Skip to main content
Log in

Adaptive Weighted Support Vector Machine classification method for privacy preserving in cloud over big data using hadoop framework

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Data security is one of the most critical parts of big data investigation. The cloud system applications deal with sensitive information, such as personal, business, or medical records. Threats to this type of data could endanger the cloud systems that store it. On the other hand, traditional security solutions are incapable of safeguarding huge data migration. An effective privacy-preserving system is used to handle the creation of large amounts of data and the security elements of that data throughout the cloud. The information in a cloud-based dataset is initially clustered and balanced using the hadoop framework. The process of clustering is accomplished by Density Peak Weighted Fuzzy C-means Clustering (DPWFCM) algorithm and processed by hadoop framework, which is then encrypted and classified by Enhanced Word Auto Key Encryption (WAKE) and Adaptive Weighted Support Vector Machine with Continuous scatter search (CSS) Optimization Algorithm classifier called as (AWSVM-CSS) technique respectively. The process of encryption and decryption is accomplished in the form of hybrid scheme. The experimental observation of the proposed approach is highly effective in terms of encryption and classification.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data availability

All the data is collected from the simulation reports of the software and tools used by the authors. Authors are working on implementing the same using real world data with appropriate permissions.

References

  1. AbdElminaam DS, Abdual-Kader HM, Hadhoud MM (2010) Evaluating the performance of symmetric encryption algorithms. Int J Netw Secur 10(3):216–222

    Google Scholar 

  2. Almorsy M, Grundy J, Müller I (2016) An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107

  3. Chandra MA, Bedi SS (2021) Survey on SVM and their application in image classification. Int J Inf Technol 13(5):1–11

    Google Scholar 

  4. Del Rosal E, Kumar S (2017) A fast FPGA implementation for triple DES encryption scheme. Circuits Syst 8(09):237

    Article  Google Scholar 

  5. Ding J, He X, Yuan J, Jiang B (2018) Automatic clustering based on density peak detection using generalized extreme value distribution. Soft Comput 22(9):2777–2796

    Article  Google Scholar 

  6. George Amalarethinam DI, Rajakumari S (2019) A survey on security challenges in cloud computing

  7. Gontumukkala SST, Godavarthi YSV, Gonugunta BRRT, Subramani R, Murali K (2021) Analysis of image classification using SVM. In: 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, pp 01–06

  8. Gordon A (2016) The hybrid cloud security professional. IEEE Cloud Comput 3(1):82–86

    Article  Google Scholar 

  9. Hassan H, Nasir MHM, Khairudin N, Adon I (2017) Factors influencing cloud computing adoption in small medium enterprises. J Inf Commun Technol 16(1):21–41

    Google Scholar 

  10. Hentschel R, Leyh C, Petznick A (2018) Current cloud challenges in Germany: the perspective of cloud service providers. J Cloud Comput 7(1):1–12

    Article  Google Scholar 

  11. Hou J, Pelillo M (2016) A new density kernel in density peak-based clustering. In: 2016 23rd International Conference on Pattern Recognition (ICPR). IEEE, pp 468–473

  12. Huang S, Guo Y, Yang N, Zha S, Liu D, Fang W (2021) A weighted fuzzy C-means clustering method with density peak for anomaly detection in IoT-enabled manufacturing process. J Intell Manuf 32(7):1845–1861

    Article  Google Scholar 

  13. Jiang L, Zhang L, Li C, Wu J (2018) A correlation-based feature weighting filter for Naive Bayes. IEEE Trans Knowl Data Eng 31(2):201–213

    Article  Google Scholar 

  14. Jimenez JM, Diaz JR, Lloret J, Romero O (2018) MHCP: multimedia hybrid cloud computing protocol and architecture for mobile devices. IEEE Netw 33(1):106–112

    Article  Google Scholar 

  15. Kalra M, Tyagi S, Kumar V, Kaur M, Mashwani WK, Shah H, Shah K (2021) A comprehensive review on scatter search: techniques, applications, and challenges. Math Probl Eng 2021, pp 1–21

  16. Kashani MH, Madanipour M, Nikravan M, Asghari P, Mahdipour E (2021) A systematic review of IoT in healthcare: applications, techniques, and trends. J Netw Comput Appl 192:103164

    Article  Google Scholar 

  17. Khan MA (2016) A survey of security issues for cloud computing. J Netw Comput Appl 71:11–29

    Article  Google Scholar 

  18. Li K, Wu Y, Nan Y, Li P, Li Y (2019) Hierarchical multi-class classification in multimodal spacecraft data using DNN and weighted support vector machine. Neurocomputing 259:55–65

    Article  Google Scholar 

  19. Lu CC, Tseng SY (2002) Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter. In: Proceedings IEEE international conference on application-specific systems, architectures, and processors. IEEE, pp 277–285

  20. Mirjalili S (2019) Genetic algorithm. In: Evolutionary algorithms and neural networks. Springer, Cham, pp 43–55

  21. Nurdiyanto H, Rahim R, Ahmar AS, Syahril M, Dahria M, Ahmad H (2018) Secure a transaction activity with base64 algorithm and word auto key encryption algorithm. J Phys: Conf Ser 1028(1):012053). IOP Publishing

  22. Ramachandra G, Iftikhar M, Khan FA (2017) A comprehensive survey on security in cloud computing. Procedia Comput Sci 110:465–472

    Article  Google Scholar 

  23. Raut RD, Gardas BB, Jha MK, Priyadarshinee P (2017) Examining the critical success factors of cloud computing adoption in the MSMEs by using ISM model. J High Technol Manag Res 28(2):125–141

    Article  Google Scholar 

  24. Razzaghi T, Roderick O, Safro I, Marko N (2016) Multilevel weighted support vector machine for classification on healthcare data with missing values. PLoS ONE 11(5):e0155119

    Article  Google Scholar 

  25. Suthaharan S (2016) Support vector machine. In: Machine learning models and algorithms for big data classification. Springer, Boston, pp 207–235

  26. Tariq MI, Memon NA, Ahmed S, Tayyaba S, Mushtaq MT, Mian NA, ... Ashraf MW (2020) A review of deep learning security and privacy defensive techniques. Mob Inf Syst 2020:6535834

  27. Tharini VJ, Shivakumar BL (2022) High-utility itemset mining: fundamentals, properties, techniques and research scope. In: Computational intelligence and data sciences. CRC Press, Boca Raton, pp 195–210

  28. Tharini VJ, Vijayarani S (2020) IoT in healthcare: ecosystem, pillars, design challenges, applications, vulnerabilities, privacy, and security concerns. In: Incorporating the Internet of Things in healthcare applications and wearable devices. IGI Global, pp 1–22

  29. Vijayarani S, Tharini VJ, Sivamathi C (2019) Business intelligence for evaluating the intangible benefits of on-shelf high utility itemset from the temporal transaction database. International Journal of Engineering and Advanced Technology (IJEAT) 8(6)

  30. Walczak S (2018) Artificial neural networks. In: Encyclopedia of information science and technology, Fourth Edition. IGI Global, pp 120–131

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Kanimozhi.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kanimozhi, A., Vimala, N. Adaptive Weighted Support Vector Machine classification method for privacy preserving in cloud over big data using hadoop framework. Multimed Tools Appl 83, 3879–3893 (2024). https://doi.org/10.1007/s11042-023-15825-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15825-9

Keywords

Navigation