A Data Obfuscation Method Using Ant-Lion-Rider Optimization for Privacy Preservation in the Cloud

A Data Obfuscation Method Using Ant-Lion-Rider Optimization for Privacy Preservation in the Cloud

Nagaraju Paramarthi, Nagaraju Pamarthi, Nagamalleswara Rao N.
Copyright: © 2022 |Pages: 21
DOI: 10.4018/IJDST.300353
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In this paper, a obfuscation-based technique namely, AROA based BMCG method is developed for secure data transmission in cloud. Initially, the input data with the mixed attributes is provided to the privacy preservation process directly, where the data matrix and bilinear map coefficient generation co-efficient is multiplied through Hilbert space-based tensor product. Here, bilinear map co-efficient is the new co-efficient proposed to multiply with original data matrix and the OB-MECC Encryption is utilized in the privacy preservation phase to maintain the security of the data. The derivation of bilinear map co-efficient is used to handle both the utility and the sensitive information. The new algorithm called, AROA is developed by integrating the ALO with ROA. The performance and the comparative analysis of the proposed AROA based BMCG method is done using the metrics, such as accuracy and information loss. The proposed AROA based BMCG method obtained a maximal accuracy of 94% and minimal information loss of 6% respectively.
Article Preview
Top

1. Introduction

Cloud computing is a service that is delivered over the network and the tremendous characteristics make it dominate the industry (Buyya, et al., 2013) (Itani, et al., 2019). Three kinds of services, such as Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a service (IaaS) are provided by the cloud. The service model that provides storage, hardware, data centers, and servers to the users is the IaaS. Another major service provided by the cloud is the SaaS (Mary and Amalarethinam, 2017). A good opportunity is provided to the providers for increasing the revenues using the data stored in the cloud. Some of the well-known providers of cloud storage services include Google Drive, Dropbox, AmazonS3, Copy, and SkyDrive. Dropbox was the first to start the cloud storage service as a business model followed by Google Drive and other cloud service providers. The cloud service (Attasena and Darmon, 2019) (Davoli, et al., 2019) is simple and it has the storage space which is assigned to the user for a reasonable price or for free. The data is stored by the user through a web 2.0 interface on the provider or the data can also be stored on the directory of the devices, like Tablets, Smartphone, and Personal Computers that are synchronized by the client application towards the Cloud Storage provider (Celesti, et al., 2016)

Optimization is at the heart of cloud computing. That's why it is important to build a cloud ecosystem that is optimized across network (Roy and Ghoshal, 2020). An efficient and flexible method is provided by the cloud services (Manasrah, et al., 2020) for managing the data of the users without maintaining and deploying the local storage service and device (Li, et al., 2016) (Wang, et al., 2009; Wang, et al., 2011; Cui, et al., 2015). A recent report indicated that data sourcing is utilized by more than 79% of organizations and the increasing demand leads to the rise in cloud storage providers (Li, et al., 2015; Sookhak, et al., 2015). The increase in demand for cloud services (Kumar and Vimala, 2020) leads to an increase in security concerns. One such major security concern is the integrity of the data. Data integrity is the determination of whether the data is remaining intact on the servers of the cloud. The integrity of the user’s data is evaluated by the cloud server, which is an important issue while outsourcing the data (Brammya and Deepa, 2019). However, even if the data is missing or damaged, the cloud server generates a good integrity report for a good reputation (Sookhak, et al., 2015; Juels and Jr, 2007; Ateniese, et al., 2008). The server should be kept in check by the user to avoid cheating. Besides, the data of the user on the cloud servers may be distorted by the external adversaries for political or financial reasons (Zhang, et al., 2015; Ni, et al., 2013)(Cofini, et al., 2014). Thus, the integrity of the data should be ensured by the users through efficient and secure verification methods (Zhang, et al., 2016).

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 2 Issues (2023)
Volume 13: 8 Issues (2022)
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing