Skip to main content
Erschienen in: Cluster Computing 1/2019

06.02.2018

Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud

verfasst von: Ashok George, A. Sumathi

Erschienen in: Cluster Computing | Sonderheft 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud systems are powerful computing resources used inevitably for data subscription and publication. Even though the cloud platform can handle the huge volume of data, privacy becomes a critical issue during data publishing. Hence, an effective technique for the privacy preservation of the data is required in the cloud computing environment. Accordingly, this paper proposes a technique for privacy protection using the dyadic product and an optimization algorithm. The privacy of the original database is protected by the construction of privacy preserved database using a dyadic square matrix obtained taking the dyadic product of two vectors, namely sensitive-utility (SU) coefficient and cumulative data key product. The selection of SU coefficient vector is based on the proposed (Crow search based Lion) C-Lion algorithm, which is designed by combining crow search algorithm with lion algorithm. The fitness of the proposed C-Lion algorithm is designed based on privacy and utility for the feasible selection of SU coefficient vector. The performance of the proposed privacy protection technique based on the C-Lion algorithm is evaluated using two factors, privacy, and utility. The experimental analysis shows that the proposed technique could attain the maximum utility of 0.909 with privacy 0.864 for the breast cancer dataset.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy- preserving public auditing for storage security in cloud computing. In: Proceedings of IEEE INFOCOM (2010) Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy- preserving public auditing for storage security in cloud computing. In: Proceedings of IEEE INFOCOM (2010)
2.
Zurück zum Zitat Bhagyashri, S., Gurav, Y.B.: Privacy-preserving public auditing for secure cloud storage. IOSR J. Comput. Eng. 16(4), 33–38 (2014)CrossRef Bhagyashri, S., Gurav, Y.B.: Privacy-preserving public auditing for secure cloud storage. IOSR J. Comput. Eng. 16(4), 33–38 (2014)CrossRef
3.
Zurück zum Zitat Satapathy, S.C., Bhateja, V., Raju, K.S., Janakiramaiah, B.: Computer communication. Networking and internet security. In: Proceedings of IC3T, vol. 5 (2016) Satapathy, S.C., Bhateja, V., Raju, K.S., Janakiramaiah, B.: Computer communication. Networking and internet security. In: Proceedings of IC3T, vol. 5 (2016)
4.
Zurück zum Zitat Prakash, M., Singaravel, G.: An approach for prevention of privacy breach and information leakage in sensitive data mining. Comput. Electr. Eng. 45, 134–140 (2015)CrossRef Prakash, M., Singaravel, G.: An approach for prevention of privacy breach and information leakage in sensitive data mining. Comput. Electr. Eng. 45, 134–140 (2015)CrossRef
5.
Zurück zum Zitat Torra, V.: Privacy in data mining. In: Handbook of Data Mining, Human Factor and Ergonomics (2009) Torra, V.: Privacy in data mining. In: Handbook of Data Mining, Human Factor and Ergonomics (2009)
6.
Zurück zum Zitat Herranz, J., Nin, J., Rodrıguez, P., Tassa, T.: Revisiting distance-based record linkage for privacy-preserving release of statistical datasets. Data Knowl. Eng. 100, 78–93 (2015)CrossRef Herranz, J., Nin, J., Rodrıguez, P., Tassa, T.: Revisiting distance-based record linkage for privacy-preserving release of statistical datasets. Data Knowl. Eng. 100, 78–93 (2015)CrossRef
7.
Zurück zum Zitat Inan, A., Saygin, Y., Savas, E., Hintoglu, A., Levi, A.: Privacy preserving clustering on horizontally partitioned data. Data Knowl. Eng. 63(3), 646–666 (2007)CrossRef Inan, A., Saygin, Y., Savas, E., Hintoglu, A., Levi, A.: Privacy preserving clustering on horizontally partitioned data. Data Knowl. Eng. 63(3), 646–666 (2007)CrossRef
8.
Zurück zum Zitat Li, T., Li, N., Zhang, J., Molloy, I.: Slicing: a new approach for privacy preserving data publishing. IEEE Trans. Knowl. Data Eng. 24(3), 561–574 (2012)CrossRef Li, T., Li, N., Zhang, J., Molloy, I.: Slicing: a new approach for privacy preserving data publishing. IEEE Trans. Knowl. Data Eng. 24(3), 561–574 (2012)CrossRef
9.
Zurück zum Zitat Pinkas, B.: Cryptographic techniques for privacy preserving data mining. ACM SIGKDD Explor. Newsl. 4(2), 12–19 (2002)CrossRef Pinkas, B.: Cryptographic techniques for privacy preserving data mining. ACM SIGKDD Explor. Newsl. 4(2), 12–19 (2002)CrossRef
10.
Zurück zum Zitat Yuan, J., Yu, S.: Efficient privacy-preserving biometric identification in cloud computing. In: Proceedings of IEEE INFOCOM (2013) Yuan, J., Yu, S.: Efficient privacy-preserving biometric identification in cloud computing. In: Proceedings of IEEE INFOCOM (2013)
11.
Zurück zum Zitat Li, M., Yu, S., Cao, N., Lou, W.: Authorized private keyword search over encrypted data in cloud computing. In: Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS) (2011) Li, M., Yu, S., Cao, N., Lou, W.: Authorized private keyword search over encrypted data in cloud computing. In: Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS) (2011)
12.
Zurück zum Zitat Karlekar, N.P., Gomathi, N.: Kronecker product and bat algorithm-based coefficient generation for privacy protection on cloud. Int. J. Model. Simul. Sci. Comput. 8(4), 1750021 (2017)CrossRef Karlekar, N.P., Gomathi, N.: Kronecker product and bat algorithm-based coefficient generation for privacy protection on cloud. Int. J. Model. Simul. Sci. Comput. 8(4), 1750021 (2017)CrossRef
13.
Zurück zum Zitat Gehrke, J.: Models and methods for privacy-preserving data publishing and analysis. In: Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 316–316 (2006) Gehrke, J.: Models and methods for privacy-preserving data publishing and analysis. In: Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 316–316 (2006)
14.
Zurück zum Zitat Yang, Z., Zhong, S., Wright, R.N.: Anonymity-preserving data collection. In: Proceedings of the 11th ACM SIGKDD Conference on Knowledge discovery in data mining, pp. 334–343 (2005) Yang, Z., Zhong, S., Wright, R.N.: Anonymity-preserving data collection. In: Proceedings of the 11th ACM SIGKDD Conference on Knowledge discovery in data mining, pp. 334–343 (2005)
15.
Zurück zum Zitat Warner, S.L.: Randomized response: a survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc. 60(309), 63–69 (1965)CrossRefMATH Warner, S.L.: Randomized response: a survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc. 60(309), 63–69 (1965)CrossRefMATH
16.
Zurück zum Zitat Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM CACM 24(2), 84–90 (1981)CrossRef Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM CACM 24(2), 84–90 (1981)CrossRef
17.
Zurück zum Zitat Jakobsson, M., Juels, A., Rivest, R.L.: Making mix nets robust for electronic voting by randomized partial checking. In: Proceedings of the 11th USENIX Security Symposium, pp. 339–353 (2002) Jakobsson, M., Juels, A., Rivest, R.L.: Making mix nets robust for electronic voting by randomized partial checking. In: Proceedings of the 11th USENIX Security Symposium, pp. 339–353 (2002)
18.
Zurück zum Zitat Fung, B., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 14 (2010)CrossRef Fung, B., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 14 (2010)CrossRef
19.
Zurück zum Zitat Yang, K., Zhang, K., Jia, X., Hasan, M.A., Shen, X.S.: Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms. Inf. Sci. 387, 116–131 (2017)MathSciNetCrossRef Yang, K., Zhang, K., Jia, X., Hasan, M.A., Shen, X.S.: Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms. Inf. Sci. 387, 116–131 (2017)MathSciNetCrossRef
20.
Zurück zum Zitat Fahad, A., Tari, Z., Almalawi, A., Goscinski, A., Khalil, I., Mahmood, A.: PPFSCADA: privacy preserving framework for SCADA data publishing. Future Gener. Comput. Syst. 37, 496–511 (2014)CrossRef Fahad, A., Tari, Z., Almalawi, A., Goscinski, A., Khalil, I., Mahmood, A.: PPFSCADA: privacy preserving framework for SCADA data publishing. Future Gener. Comput. Syst. 37, 496–511 (2014)CrossRef
21.
Zurück zum Zitat Yang, K., Jia, X., Zhang, K., Shen, X.S.: Privacy-preserving data publish-subscribe service on cloud-based platforms. In: IACR Cryptology ePrint Archive, pp. 1–10 (2014) Yang, K., Jia, X., Zhang, K., Shen, X.S.: Privacy-preserving data publish-subscribe service on cloud-based platforms. In: IACR Cryptology ePrint Archive, pp. 1–10 (2014)
22.
Zurück zum Zitat Zhang, H., Zhou, Z., Ye, L., Xiaojiang, D.U.: Towards privacy preserving publishing of set-valued data on hybrid cloud. IEEE Trans. Cloud Comput. 99, 1–14 (2015)CrossRef Zhang, H., Zhou, Z., Ye, L., Xiaojiang, D.U.: Towards privacy preserving publishing of set-valued data on hybrid cloud. IEEE Trans. Cloud Comput. 99, 1–14 (2015)CrossRef
23.
Zurück zum Zitat Chandramohan, D., Vengattaraman, T., Dhavachelvan, P.: A secure data privacy preservation for on-demand cloud service. J. King Saud Univ.-Eng. Sci. 29(2), 144–150 (2017) Chandramohan, D., Vengattaraman, T., Dhavachelvan, P.: A secure data privacy preservation for on-demand cloud service. J. King Saud Univ.-Eng. Sci. 29(2), 144–150 (2017)
24.
Zurück zum Zitat Kulkarni, Y.R., Murugan, T.S.: C-mixture and multi-constraints based genetic algorithm for collaborative data publishing. J. King Saud Univ.-Comput. Inf. Sci. (2016) Kulkarni, Y.R., Murugan, T.S.: C-mixture and multi-constraints based genetic algorithm for collaborative data publishing. J. King Saud Univ.-Comput. Inf. Sci. (2016)
25.
Zurück zum Zitat Askarzadeh, A.: A novel metaheuristic method for solving constrained engineering optimization problems: crow search algorithm. Comput. Struct. 169, 1–12 (2016)CrossRef Askarzadeh, A.: A novel metaheuristic method for solving constrained engineering optimization problems: crow search algorithm. Comput. Struct. 169, 1–12 (2016)CrossRef
26.
Zurück zum Zitat Rajakumar, B.R.: Lion algorithm for standard and large scale bilinear system identification: a global optimization based on lion’s social behavior. In: IEEE Congress on Evolutionary Computation (CEC) July 6–11, Beijing, China (2014) Rajakumar, B.R.: Lion algorithm for standard and large scale bilinear system identification: a global optimization based on lion’s social behavior. In: IEEE Congress on Evolutionary Computation (CEC) July 6–11, Beijing, China (2014)
27.
Zurück zum Zitat Zhang, J.: Visualization for Information Retrieval, pp. 21–46. Springer, New York (2008)CrossRef Zhang, J.: Visualization for Information Retrieval, pp. 21–46. Springer, New York (2008)CrossRef
33.
Zurück zum Zitat Yang, X.S.: A new metaheuristic bat-inspired algorithm. In: Gonzalez, J.R. (ed.) Nature Inspired Cooperative Strategies for Optimization (NISCO 2010), Studies in Computational Intelligence, vol. 284, pp. 65–74. Springer, Berlin (2010) Yang, X.S.: A new metaheuristic bat-inspired algorithm. In: Gonzalez, J.R. (ed.) Nature Inspired Cooperative Strategies for Optimization (NISCO 2010), Studies in Computational Intelligence, vol. 284, pp. 65–74. Springer, Berlin (2010)
Metadaten
Titel
Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud
verfasst von
Ashok George
A. Sumathi
Publikationsdatum
06.02.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 1/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1589-6

Weitere Artikel der Sonderheft 1/2019

Cluster Computing 1/2019 Zur Ausgabe