Skip to main content
Top
Published in: Soft Computing 7/2021

01-03-2021 | Methodologies and Application

Fuzzy with black widow and spider monkey optimization for privacy-preserving-based crowdsourcing system

Authors: J. Sathya Priya, N. Bhaskar, S. Prabakeran

Published in: Soft Computing | Issue 7/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Crowdsourcing is a procedure for demonstrating data outsourcing to a wide range of individual workers rather than considering a unique entity or a company. Crowdsourcing has made different kinds of chances for some trying issues by utilizing human knowledge. In order to attain an optimal global assignment technique, it is necessary to gather information regarding the location of the entire workers. There occur few security issues during information gathering that causes severe threat to all workers. To overcome the concerns based on privacy-preserving, this paper proposes a privacy-preserving model based on Fuzzy with the Black widow and Spider Monkey Optimization (BW–SMO). The fuzzy can be used to cluster the query solution. To optimize the query selection, we exploited the Black widow optimization algorithm incorporated with the Spider Monkey optimization algorithm. The parameters of both algorithms are controlled by the Fuzzy logic controller. Thus, our proposed frameworks of Fuzzy with BW–SMO effectively solve optimizing selection and join queries with low cost, latency, and securing data. The proposed model will be compared with the existing models to show the system's effectiveness.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Agrawal D, Aggarwal CC (2001) On the design and quantification of privacy preserving data mining algorithms. In: PODS Agrawal D, Aggarwal CC (2001) On the design and quantification of privacy preserving data mining algorithms. In: PODS
go back to reference Ali SH (2013) Novel approach for generating the key of stream cipher system using random forest data mining algorithm. In: IEEE, 2013 Sixth international conference on developments in eSystems engineering, Abu Dhabi, 2013, pp 259–269. doi: https://doi.org/10.1109/DeSE.2013.54 Ali SH (2013) Novel approach for generating the key of stream cipher system using random forest data mining algorithm. In: IEEE, 2013 Sixth international conference on developments in eSystems engineering, Abu Dhabi, 2013, pp 259–269. doi: https://​doi.​org/​10.​1109/​DeSE.​2013.​54
go back to reference Al-Janabi S, Alkaim AF (2020) A nifty collaborative analysis to predicting a novel tool (DRFLLS) for missing values estimation. Soft Comput 24(1):555–569CrossRef Al-Janabi S, Alkaim AF (2020) A nifty collaborative analysis to predicting a novel tool (DRFLLS) for missing values estimation. Soft Comput 24(1):555–569CrossRef
go back to reference S Al-Janabi, E Alwan (2017) Soft mathematical system to solve black box problem through development the FARB based on hyperbolic and polynomial functions. In: IEEE, 2017 10th international conference on developments in eSystems engineering (DeSE), Paris, pp 37–42. doi: https://doi.org/10.1109/DeSE.2017.23 S Al-Janabi, E Alwan (2017) Soft mathematical system to solve black box problem through development the FARB based on hyperbolic and polynomial functions. In: IEEE, 2017 10th international conference on developments in eSystems engineering (DeSE), Paris, pp 37–42. doi: https://​doi.​org/​10.​1109/​DeSE.​2017.​23
go back to reference Al-Janabi S, Alkaim AF, Adel Z (2020a) An innovative synthesis of deep learning techniques (DCapsNet and DCOM) for generation electrical renewable energy from wind energy. Soft Comput 24:10943–10962CrossRef Al-Janabi S, Alkaim AF, Adel Z (2020a) An innovative synthesis of deep learning techniques (DCapsNet and DCOM) for generation electrical renewable energy from wind energy. Soft Comput 24:10943–10962CrossRef
go back to reference Al-Janabi S, Mohammad M, Al-Sultan A (2020b) A new method for prediction of air pollution based on intelligent computation. Soft Comput 24(1):661–680CrossRef Al-Janabi S, Mohammad M, Al-Sultan A (2020b) A new method for prediction of air pollution based on intelligent computation. Soft Comput 24(1):661–680CrossRef
go back to reference Alkaim AF, Al-Janabi S (2019) Multi objectives optimization to gas flaring reduction from oil production. In: Farhaoui Y (ed) Big data and networks technologies BDNT 2019. Lecture notes in networks and systems, vol 81. Springer, Cham Alkaim AF, Al-Janabi S (2019) Multi objectives optimization to gas flaring reduction from oil production. In: Farhaoui Y (ed) Big data and networks technologies BDNT 2019. Lecture notes in networks and systems, vol 81. Springer, Cham
go back to reference Bhaskar N, Kumar PM (2020) Optimal processing of nearest-neighbor user queries in crowdsourcing based on the whale optimization algorithm. Soft Comput 24:13037–13050CrossRef Bhaskar N, Kumar PM (2020) Optimal processing of nearest-neighbor user queries in crowdsourcing based on the whale optimization algorithm. Soft Comput 24:13037–13050CrossRef
go back to reference Even S, Goldreich O, Lempel A (1983) A randomized protocol for signing contracts. Springer, BerlinCrossRef Even S, Goldreich O, Lempel A (1983) A randomized protocol for signing contracts. Springer, BerlinCrossRef
go back to reference Guan Z, Zhang Y, Wu L, Wu J, Li J, Ma Y, Hu J (2019) APPA: an anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT. J Netw Comput Appl 125:82–92CrossRef Guan Z, Zhang Y, Wu L, Wu J, Li J, Ma Y, Hu J (2019) APPA: an anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT. J Netw Comput Appl 125:82–92CrossRef
go back to reference Guo Y, H Xie, Y Miao, C Wang, X Jia (2020) FedCrowd: a federated and privacy-preserving crowdsourcing platform on blockchain. IEEE Trans Serv Comput Guo Y, H Xie, Y Miao, C Wang, X Jia (2020) FedCrowd: a federated and privacy-preserving crowdsourcing platform on blockchain. IEEE Trans Serv Comput
go back to reference Hayyolalam V, Kazem AAP (2020) Black widow optimization algorithm: a novel meta-heuristic approach for solving engineering optimization problems. Eng Appl Artif Intell 87:103249CrossRef Hayyolalam V, Kazem AAP (2020) Black widow optimization algorithm: a novel meta-heuristic approach for solving engineering optimization problems. Eng Appl Artif Intell 87:103249CrossRef
go back to reference Jose J, Gautam N, Tiwari M, Tiwari T, Suresh A, Sundararaj V, Rejeesh MR (2021) An image quality enhancement scheme employing adolescent identity search algorithm in the NSST domain for multimodal medical image fusion. Biomed Sig Process Control 66:102480CrossRef Jose J, Gautam N, Tiwari M, Tiwari T, Suresh A, Sundararaj V, Rejeesh MR (2021) An image quality enhancement scheme employing adolescent identity search algorithm in the NSST domain for multimodal medical image fusion. Biomed Sig Process Control 66:102480CrossRef
go back to reference Lin Y, Cunningham IIIGA, Coggeshall SV (1997) Using fuzzy partitions to create fuzzy systems from input-output data and set the initial weights in a fuzzy neural network. IEEE Trans Fuzzy Syst 5(4):614–621CrossRef Lin Y, Cunningham IIIGA, Coggeshall SV (1997) Using fuzzy partitions to create fuzzy systems from input-output data and set the initial weights in a fuzzy neural network. IEEE Trans Fuzzy Syst 5(4):614–621CrossRef
go back to reference Lin C, He D, Zeadally S, Kumar N, Choo K-KR (2020) SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system. Sci China Inf Sci 63(3):1–14MathSciNetCrossRef Lin C, He D, Zeadally S, Kumar N, Choo K-KR (2020) SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system. Sci China Inf Sci 63(3):1–14MathSciNetCrossRef
go back to reference Louise B (2012). The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In: SIGCHI. ACM, pp 367–376 Louise B (2012). The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In: SIGCHI. ACM, pp 367–376
go back to reference Prabakeran S, Sethukarasi T (2020) Optimal solution for malicious node detection and prevention using hybrid chaotic particle dragonfly swarm algorithm in VANETs. Wirel Netw 26(8):5897–5917CrossRef Prabakeran S, Sethukarasi T (2020) Optimal solution for malicious node detection and prevention using hybrid chaotic particle dragonfly swarm algorithm in VANETs. Wirel Netw 26(8):5897–5917CrossRef
go back to reference Raja S, Ramaiah S (2017) An efficient fuzzy-based hybrid system to cloud intrusion detection. Int J Fuzzy Syst 19(1):62–77CrossRef Raja S, Ramaiah S (2017) An efficient fuzzy-based hybrid system to cloud intrusion detection. Int J Fuzzy Syst 19(1):62–77CrossRef
go back to reference Rejeesh MR (2019) Interest point based face recognition using adaptive neuro fuzzy inference system. Multimed Tools Appl 78(16):22691–22710CrossRef Rejeesh MR (2019) Interest point based face recognition using adaptive neuro fuzzy inference system. Multimed Tools Appl 78(16):22691–22710CrossRef
go back to reference Saravanan P, Sethukarasi T, Indumathi V (2018a) An efficient software defined network based cooperative scheme for mitigation of distributed denial of service (DDoS) attacks. J Comput Theor Nanosci 15(6–7):2221–2226CrossRef Saravanan P, Sethukarasi T, Indumathi V (2018a) An efficient software defined network based cooperative scheme for mitigation of distributed denial of service (DDoS) attacks. J Comput Theor Nanosci 15(6–7):2221–2226CrossRef
go back to reference Saravanan P, Sethukarasi T, Indumathi V (2018b) Authentic novel trust propagation model with deceptive recommendation penalty scheme for distributed denial of service attacks. J Comput Theor Nanosci 15(6–7):2383–2389CrossRef Saravanan P, Sethukarasi T, Indumathi V (2018b) Authentic novel trust propagation model with deceptive recommendation penalty scheme for distributed denial of service attacks. J Comput Theor Nanosci 15(6–7):2383–2389CrossRef
go back to reference Saravanan P, Kumar RH, Arvind T, Narayanan B (2019) Hybrid Crypto System Using Homomorphic Encryption and Elliptic Curve Cryptography. i-Manager’s J Comput Sci 7(1):36 Saravanan P, Kumar RH, Arvind T, Narayanan B (2019) Hybrid Crypto System Using Homomorphic Encryption and Elliptic Curve Cryptography. i-Manager’s J Comput Sci 7(1):36
go back to reference Sharma H, G Hazrati, JC Bansal (2019) Spider monkey optimization algorithm. In: Evolutionary and swarm intelligence algorithms. Springer, Cham, pp 43–59 Sharma H, G Hazrati, JC Bansal (2019) Spider monkey optimization algorithm. In: Evolutionary and swarm intelligence algorithms. Springer, Cham, pp 43–59
go back to reference Shi K, Zhu L, Zhang C, Xu L, Gao F (2020) Blockchain-based multimedia sharing in vehicular social networks with privacy protection. Multimed Tools Appl 79:8085–8105CrossRef Shi K, Zhu L, Zhang C, Xu L, Gao F (2020) Blockchain-based multimedia sharing in vehicular social networks with privacy protection. Multimed Tools Appl 79:8085–8105CrossRef
go back to reference Sundararaj V (2016) An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. Int J Intell Eng Syst 9(3):117–126 Sundararaj V (2016) An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. Int J Intell Eng Syst 9(3):117–126
go back to reference Sundararaj V (2019) Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wirel Pers Commun 104(1):173–197CrossRef Sundararaj V (2019) Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wirel Pers Commun 104(1):173–197CrossRef
go back to reference Tang W, Zhang K, Ren J, Zhang Y, Shen XS (2020) Privacy-preserving task recommendation with win-win incentives for mobile crowdsourcing. Inf Sci 527:477–492CrossRef Tang W, Zhang K, Ren J, Zhang Y, Shen XS (2020) Privacy-preserving task recommendation with win-win incentives for mobile crowdsourcing. Inf Sci 527:477–492CrossRef
go back to reference Tatiana P, Vasconcelos M, Almeida J, Kumaraguru P, Almeida V (2012) We know where you live: privacy characterization of foursquare behavior. In: UbiComp. Pittsburgh, Pennsylvania, pp 898–905 Tatiana P, Vasconcelos M, Almeida J, Kumaraguru P, Almeida V (2012) We know where you live: privacy characterization of foursquare behavior. In: UbiComp. Pittsburgh, Pennsylvania, pp 898–905
go back to reference Vinu S (2019) Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction. Int J Biomed Eng Technol 31(4):325CrossRef Vinu S (2019) Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction. Int J Biomed Eng Technol 31(4):325CrossRef
go back to reference Vinu S, Muthukumar S, Kumar RS (2018) An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Comput Secur 77:277–288CrossRef Vinu S, Muthukumar S, Kumar RS (2018) An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Comput Secur 77:277–288CrossRef
go back to reference Vinu S, Anoop V, Dixit P, Arjaria A, Chourasia U, Bhambri P, Rajeesh MR, Sundararaj R (2020) CCGPA-MPPT: cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system. Prog Photovolt Res Appl 28(11):1128–1145CrossRef Vinu S, Anoop V, Dixit P, Arjaria A, Chourasia U, Bhambri P, Rajeesh MR, Sundararaj R (2020) CCGPA-MPPT: cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system. Prog Photovolt Res Appl 28(11):1128–1145CrossRef
go back to reference Wang S, Jia X, Sang Q (2020) A dual privacy preserving algorithm in spatial crowdsourcing. Mob Inf Syst Wang S, Jia X, Sang Q (2020) A dual privacy preserving algorithm in spatial crowdsourcing. Mob Inf Syst
go back to reference Yi X, Paulet R, Bertino E (2014) Homomorphic encryption and applications, vol 3. Springer, HeidelbergMATH Yi X, Paulet R, Bertino E (2014) Homomorphic encryption and applications, vol 3. Springer, HeidelbergMATH
go back to reference Zhang J, Zhang Q, Ji S (2020) A fog-assisted privacy-preserving task allocation in crowdsourcing. IEEE Internet Things J 7:8331–8342CrossRef Zhang J, Zhang Q, Ji S (2020) A fog-assisted privacy-preserving task allocation in crowdsourcing. IEEE Internet Things J 7:8331–8342CrossRef
go back to reference Zhang J, Wan C, Zhang C, Guo X, Chen Y (2020) Noninteractive lightweight privacy-preserving auditing on images in mobile crowdsourcing networks. Secur Commun Netw Zhang J, Wan C, Zhang C, Guo X, Chen Y (2020) Noninteractive lightweight privacy-preserving auditing on images in mobile crowdsourcing networks. Secur Commun Netw
go back to reference Zhang X, Chen X, Yan H, Xiang Y (2021) Privacy-preserving and verifiable online crowdsourcing with worker updates. Inf Sci 548:212–232CrossRef Zhang X, Chen X, Yan H, Xiang Y (2021) Privacy-preserving and verifiable online crowdsourcing with worker updates. Inf Sci 548:212–232CrossRef
Metadata
Title
Fuzzy with black widow and spider monkey optimization for privacy-preserving-based crowdsourcing system
Authors
J. Sathya Priya
N. Bhaskar
S. Prabakeran
Publication date
01-03-2021
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 7/2021
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-021-05657-w

Other articles of this Issue 7/2021

Soft Computing 7/2021 Go to the issue

Premium Partner