Skip to main content
Erschienen in: Soft Computing 18/2019

26.07.2019 | Focus

A Novel Data Privacy-Preserving Protocol for Multi-data Users by using genetic algorithm

verfasst von: P. Pandiaraja, N. Deepa

Erschienen in: Soft Computing | Ausgabe 18/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this research paper, the proposed work is to put forward a Novel Data Privacy-Preserving Protocol (NDPPP) for Multi-data Users by using genetic algorithm. The data owner outsources the files in the encrypted format to the cloud. The data users can efficiently download the encrypted files from the cloud service provider without any loss of data. To provide this facility, there are certain existing mechanisms in the literature. But the existing mechanisms will result high computation complexity. By means of minimizing the computation complexity, a NDPPP for multi-data users is proposed using genetic algorithm in this research work. Genetic algorithms are usually used to produce high-quality resolutions for optimization. A new trapdoor function is proposed to preserve the data privacy by using our Data Privacy-Preserving Protocol. With the aim of avoiding numerous attacks, a secure authentication protocol is moreover developed between the trusted third party and data user. Additionally, the security is improved. Provided the leakage of data, loss of data as well as the data modification can also be avoided. The proposed work is implemented, and the implementation results of NDPPP illustrate that our protocol is efficient through computation and communication complexity. Moreover, the proposed work NDPPP is secure against various attacks like impersonation attack, eavesdropping, man-in-the-middle attack as well as replay attack.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Ahmad W, Wang S, Ullah A (2018) Reputation-aware trust and privacy-preservation for mobile cloud computing. IEEE Access 6(1):46363–46381CrossRef Ahmad W, Wang S, Ullah A (2018) Reputation-aware trust and privacy-preservation for mobile cloud computing. IEEE Access 6(1):46363–46381CrossRef
Zurück zum Zitat Ballard L, Kamara S, Monrose F (2005) Achieving efficient conjunctive keyword searches over encrypted data. In: Proceedings. Information and communications security (ICICS’05), Beijing, China, pp 414–426 Ballard L, Kamara S, Monrose F (2005) Achieving efficient conjunctive keyword searches over encrypted data. In: Proceedings. Information and communications security (ICICS’05), Beijing, China, pp 414–426
Zurück zum Zitat Boneh D et al (2004) Public key encryption with keyword search secure against keyword guessing attacks without random oracle. EUROCRYPT 43:506–522MATH Boneh D et al (2004) Public key encryption with keyword search secure against keyword guessing attacks without random oracle. EUROCRYPT 43:506–522MATH
Zurück zum Zitat Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy preserving multi keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233CrossRef Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy preserving multi keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233CrossRef
Zurück zum Zitat Choo KKR, Weng J (2016) An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Trans Inf Forensics Secur 11(11):2401–2414CrossRef Choo KKR, Weng J (2016) An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Trans Inf Forensics Secur 11(11):2401–2414CrossRef
Zurück zum Zitat Chuah M, Hu W (2011) Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data. In: Proceedings. IEEE 31th international conference on distributed computing systems (ICDCS’11), Minneapolis, MN, pp 383–392 Chuah M, Hu W (2011) Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data. In: Proceedings. IEEE 31th international conference on distributed computing systems (ICDCS’11), Minneapolis, MN, pp 383–392
Zurück zum Zitat Curtmola R, Garay J, Kamara S, Ostrovsky R (20006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings on 13th ACM conference on computer and communications security, pp 79–88 Curtmola R, Garay J, Kamara S, Ostrovsky R (20006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings on 13th ACM conference on computer and communications security, pp 79–88
Zurück zum Zitat Dai W, Qiu M, Qiu L (2017) Who moved my data? Privacy protection in smart phones? IEEE Commun Soc 55(1):20–25CrossRef Dai W, Qiu M, Qiu L (2017) Who moved my data? Privacy protection in smart phones? IEEE Commun Soc 55(1):20–25CrossRef
Zurück zum Zitat Deepa N, Vijayakumar P, Rawal BS, Balamurugan B (2017) An extensive review and possible attack on the privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. In: IEEE international conference on smart cloud, New York, USA, pp 149–154 Deepa N, Vijayakumar P, Rawal BS, Balamurugan B (2017) An extensive review and possible attack on the privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. In: IEEE international conference on smart cloud, New York, USA, pp 149–154
Zurück zum Zitat Gai K, Qiu M, Ming Z (2017a) Spoofing-jamming attack strategy using optimal power distributions in wireless smart grid networks. IEEE Trans Smart Grid 8(5):2431–2439CrossRef Gai K, Qiu M, Ming Z (2017a) Spoofing-jamming attack strategy using optimal power distributions in wireless smart grid networks. IEEE Trans Smart Grid 8(5):2431–2439CrossRef
Zurück zum Zitat Gai K, Qiu M, Zhao H (2017b) Privacy-preserving data encryption strategy for big data in mobile cloud computing. IEEE Trans Big Data 9(99):1CrossRef Gai K, Qiu M, Zhao H (2017b) Privacy-preserving data encryption strategy for big data in mobile cloud computing. IEEE Trans Big Data 9(99):1CrossRef
Zurück zum Zitat Gentry C (2009) A fully homomorphic encryption scheme. Ph.D. dissertation, Stanford university, Stanford, CA, USA Gentry C (2009) A fully homomorphic encryption scheme. Ph.D. dissertation, Stanford university, Stanford, CA, USA
Zurück zum Zitat Hur J, Kang K (2012) Secure data retrival for decentralized disruption-tolerant military networks. IEEE/ACM Trans Netw 22(1):16–26CrossRef Hur J, Kang K (2012) Secure data retrival for decentralized disruption-tolerant military networks. IEEE/ACM Trans Netw 22(1):16–26CrossRef
Zurück zum Zitat Jia G, Han G, Xie H, Du J (2019) Hybrid-LRU caching for optimizing data storage and retrieval in edge computing-based wearable sensors. IEEE Internet Things J 6(2):1342–1351CrossRef Jia G, Han G, Xie H, Du J (2019) Hybrid-LRU caching for optimizing data storage and retrieval in edge computing-based wearable sensors. IEEE Internet Things J 6(2):1342–1351CrossRef
Zurück zum Zitat Jiang R, Lu R, Choo KKR (2018) Achieving high performance and privacy preserving query over encrypted multidimensional big metering data. Future Gener Comput Syst 78(1):392–401CrossRef Jiang R, Lu R, Choo KKR (2018) Achieving high performance and privacy preserving query over encrypted multidimensional big metering data. Future Gener Comput Syst 78(1):392–401CrossRef
Zurück zum Zitat Kamara S, Lauter K (2010) Cryptographic cloud storage. In: Proceedings. Finance cryptography data secure, pp 136–149 Kamara S, Lauter K (2010) Cryptographic cloud storage. In: Proceedings. Finance cryptography data secure, pp 136–149
Zurück zum Zitat Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: IEEE proceedings. INFOCOM, pp 1–5 Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: IEEE proceedings. INFOCOM, pp 1–5
Zurück zum Zitat Li L, Lu R, Choo KKR (2016a) Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Trans Inf Forensics Secur 11(8):1847–1861CrossRef Li L, Lu R, Choo KKR (2016a) Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Trans Inf Forensics Secur 11(8):1847–1861CrossRef
Zurück zum Zitat Li Y, Dai W, Ming Z, Qiu M (2016b) Privacy protection for preventing data over-collection in smart city. IEEE Trans Comput 65(5):1339–1350MathSciNetCrossRef Li Y, Dai W, Ming Z, Qiu M (2016b) Privacy protection for preventing data over-collection in smart city. IEEE Trans Comput 65(5):1339–1350MathSciNetCrossRef
Zurück zum Zitat Liu X, Choo KKR, Deng RH (2016) Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE Trans Dependable Secure Comput 15(1):27–39CrossRef Liu X, Choo KKR, Deng RH (2016) Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE Trans Dependable Secure Comput 15(1):27–39CrossRef
Zurück zum Zitat Liu H, Yao X, Yang T, Ning H (2019) Cooperative privacy preservation for wearable devices in hybrid computing-based smart health. IEEE Internet Things J 6(2):1352–1362CrossRef Liu H, Yao X, Yang T, Ning H (2019) Cooperative privacy preservation for wearable devices in hybrid computing-based smart health. IEEE Internet Things J 6(2):1352–1362CrossRef
Zurück zum Zitat Orencik C, Kantarcioglu M, Saves E (2013) A practical and secure multi-keyword search method over encrypted cloud data. In: Proceedings. IEEE 6th international conference on cloud computing, pp 390–397 Orencik C, Kantarcioglu M, Saves E (2013) A practical and secure multi-keyword search method over encrypted cloud data. In: Proceedings. IEEE 6th international conference on cloud computing, pp 390–397
Zurück zum Zitat Pandiaraja P, Vijayakumar P (2017) Efficient multi-keyword search over encrypted data in untrusted cloud environment. In: Proceedings of the 2nd international conference on recent trends and challenges in computational models (ICRTCCM’17), pp 251–256 Pandiaraja P, Vijayakumar P (2017) Efficient multi-keyword search over encrypted data in untrusted cloud environment. In: Proceedings of the 2nd international conference on recent trends and challenges in computational models (ICRTCCM’17), pp 251–256
Zurück zum Zitat Pandiaraja P, Vijayakumar P, Vijayakumar V, Seshadhri R (2017) Computation efficient attribute based broadcast group key management for secure document access in public cloud. J Inf Sci Eng 33(3):695–712MathSciNet Pandiaraja P, Vijayakumar P, Vijayakumar V, Seshadhri R (2017) Computation efficient attribute based broadcast group key management for secure document access in public cloud. J Inf Sci Eng 33(3):695–712MathSciNet
Zurück zum Zitat Pitchai R, Jayashri S, Raja J (2016) Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. Wirel Pers Commun 90(2):947–960CrossRef Pitchai R, Jayashri S, Raja J (2016) Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. Wirel Pers Commun 90(2):947–960CrossRef
Zurück zum Zitat Song D, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings. IEEE international symposium on security and privacy (S&P’00), Nagoya, Japan, pp 44–55 Song D, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings. IEEE international symposium on security and privacy (S&P’00), Nagoya, Japan, pp 44–55
Zurück zum Zitat Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, Li H (2013) Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings. IEEE ASIACCS’13, Hangzhou, China, pp 71–81 Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, Li H (2013) Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings. IEEE ASIACCS’13, Hangzhou, China, pp 71–81
Zurück zum Zitat Vijayakumar P, Pandiaraja P, Karuppiah M, Deborah LJ (2017) An efficient secure communication for healthcare system using wearable devices. J Comput Electr Eng 63:232–245CrossRef Vijayakumar P, Pandiaraja P, Karuppiah M, Deborah LJ (2017) An efficient secure communication for healthcare system using wearable devices. J Comput Electr Eng 63:232–245CrossRef
Zurück zum Zitat Vijayakumar P, Pandiaraja P, Balamurugan B, Karuppiah M (2019) A novel performance enhancing task scheduling algorithm for cloud based E-health environment. Int J E-Health Med Commun (IJEHMC) (IGI-Global) 10(2):102–117CrossRef Vijayakumar P, Pandiaraja P, Balamurugan B, Karuppiah M (2019) A novel performance enhancing task scheduling algorithm for cloud based E-health environment. Int J E-Health Med Commun (IJEHMC) (IGI-Global) 10(2):102–117CrossRef
Zurück zum Zitat Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data. In: Proceedings. IEEE distributed computing systems (ICDCS’10), Genoa, Italy, pp 253–262 Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data. In: Proceedings. IEEE distributed computing systems (ICDCS’10), Genoa, Italy, pp 253–262
Zurück zum Zitat Wang C, Cao N, Ren K, Lou W (2012a) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23(8):1467–1479CrossRef Wang C, Cao N, Ren K, Lou W (2012a) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23(8):1467–1479CrossRef
Zurück zum Zitat Wang C, Ren K, Yu S, Urs KMR (2012) Achieving usable and privacy-assured similarity search over outsourced cloud data. In: Proceedings. IEEE INFOCOM’12, Orlando, FL, pp 451–459 Wang C, Ren K, Yu S, Urs KMR (2012) Achieving usable and privacy-assured similarity search over outsourced cloud data. In: Proceedings. IEEE INFOCOM’12, Orlando, FL, pp 451–459
Zurück zum Zitat Wang B, Yu S, Lou W, Hou YT (2014) Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: IEEE INFOCOM, Toronto, Canada, pp 2112–2120 Wang B, Yu S, Lou W, Hou YT (2014) Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: IEEE INFOCOM, Toronto, Canada, pp 2112–2120
Zurück zum Zitat Wang X, He J, Cheng P, Chen J (2019) Privacy preserving collaborative computing: heterogeneous privacy guarantee and efficient incentive mechanism. IEEE Trans Signal Process 67(1):221–233MathSciNetCrossRefMATH Wang X, He J, Cheng P, Chen J (2019) Privacy preserving collaborative computing: heterogeneous privacy guarantee and efficient incentive mechanism. IEEE Trans Signal Process 67(1):221–233MathSciNetCrossRefMATH
Zurück zum Zitat Xu Z, Kang W, Li R, Yow K, Xu C (2012) Efficient multi-keyword ranked query on encrypted data in the cloud. In: Proceedings. IEEE parallel and distributed systems (ICPADS’12), Singapore, pp 244–251 Xu Z, Kang W, Li R, Yow K, Xu C (2012) Efficient multi-keyword ranked query on encrypted data in the cloud. In: Proceedings. IEEE parallel and distributed systems (ICPADS’12), Singapore, pp 244–251
Zurück zum Zitat Yang X, Lu R, Choo KKR (2017) Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud. In: IEEE transactions on big data, p 1 Yang X, Lu R, Choo KKR (2017) Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud. In: IEEE transactions on big data, p 1
Zurück zum Zitat Yang X, Rongxing L, Shao J, Tang X, Ghorbani A (2018) Achieving efficient and privacy-preserving multi-domain big data deduplication in cloud. IEEE Trans Serv Comput 1(1):1 Yang X, Rongxing L, Shao J, Tang X, Ghorbani A (2018) Achieving efficient and privacy-preserving multi-domain big data deduplication in cloud. IEEE Trans Serv Comput 1(1):1
Zurück zum Zitat Zhang W, Lin Y, Xiao S, Liu Q, Zhou T (2014) Secure distributed keyword search in multiple clouds. In: Proceedings. IEEE/ACM IWQOS’14, Hongkong, pp 370–379 Zhang W, Lin Y, Xiao S, Liu Q, Zhou T (2014) Secure distributed keyword search in multiple clouds. In: Proceedings. IEEE/ACM IWQOS’14, Hongkong, pp 370–379
Zurück zum Zitat Zhang W, Lin Y, Xiao S (2015) Privacy preserving ranked multi keyword search for multiple data owners in cloud computing. IEEE Trans Comput 6(1):1566–1577MathSciNetMATH Zhang W, Lin Y, Xiao S (2015) Privacy preserving ranked multi keyword search for multiple data owners in cloud computing. IEEE Trans Comput 6(1):1566–1577MathSciNetMATH
Zurück zum Zitat Zheng Q, Xu S, Ateniese G (2014) Vabks: Verifiable attribute based keyword search over outsourced encrypted data. In: The proceedings. IEEE INFOCOM’14, Toronto, Canada, pp 522–530 Zheng Q, Xu S, Ateniese G (2014) Vabks: Verifiable attribute based keyword search over outsourced encrypted data. In: The proceedings. IEEE INFOCOM’14, Toronto, Canada, pp 522–530
Metadaten
Titel
A Novel Data Privacy-Preserving Protocol for Multi-data Users by using genetic algorithm
verfasst von
P. Pandiaraja
N. Deepa
Publikationsdatum
26.07.2019
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 18/2019
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-019-04239-1

Weitere Artikel der Ausgabe 18/2019

Soft Computing 18/2019 Zur Ausgabe

Premium Partner