Skip to main content
Top
Published in: The Journal of Supercomputing 5/2024

16-10-2023

A novel Jarratt butterfly Ebola optimization-based attentional random forest for data anonymization in cloud environment

Authors: S. Nikkath Bushra, Nalini Subramanian, G. Shobana, S. Radhika

Published in: The Journal of Supercomputing | Issue 5/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Privacy and security are the most essential barriers preventing widespread public cloud adaptation. The data that is distributed within the cloud requires privacy protection which can be achieved through the implementation of a data anonymization process. However, there is a lack of privacy for the user data. Even though the differential privacy model minimizes the efficiency, it also leads to generate data loss and privacy is not enhanced. Data securing in a cloud environment is a complex task. The data that are distributed within the cloud requires privacy protection which can be achieved through the implementation of a data anonymization process. So in order to improve the efficiency the novel hybrid ABRF-Stacked Bi-GRU is proposed to secure the medical data. This proposed method diminished the leakage of data and also effectively improve security and privacy. Therefore, in this paper, the privacy-preserving hybrid attention-based random forest (ABRF) with stacked bidirectional gated recurrent unit (stacked Bi-GRU) model named hybrid ABRF-Stacked Bi-GRU is proposed in the cloud environment. This proposed model is used to preserve medical data in the cloud from private data leakage. The attention weights along with the trainable parameters are assigned by the ABRF model to the decision trees. The privacy leakage is reduced by combining Jarratt butterfly optimization algorithm with the Ebola optimization search algorithm. However, in various existing methods, the differential privacy model is applied but it does not minimize the efficiency. In such cases it leads to generate data loss and privacy is not enhanced. Data securing in a cloud environment is a complex task. So in order to improve the efficiency the novel hybrid ABRF-Stacked Bi-GRU is proposed to secure the medical data. This proposed method diminished the leakage of data and also effectively improve security and privacy. The ensemble of the ABRF and stacked Bi-GRU model enhances the security of data in a cloud environment. The proposed model is evaluated using Diabetes UCI Dataset and Obesity UCI ML Dataset. The obtained outcomes compared with existing methods showed that the proposed method achieves a high anonymization degree with less Information Loss and takes less time for computation and minimizes the complexity during computation.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
go back to reference Yoon J, Drumright LN, Van Der Schaar M (2020) Anonymization through data synthesis using generative adversarial networks (Ads-Gan). IEEE J Biomed Health Inform 24(8):2378–2388CrossRefPubMed Yoon J, Drumright LN, Van Der Schaar M (2020) Anonymization through data synthesis using generative adversarial networks (Ads-Gan). IEEE J Biomed Health Inform 24(8):2378–2388CrossRefPubMed
2.
go back to reference Andrew J, Baker M (2021) The general data protection regulation in the age of surveillance capitalism. J Bus Ethics 168(3):565–578CrossRef Andrew J, Baker M (2021) The general data protection regulation in the age of surveillance capitalism. J Bus Ethics 168(3):565–578CrossRef
3.
go back to reference Jeppesen JH, Jacobsen RH, Inceoglu F, Toftegaard TS (2019) A cloud detection algorithm for satellite imagery based on deep learning. Remote Sens Environ 229:247–259ADSCrossRef Jeppesen JH, Jacobsen RH, Inceoglu F, Toftegaard TS (2019) A cloud detection algorithm for satellite imagery based on deep learning. Remote Sens Environ 229:247–259ADSCrossRef
4.
go back to reference Weidner L, Walton G, Kromer R (2019) Classification methods for point clouds in rock slope monitoring: a novel machine learning approach and comparative analysis. Eng Geol 263:105326CrossRef Weidner L, Walton G, Kromer R (2019) Classification methods for point clouds in rock slope monitoring: a novel machine learning approach and comparative analysis. Eng Geol 263:105326CrossRef
5.
go back to reference Muheidat F, Tawalbeh LA (2021) Mobile and cloud computing security. Machine intelligence and big data analytics for cybersecurity applications. Springer, Cham, pp 461–483CrossRef Muheidat F, Tawalbeh LA (2021) Mobile and cloud computing security. Machine intelligence and big data analytics for cybersecurity applications. Springer, Cham, pp 461–483CrossRef
6.
go back to reference Roberts JF, Mwangi R, Mukabi F, Njui J, Nzioka K, Ndambiri JK, Bispo PC, Espirito-Santo FDB, Gou Y, Johnson SCM, Louis V (2022) Pyro: a Python package for near-real-time forest cover change detection from Earth observation using machine learning. Comput Geosci 167:105192CrossRef Roberts JF, Mwangi R, Mukabi F, Njui J, Nzioka K, Ndambiri JK, Bispo PC, Espirito-Santo FDB, Gou Y, Johnson SCM, Louis V (2022) Pyro: a Python package for near-real-time forest cover change detection from Earth observation using machine learning. Comput Geosci 167:105192CrossRef
7.
go back to reference Sangaiah AK, Medhane DV, Han T, Hossain MS, Muhammad G (2019) Enforcing position-based confidentiality with machine learning paradigm through mobile edge computing in real-time industrial informatics. IEEE Trans Ind 15:4189CrossRef Sangaiah AK, Medhane DV, Han T, Hossain MS, Muhammad G (2019) Enforcing position-based confidentiality with machine learning paradigm through mobile edge computing in real-time industrial informatics. IEEE Trans Ind 15:4189CrossRef
8.
go back to reference Retico A, Avanzo M, Boccali T, Bonacorsi D, Botta F, Cuttone G, Martelli B, Salomoni D, Spiga D, Trianni A, Stasi M (2021) Enhancing the impact of artificial intelligence in medicine: a joint AIFM-INFN Italian initiative for a dedicated cloud-based computing infrastructure. Phys Med 91:140–150CrossRefPubMed Retico A, Avanzo M, Boccali T, Bonacorsi D, Botta F, Cuttone G, Martelli B, Salomoni D, Spiga D, Trianni A, Stasi M (2021) Enhancing the impact of artificial intelligence in medicine: a joint AIFM-INFN Italian initiative for a dedicated cloud-based computing infrastructure. Phys Med 91:140–150CrossRefPubMed
9.
go back to reference Shaham S, Ding M, Liu B, Dang S, Lin Z, Li J (2020) Privacy-preserving location data publishing: a machine learning approach. IEEE Trans Knowl Data Eng 33(9):3270–3283CrossRef Shaham S, Ding M, Liu B, Dang S, Lin Z, Li J (2020) Privacy-preserving location data publishing: a machine learning approach. IEEE Trans Knowl Data Eng 33(9):3270–3283CrossRef
10.
go back to reference Alguliyev RM, Aliguliyev RM, Abdullayeva FJ (2019) A privacy-preserving deep learning algorithm for big personal data analysis. J Ind Inf Integr 15:1–14 Alguliyev RM, Aliguliyev RM, Abdullayeva FJ (2019) A privacy-preserving deep learning algorithm for big personal data analysis. J Ind Inf Integr 15:1–14
11.
go back to reference Prabha KM, Saraswathi PV (2020) Suppressed k-anonymity multi-factor authentication based Schmidt-Samoa cryptography for privacy preserved data access in cloud computing. Comput Commun 158:85–94CrossRef Prabha KM, Saraswathi PV (2020) Suppressed k-anonymity multi-factor authentication based Schmidt-Samoa cryptography for privacy preserved data access in cloud computing. Comput Commun 158:85–94CrossRef
12.
go back to reference Virupaksha S, Dondeti V (2021) Anonymized noise addition in subspaces for privacy preserved data mining in high dimensional continuous data. Peer-to-Peer Netw Appl 14(3):1608–1628CrossRef Virupaksha S, Dondeti V (2021) Anonymized noise addition in subspaces for privacy preserved data mining in high dimensional continuous data. Peer-to-Peer Netw Appl 14(3):1608–1628CrossRef
13.
go back to reference Kiabod M, Dehkordi MN, Barekatain B (2019) TSRAM: a time-saving k-degree anonymization method in the social network. Expert Syst Appl 125:378–396CrossRef Kiabod M, Dehkordi MN, Barekatain B (2019) TSRAM: a time-saving k-degree anonymization method in the social network. Expert Syst Appl 125:378–396CrossRef
14.
go back to reference Siddula M, Li Y, Cheng X, Tian Z, Cai Z (2019) Anonymization in online social networks based on enhanced equity-cardinal clustering. IEEE Trans Comput Soc Syst 6(4):809–820CrossRef Siddula M, Li Y, Cheng X, Tian Z, Cai Z (2019) Anonymization in online social networks based on enhanced equity-cardinal clustering. IEEE Trans Comput Soc Syst 6(4):809–820CrossRef
15.
go back to reference Oqaily M, Jarraya Y, Mohammady M, Majumdar S, Pourzandi M, Wang L, Debbabi M (2019) SegGuard: segmentation-based anonymization of network data in clouds for privacy-preserving security auditing. IEEE Trans Dependable Secure Comput 18(5):2486–2505 Oqaily M, Jarraya Y, Mohammady M, Majumdar S, Pourzandi M, Wang L, Debbabi M (2019) SegGuard: segmentation-based anonymization of network data in clouds for privacy-preserving security auditing. IEEE Trans Dependable Secure Comput 18(5):2486–2505
16.
go back to reference Stephanie V, Khalil I, Rahman MS, Atiquzzaman M (2022) Privacy-preserving ensemble infused enhanced deep neural network framework for edge cloud convergence. IEEE Internet Things J 10:3763CrossRef Stephanie V, Khalil I, Rahman MS, Atiquzzaman M (2022) Privacy-preserving ensemble infused enhanced deep neural network framework for edge cloud convergence. IEEE Internet Things J 10:3763CrossRef
17.
go back to reference Wang LE, Li X (2018) A graph-based multifold model for anonymizing data with attributes of multiple types. Comput Secur 72:122–135CrossRef Wang LE, Li X (2018) A graph-based multifold model for anonymizing data with attributes of multiple types. Comput Secur 72:122–135CrossRef
18.
go back to reference Ni C, Cang LS, Gope P, Min G (2022) Data anonymization evaluation for big data and IoT environment. Inf Sci 605:381–392CrossRef Ni C, Cang LS, Gope P, Min G (2022) Data anonymization evaluation for big data and IoT environment. Inf Sci 605:381–392CrossRef
19.
20.
go back to reference Deng Y, Wang L, Jia H, Tong X, Li F (2019) A sequence-to-sequence deep learning architecture based on bidirectional GRU for type recognition and time location of combined power quality disturbance. IEEE Trans Industr Inf 15(8):4481–4493CrossRef Deng Y, Wang L, Jia H, Tong X, Li F (2019) A sequence-to-sequence deep learning architecture based on bidirectional GRU for type recognition and time location of combined power quality disturbance. IEEE Trans Industr Inf 15(8):4481–4493CrossRef
21.
go back to reference Sihwail R, Solaiman OS, Ariffin KAZ (2022) New robust hybrid Jarratt-Butterfly optimization algorithm for nonlinear models. J King Saud Univ-Comput Inf Sci 34(10):8207–8220 Sihwail R, Solaiman OS, Ariffin KAZ (2022) New robust hybrid Jarratt-Butterfly optimization algorithm for nonlinear models. J King Saud Univ-Comput Inf Sci 34(10):8207–8220
22.
go back to reference Oyelade ON, Ezugwu AES, Mohamed TI, Abualigah L (2022) Ebola optimization search algorithm: a new nature-inspired metaheuristic optimization algorithm. IEEE Access 10:16150–16177CrossRef Oyelade ON, Ezugwu AES, Mohamed TI, Abualigah L (2022) Ebola optimization search algorithm: a new nature-inspired metaheuristic optimization algorithm. IEEE Access 10:16150–16177CrossRef
23.
go back to reference Girka A, Terziyan V, Gavriushenko M, Gontarenko A (2021) Anonymization as homeomorphic data space transformation for privacy-preserving deep learning. Procedia Comput Sci 180:867–876CrossRef Girka A, Terziyan V, Gavriushenko M, Gontarenko A (2021) Anonymization as homeomorphic data space transformation for privacy-preserving deep learning. Procedia Comput Sci 180:867–876CrossRef
26.
go back to reference Abbasi A, Mohammadi B (2022) A clustering-based anonymization approach for privacy-preserving in the healthcare cloud. Concurr Comput Pract Exp 34(1):e6487CrossRef Abbasi A, Mohammadi B (2022) A clustering-based anonymization approach for privacy-preserving in the healthcare cloud. Concurr Comput Pract Exp 34(1):e6487CrossRef
Metadata
Title
A novel Jarratt butterfly Ebola optimization-based attentional random forest for data anonymization in cloud environment
Authors
S. Nikkath Bushra
Nalini Subramanian
G. Shobana
S. Radhika
Publication date
16-10-2023
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 5/2024
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-023-05606-4

Other articles of this Issue 5/2024

The Journal of Supercomputing 5/2024 Go to the issue

Premium Partner