Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 2/2024

06-02-2024

A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm

Authors: Sahaya Stalin Jose G, Sugitha G, Ayshwarya Lakshmi S, Preethi B. C

Published in: Peer-to-Peer Networking and Applications | Issue 2/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Maximizing the security of the cloud system is most important need of this world. Similarly, the data controllers are also increased stealing the sensitive and personal data from the cloud computing system. A repeated data violation occurs due to a large amount of outsourced and unsecured sensitive data. At present, numerous research works have been performed to secure the data in the cloud, but sometimes they do not succeed in securing the sensitive data. A Multi-Objective Privacy Preservation Model for Cloud Security utilizing Hunter Prey Optimization approach is proposed in this paper. Initially, the data is taken from 5 types of dataset like, concrete, Heart disease, Super Conductivity, Air Quality and wholesale customer datasets. The input data is given to the sanitization of data and restoration stage. In sanitization of data and restoration phase, SMA is utilized. After preventing the leakage in the data sanitization and restoration stage, the input data is applied to the key generation phase. Multi-objective functions such as the preservation of information ratio, the ratio of hiding, and the modification degree are performed at the key generation stage with the help of the hunter prey optimization algorithm to improve cloud data security. The proposed MOPP-CS-HPOA method is evaluated under some performances metrics, like modification degree, ratio of hiding, information preservation ratio, key sensitivity and computational time. Then the proposed MOPP-CS-HPOA method attains 35.69%, 38.504% and 31.805% higher information preservation ratio; 39.52%, 30.28% and 38.14% higher hiding ratio; analysed with MOPP-CS-JSSO, MOPP-CS-PS-BMFO and MOPP-CS-SVM-KNN-RF-NB-ANN methods.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Shaik I, Chandran N (2022) Privacy and data protection in the enterprise world. CSI Transactions on ICT 10(1):37–45CrossRef Shaik I, Chandran N (2022) Privacy and data protection in the enterprise world. CSI Transactions on ICT 10(1):37–45CrossRef
2.
go back to reference Shanmugapriya P (2022) DLFPM-SSO-PE: privacy-preserving and security of intermediate data in cloud storage. Distrib Parallel Databases 40(4):815–833CrossRef Shanmugapriya P (2022) DLFPM-SSO-PE: privacy-preserving and security of intermediate data in cloud storage. Distrib Parallel Databases 40(4):815–833CrossRef
3.
go back to reference Anand K, Vijayaraj A, Vijay Anand M (2021) An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud. Peer-to-Peer Netw Appl 15(4):2007–2020CrossRef Anand K, Vijayaraj A, Vijay Anand M (2021) An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud. Peer-to-Peer Netw Appl 15(4):2007–2020CrossRef
4.
go back to reference Xu Y, Mohammed AH (2023) An energy-aware resource management method in cloud-based Internet of Things using a multi-objective algorithm and crowding distance. Trans Emer Telecommun Technol 34(1):e4673CrossRef Xu Y, Mohammed AH (2023) An energy-aware resource management method in cloud-based Internet of Things using a multi-objective algorithm and crowding distance. Trans Emer Telecommun Technol 34(1):e4673CrossRef
5.
go back to reference Yang M, Ma H, Wei S, Zeng Y, Chen Y, Hu Y (2020) A multi-objective task scheduling method for fog computing in cyber-physical-social services. IEEE Access 8:65085–65095CrossRef Yang M, Ma H, Wei S, Zeng Y, Chen Y, Hu Y (2020) A multi-objective task scheduling method for fog computing in cyber-physical-social services. IEEE Access 8:65085–65095CrossRef
6.
go back to reference Wang Z, Qin J, Xiang X, Tan Y, Peng J (2023) A privacy-preserving cross-media retrieval on encrypted data in cloud computing. J Inf Secur Appl 73:103440CrossRef Wang Z, Qin J, Xiang X, Tan Y, Peng J (2023) A privacy-preserving cross-media retrieval on encrypted data in cloud computing. J Inf Secur Appl 73:103440CrossRef
7.
go back to reference Bhuyan HK, Ravi V, Yadav MS (2022) Multi-objective optimization-based privacy in data mining. Clust Comput 25(6):4275–4287CrossRef Bhuyan HK, Ravi V, Yadav MS (2022) Multi-objective optimization-based privacy in data mining. Clust Comput 25(6):4275–4287CrossRef
8.
go back to reference Bingu R, Jothilakshmi S, Srinivasu N (2022) A comprehensive review on security and privacy preservation in cloud environment. Sustain Commun Netw Appl: Proceedings of ICSCN 2021:719–738CrossRef Bingu R, Jothilakshmi S, Srinivasu N (2022) A comprehensive review on security and privacy preservation in cloud environment. Sustain Commun Netw Appl: Proceedings of ICSCN 2021:719–738CrossRef
9.
go back to reference Biswas C, Ganguly D, Mukherjee PS, Bhattacharya U, Hou Y (2022) Privacy-aware supervised classification: An informative subspace based multi-objective approach. Pattern Recogn 122:108301CrossRef Biswas C, Ganguly D, Mukherjee PS, Bhattacharya U, Hou Y (2022) Privacy-aware supervised classification: An informative subspace based multi-objective approach. Pattern Recogn 122:108301CrossRef
10.
go back to reference Boulemtafes A, Derhab A, Challal Y (2020) A review of privacy-preserving techniques for deep learning. Neurocomputing 384:21–45CrossRef Boulemtafes A, Derhab A, Challal Y (2020) A review of privacy-preserving techniques for deep learning. Neurocomputing 384:21–45CrossRef
11.
go back to reference Sathya A, Raja SKS (2021) Privacy preservation-based access control intelligence for cloud data storage in smart healthcare infrastructure. Wireless Pers Commun 118:3595–3614CrossRef Sathya A, Raja SKS (2021) Privacy preservation-based access control intelligence for cloud data storage in smart healthcare infrastructure. Wireless Pers Commun 118:3595–3614CrossRef
12.
go back to reference Denis R, Madhubala P (2021) Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems. Multimed Tools Appl 80:21165–21202CrossRef Denis R, Madhubala P (2021) Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems. Multimed Tools Appl 80:21165–21202CrossRef
13.
go back to reference Xu X, Fu S, Li W, Dai F, Gao H, Chang V (2020) Multi-objective data placement for workflow management in cloud infrastructure using NSGA-II. IEEE Trans Emerg Topics Comput Intell 4(5):605–615CrossRef Xu X, Fu S, Li W, Dai F, Gao H, Chang V (2020) Multi-objective data placement for workflow management in cloud infrastructure using NSGA-II. IEEE Trans Emerg Topics Comput Intell 4(5):605–615CrossRef
14.
go back to reference Wen D, Zheng S, Chen J, Zheng Z, Ding C, Zhang L (2023) Hyperparameter-optimization-inspired long short-term memory network for air quality grade prediction. Information 14(4):243CrossRef Wen D, Zheng S, Chen J, Zheng Z, Ding C, Zhang L (2023) Hyperparameter-optimization-inspired long short-term memory network for air quality grade prediction. Information 14(4):243CrossRef
15.
go back to reference Attuluri S, Ramesh M (2023) Multi-objective discrete harmony search algorithm for privacy preservation in cloud data centers. Int J Info Tech 1–15 Attuluri S, Ramesh M (2023) Multi-objective discrete harmony search algorithm for privacy preservation in cloud data centers. Int J Info Tech 1–15
16.
go back to reference Balashunmugaraja B, Ganeshbabu TR (2022) Privacy preservation of cloud data in business application enabled by multi-objective red deer-bird swarm algorithm. Knowl-Based Syst 236:107748CrossRef Balashunmugaraja B, Ganeshbabu TR (2022) Privacy preservation of cloud data in business application enabled by multi-objective red deer-bird swarm algorithm. Knowl-Based Syst 236:107748CrossRef
17.
go back to reference Najafizadeh A, Salajegheh A, Rahmani AM, Sahafi A (2021) Privacy-preserving for the internet of things in multi-objective task scheduling in cloud-fog computing using goal programming approach. Peer-to-Peer Netw Appl 14:3865–3890CrossRef Najafizadeh A, Salajegheh A, Rahmani AM, Sahafi A (2021) Privacy-preserving for the internet of things in multi-objective task scheduling in cloud-fog computing using goal programming approach. Peer-to-Peer Netw Appl 14:3865–3890CrossRef
18.
go back to reference Fan T, Cui Z (2021) Adaptive differential privacy preserving based on multi-objective optimization in deep neural networks. Concurr Comput: Pract Exp 33(20):e6367CrossRef Fan T, Cui Z (2021) Adaptive differential privacy preserving based on multi-objective optimization in deep neural networks. Concurr Comput: Pract Exp 33(20):e6367CrossRef
19.
go back to reference Ahamad D, Hameed SA, Akhtar M (2022) A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. J King Saud Univ-Comput Inf Sci 34(6):2343–2358CrossRef Ahamad D, Hameed SA, Akhtar M (2022) A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. J King Saud Univ-Comput Inf Sci 34(6):2343–2358CrossRef
20.
go back to reference Rubai SM (2022) Hybrid heuristic-based key generation protocol for intelligent privacy preservation in cloud sector. J Parallel Distrib Comput 163:166–180CrossRef Rubai SM (2022) Hybrid heuristic-based key generation protocol for intelligent privacy preservation in cloud sector. J Parallel Distrib Comput 163:166–180CrossRef
21.
go back to reference Singh AK, Gupta R (2022) A privacy-preserving model based on differential approach for sensitive data in cloud environment. Multimed Tools Appl 81(23):33127–33150CrossRef Singh AK, Gupta R (2022) A privacy-preserving model based on differential approach for sensitive data in cloud environment. Multimed Tools Appl 81(23):33127–33150CrossRef
22.
go back to reference Gupta R, Singh AK (2022) Privacy-preserving cloud data model based on differential approach. In 2022 Second International Conference on Power. Control Comp Technol (ICPC2T) (pp. 1–6). IEEE Gupta R, Singh AK (2022) Privacy-preserving cloud data model based on differential approach. In 2022 Second International Conference on Power. Control Comp Technol (ICPC2T) (pp. 1–6). IEEE
23.
go back to reference Kulkarni YR, Jagdale B, Sugave SR (2023) Optimized key generation-based privacy preserving data mining model for secure data publishing. Adv Eng Softw 175:103332 Kulkarni YR, Jagdale B, Sugave SR (2023) Optimized key generation-based privacy preserving data mining model for secure data publishing. Adv Eng Softw 175:103332
24.
go back to reference Anand K, Vijayaraj A, Vijay Anand M (2022) An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud. Peer-to-Peer Netw Appl 15(4):2007–2020CrossRef Anand K, Vijayaraj A, Vijay Anand M (2022) An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud. Peer-to-Peer Netw Appl 15(4):2007–2020CrossRef
25.
go back to reference Shen J, Yang H, Vijayakumar P, Kumar N (2021) A privacy-preserving and untraceable group data sharing scheme in cloud computing. IEEE Trans Dependable Secure Comput 19(4):2198–2210CrossRef Shen J, Yang H, Vijayakumar P, Kumar N (2021) A privacy-preserving and untraceable group data sharing scheme in cloud computing. IEEE Trans Dependable Secure Comput 19(4):2198–2210CrossRef
26.
go back to reference Chinnasamy P, Padmavathi S, Swathy R, Rakesh S (2021) Efficient data security using hybrid cryptography on cloud computing. In Invent Comm Comput Technol: Proceedings of ICICCT 2020 (pp. 537–547). Springer Singapore Chinnasamy P, Padmavathi S, Swathy R, Rakesh S (2021) Efficient data security using hybrid cryptography on cloud computing. In Invent Comm Comput Technol: Proceedings of ICICCT 2020 (pp. 537–547). Springer Singapore
Metadata
Title
A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm
Authors
Sahaya Stalin Jose G
Sugitha G
Ayshwarya Lakshmi S
Preethi B. C
Publication date
06-02-2024
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 2/2024
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01591-w

Other articles of this Issue 2/2024

Peer-to-Peer Networking and Applications 2/2024 Go to the issue

Premium Partner