud security and data deduplication using fuzzy and refraction learning based chimp optimization

verfasst von: Mohanaprakash Thottipalayam Andavan, M. Parameswari, Nalini Subramanian, Nirmalrani Vairaperumal

Erschienen in: International Journal of Machine Learning and Cybernetics | Ausgabe 3/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, the digitalization process generates an enormous amount of multimedia data that turn out to be further difficult to manage. The current developments in big data technology and the cloud computing (CC) field produce massive growth in cloud data. The accessible memory space was used by the enormous replication data and generates the highest computation cost which is the most important problem in the constrained cloud storage space. Therefore, in this study, we introduced a novel secure cloud data deduplication (SCDD) approach to improve data security and data storage of the cloud environment by generating optimal key and deduplicating files respectively. The proposed approach mainly focuses on reducing computational cost and memory utilization of the cloud application. Here, the utilized data files are encrypted using the proxy re-encryption approach, and the refraction learning-based chimp optimization (RL-CO) algorithm is utilized for optimal key generation process as a result it guarantees better cloud security to the end users to store data on the cloud. Subsequently, the optimal verified fuzzy keyword search (OVFKS) approach is proposed to eliminate duplicate files or copies of actual data thereby enhancing the cloud storage space considerably. The proposed secure cloud data deduplication-based optimal verified fuzzy keyword search (SCDD-OVFKS)approach utilizes three different data files namely android application data, audio files, and mixed application data files, audio files, and other relevant files as the input. Furthermore, the proposed approach’s performance is validated using different performance measures namely computational time, computational cost, search time cost, memory utilization, and deduplication rate by examining other state-of-art approaches. As a result, the proposed SCDD-OVFKS approach achieves a maximum deduplication rate of about 28.6% for 8 MB along with minimum computational cost and reduced memory utilization than other state-of-art approaches.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Abualigah L, Alkhrabsheh M (2022) Amended hybrid multi-verse optimizer with genetic algorithm for solving task scheduling problem in cloud computing. J Supercomput 78(1):740–765CrossRef Abualigah L, Alkhrabsheh M (2022) Amended hybrid multi-verse optimizer with genetic algorithm for solving task scheduling problem in cloud computing. J Supercomput 78(1):740–765CrossRef
2.
Zurück zum Zitat Agrawal N, Tapaswi S (2019) Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges. IEEE Commun Surv Tutor 21(4):3769–3795CrossRef Agrawal N, Tapaswi S (2019) Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges. IEEE Commun Surv Tutor 21(4):3769–3795CrossRef
3.
Zurück zum Zitat Aoudni Y, Donald C, Farouk A, Sahay KB, Babu DV, Tripathi V, Dhabliya D (2022) Cloud security based attack detection using transductive learning integrated with Hidden Markov Model. Pattern Recogn Lett 157:16–26ADSCrossRef Aoudni Y, Donald C, Farouk A, Sahay KB, Babu DV, Tripathi V, Dhabliya D (2022) Cloud security based attack detection using transductive learning integrated with Hidden Markov Model. Pattern Recogn Lett 157:16–26ADSCrossRef
4.
Zurück zum Zitat Athira AR, Sasikala P (2022) Secure Data Deduplication and data portability in distributed cloud server using hash chaining and LF-WDO. Wirel Perso Commun, pp 1–13 Athira AR, Sasikala P (2022) Secure Data Deduplication and data portability in distributed cloud server using hash chaining and LF-WDO. Wirel Perso Commun, pp 1–13
5.
Zurück zum Zitat Boghe K, De Grove F, Herrewijn L, De Marez L (2020) Scraping application data from the web—addressing the temporality of online repositories when working with trace data. In: Extended abstract presented at the 70th International Communication Association Conference Boghe K, De Grove F, Herrewijn L, De Marez L (2020) Scraping application data from the web—addressing the temporality of online repositories when working with trace data. In: Extended abstract presented at the 70th International Communication Association Conference
6.
Zurück zum Zitat Boghe K, Herrewijn L, De Grove F, Van Gaeveren K, De Marez L (2020) Exploring the effect of in-game purchases on mobile game use with smartphone trace data. Media Commun 8(3):219–230CrossRef Boghe K, Herrewijn L, De Grove F, Van Gaeveren K, De Marez L (2020) Exploring the effect of in-game purchases on mobile game use with smartphone trace data. Media Commun 8(3):219–230CrossRef
7.
Zurück zum Zitat Chen H, Zhu X, Qiu D, Liu L, Du Z (2017) Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds. IEEE Trans Parallel Distrib Syst 28(9):2674–2688CrossRef Chen H, Zhu X, Qiu D, Liu L, Du Z (2017) Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds. IEEE Trans Parallel Distrib Syst 28(9):2674–2688CrossRef
8.
Zurück zum Zitat Chen Y, Xie H, Lv K, Wei S, Hu C (2019) DEPLEST: a blockchain-based privacy-preserving distributed database toward user behaviors in social networks. Inf Sci 501:100–117CrossRef Chen Y, Xie H, Lv K, Wei S, Hu C (2019) DEPLEST: a blockchain-based privacy-preserving distributed database toward user behaviors in social networks. Inf Sci 501:100–117CrossRef
9.
Zurück zum Zitat Ebinazer SE, Savarimuthu N (2021) An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment. Peer-to-Peer Netw Appl 14(4):2443–2451CrossRef Ebinazer SE, Savarimuthu N (2021) An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment. Peer-to-Peer Netw Appl 14(4):2443–2451CrossRef
10.
Zurück zum Zitat El Ghazouani M, Latifa ER, El Khanboubi Y (2020) Efficient method based on blockchain ensuring data integrity auditing with deduplication in cloud El Ghazouani M, Latifa ER, El Khanboubi Y (2020) Efficient method based on blockchain ensuring data integrity auditing with deduplication in cloud
11.
Zurück zum Zitat ElkanaEbinazer S, Savarimuthu N, Mary SairaBhanu S (2021) ESKEA: enhanced symmetric key encryption algorithm based secure data storage in cloud networks with data deduplication. Wirel Pers Commun 117(4):3309–3325CrossRef ElkanaEbinazer S, Savarimuthu N, Mary SairaBhanu S (2021) ESKEA: enhanced symmetric key encryption algorithm based secure data storage in cloud networks with data deduplication. Wirel Pers Commun 117(4):3309–3325CrossRef
12.
Zurück zum Zitat Emanuele C et al (2020) TinySOL: An audio dataset of isolated musical notes, Zenodo. https://zenodo.org/record/3685367#.Y7FJqdJBwUE. Accessed 19 June 2023 Emanuele C et al (2020) TinySOL: An audio dataset of isolated musical notes, Zenodo. https://​zenodo.​org/​record/​3685367#.Y7FJqdJBwUE. Accessed 19 June 2023
13.
Zurück zum Zitat Ge X, Yu J, Hu C, Zhang H, Hao R (2018) Enabling efficient verifiable fuzzy keyword search over encrypted data in cloud computing. IEEE Access 6:45725–45739CrossRef Ge X, Yu J, Hu C, Zhang H, Hao R (2018) Enabling efficient verifiable fuzzy keyword search over encrypted data in cloud computing. IEEE Access 6:45725–45739CrossRef
14.
Zurück zum Zitat Gopalakrishnan K (2020) Security vulnerabilities and issues of traditional wireless sensors networks in IoT. In: Peng S-L, Pal S, Huang L (eds) Principles of internet of things (IoT) ecosystem: Insight paradigm. Springer, Cham, pp 519–549 Gopalakrishnan K (2020) Security vulnerabilities and issues of traditional wireless sensors networks in IoT. In: Peng S-L, Pal S, Huang L (eds) Principles of internet of things (IoT) ecosystem: Insight paradigm. Springer, Cham, pp 519–549
15.
Zurück zum Zitat Hababeh I, Gharaibeh A, Nofal S, Khalil I (2018) An integrated methodology for big data classification and security for improving cloud systems data mobility. IEEE Access 7:9153–9163CrossRef Hababeh I, Gharaibeh A, Nofal S, Khalil I (2018) An integrated methodology for big data classification and security for improving cloud systems data mobility. IEEE Access 7:9153–9163CrossRef
17.
Zurück zum Zitat Hema S, Kangaiammal A (2021) A secure method for managing data in cloud storage using deduplication and enhanced fuzzy based intrusion detection framewor. Elem Educ Online 20(5):24–36 Hema S, Kangaiammal A (2021) A secure method for managing data in cloud storage using deduplication and enhanced fuzzy based intrusion detection framewor. Elem Educ Online 20(5):24–36
18.
Zurück zum Zitat Kan J, Zhang J, Liu D, Huang X (2022) Proxy re-encryption scheme for decentralized storage networks. Appl Sci 12(9):4260CrossRef Kan J, Zhang J, Liu D, Huang X (2022) Proxy re-encryption scheme for decentralized storage networks. Appl Sci 12(9):4260CrossRef
19.
Zurück zum Zitat Li J, Qin C, Lee PP, Li J (2016) Rekeying for encrypted deduplication storage. In: 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp 618–629. IEEE Li J, Qin C, Lee PP, Li J (2016) Rekeying for encrypted deduplication storage. In: 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp 618–629. IEEE
20.
Zurück zum Zitat Liu X, Lu T, He X, Yang X, Niu S (2020) Verifiable attribute-based keyword search over encrypted cloud data supporting data deduplication. IEEE Access 8:52062–52074CrossRef Liu X, Lu T, He X, Yang X, Niu S (2020) Verifiable attribute-based keyword search over encrypted cloud data supporting data deduplication. IEEE Access 8:52062–52074CrossRef
21.
Zurück zum Zitat Mageshkumar N, Lakshmanan L (2022) An improved secure file deduplication avoidance using CKHO based deep learning model in a cloud environment. J Supercomput, pp 1–27 Mageshkumar N, Lakshmanan L (2022) An improved secure file deduplication avoidance using CKHO based deep learning model in a cloud environment. J Supercomput, pp 1–27
23.
Zurück zum Zitat Mahesh B, Pavan Kumar K, Ramasubbareddy S, Swetha E (2020) A review on data deduplication techniques in cloud. In: Embedded systems and artificial intelligence, pp 825–833 Mahesh B, Pavan Kumar K, Ramasubbareddy S, Swetha E (2020) A review on data deduplication techniques in cloud. In: Embedded systems and artificial intelligence, pp 825–833
24.
Zurück zum Zitat Mi B, Li Y, Darong H, Wei T, Zou Q (2020) Secure data de-duplication based on threshold blind signature and bloom filter in internet of things. IEEE Access 8:167113–167122CrossRef Mi B, Li Y, Darong H, Wei T, Zou Q (2020) Secure data de-duplication based on threshold blind signature and bloom filter in internet of things. IEEE Access 8:167113–167122CrossRef
25.
Zurück zum Zitat Mohiyuddin A, Javed AR, Chakraborty C, Rizwan M, Shabbir M, Nebhen J (2022) Secure cloud storage for medical IoT data using adaptive neuro-fuzzy inference system. Int J Fuzzy Syst 24(2):1203–1215CrossRef Mohiyuddin A, Javed AR, Chakraborty C, Rizwan M, Shabbir M, Nebhen J (2022) Secure cloud storage for medical IoT data using adaptive neuro-fuzzy inference system. Int J Fuzzy Syst 24(2):1203–1215CrossRef
26.
Zurück zum Zitat Papaioannou M, Karageorgou M, Mantas G, Sucasas V, Essop I, Rodriguez J, Lymberopoulos D (2022) A survey on security threats and countermeasures in internet of medical things (IoMT). Trans Emerg Telecommun Technol 33(6):e4049CrossRef Papaioannou M, Karageorgou M, Mantas G, Sucasas V, Essop I, Rodriguez J, Lymberopoulos D (2022) A survey on security threats and countermeasures in internet of medical things (IoMT). Trans Emerg Telecommun Technol 33(6):e4049CrossRef
27.
Zurück zum Zitat Periasamy JK, Latha B (2020) An enhanced secure content de-duplication identification and prevention (ESCDIP) algorithm in cloud environment. Neural Comput Appl 32(2):485–494CrossRef Periasamy JK, Latha B (2020) An enhanced secure content de-duplication identification and prevention (ESCDIP) algorithm in cloud environment. Neural Comput Appl 32(2):485–494CrossRef
28.
Zurück zum Zitat Periasamy JK, Latha B (2021) Efficient hash function–based duplication detection algorithm for data deduplication deduction and reduction. Concurr Comput Pract Exp 33(3):e5213CrossRef Periasamy JK, Latha B (2021) Efficient hash function–based duplication detection algorithm for data deduplication deduction and reduction. Concurr Comput Pract Exp 33(3):e5213CrossRef
29.
Zurück zum Zitat Usharani S, Dhanalakshmi K, Dhanalakshmi N (2020) De-duplication techniques in centralised billing systems. Int J Sci Technol Res 9(1):2602–2606 Usharani S, Dhanalakshmi K, Dhanalakshmi N (2020) De-duplication techniques in centralised billing systems. Int J Sci Technol Res 9(1):2602–2606
30.
Zurück zum Zitat Zhang Q, Du S, Zhang Y, Wu H, Duan K, Lin Y (2022) A novel chimp optimization algorithm with refraction learning and its engineering applications. Algorithms 15(6):189CrossRef Zhang Q, Du S, Zhang Y, Wu H, Duan K, Lin Y (2022) A novel chimp optimization algorithm with refraction learning and its engineering applications. Algorithms 15(6):189CrossRef
31.
Zurück zum Zitat Zhang X, Yang Y, Li T, Zhang Y, Wang H, Fujita H (2021) CMC: a consensus multi-view clustering model for predicting Alzheimer’s disease progression. Comput Methods Programs Biomed 199:105895CrossRefPubMed Zhang X, Yang Y, Li T, Zhang Y, Wang H, Fujita H (2021) CMC: a consensus multi-view clustering model for predicting Alzheimer’s disease progression. Comput Methods Programs Biomed 199:105895CrossRefPubMed
Metadaten
Titel
A novel model for enhancing cloud security and data deduplication using fuzzy and refraction learning based chimp optimization
verfasst von
Mohanaprakash Thottipalayam Andavan
M. Parameswari
Nalini Subramanian
Nirmalrani Vairaperumal
Publikationsdatum
07.09.2023
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Machine Learning and Cybernetics / Ausgabe 3/2024
Print ISSN: 1868-8071
Elektronische ISSN: 1868-808X
DOI
https://doi.org/10.1007/s13042-023-01953-z

Weitere Artikel der Ausgabe 3/2024

International Journal of Machine Learning and Cybernetics 3/2024 Zur Ausgabe

Neuer Inhalt