Advertisement

Security aware index based quasi–identifier approach for privacy preservation of data sets for cloud applications

  • Rayapati Venkata SudhakarEmail author
  • T. Ch. Malleswara Rao
Article
  • 19 Downloads

Abstract

Privacy preservation is a major task in cloud based applications. Many applications are built in the cloud for their economic benefits and operational convenience. The obtained information in the cloud is often seen as valuable for individuals through malicious intent. There is a lot of personal information and potentially secure data that people stored on their computers, and this information is generally transferred to the cloud. In this document, we propose an efficient index based quasi- identifier approach to ensure privacy preservation and achieve high data utility over incremental and distributed data sets. The modified Fuzzy C Means algorithm is used to construct the clusters by similarity. Anonymised data is retrieved by means of tuple partitioning in the data sets. Analysis results illustrate that the proposed method is more efficient for preserving privacy on incremental data sets than existing approaches. It is implemented in the working platform of Java.

Keywords

Privacy preserving Cloud computing Secure Modified fuzzy C means algorithm Anonymised data Quasi- identifier 

Notes

References

  1. 1.
    Pasupuleti, S.K., Ramalingam, S., Buyya, R.: An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. J. Netw. Comput. Appl. 64, 12–22 (2016)CrossRefGoogle Scholar
  2. 2.
    Chen, B.W., Rho, S., Yang, L.T.: Privacy-preserved big data analysis based on asymmetric imputation kernels and multiside similarities. Future Gener. Comput. Syst. 78, 859–866 (2016)CrossRefGoogle Scholar
  3. 3.
    Hemanth Kumar, N.P., Prabhudeva, S.: Security and privacy preservation on cloud-based big data analysis (CBDA): a review. Commun. Appl. Electron. 6(1), 35–42 (2016)CrossRefGoogle Scholar
  4. 4.
    Wang, H.: Privacy-preserving data sharing in cloud computing. J. Comput. Sci. Technol. 25(3), 401–414 (2010)CrossRefGoogle Scholar
  5. 5.
    Lyu, C., Sun, S.F., Zhang, Y., Pande, A., Haining, L., Dawu, G.: Privacy-preserving data sharing scheme over cloud for social applications. J. Netw. Comput. Appl. 74, 44–55 (2016)CrossRefGoogle Scholar
  6. 6.
    Hu, G., Xiao, D., Xiang, T., Bai, S., Zhang, Y.: A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud. Inf. Sci. 387, 132–145 (2017)CrossRefGoogle Scholar
  7. 7.
    Drosatosa, G., Efraimidis, P.S., Athanasiadis, I.N., Stevens, M., D’Hondt, E.: Privacy-preserving computation of participatory noise maps in the cloud. J. Syst. Softw. 92, 170–183 (2014)CrossRefGoogle Scholar
  8. 8.
    Yuan, J., Tian, Y.: Practical privacy-preserving mapreduce based K-means clustering over large-scale dataset. IEEE Trans. Cloud Comput. 3(2), 1 (2017)CrossRefGoogle Scholar
  9. 9.
    Hu, W., Wang, S., Chung, F.L., Liu, Y., Ying, W.: Privacy preserving and fast decision for novelty detection using support vector data description. Soft. Comput. 19(5), 1171–1186 (2014)CrossRefGoogle Scholar
  10. 10.
    Herranz, J., Nin, J., Rodríguez, P., Tassa, T.: Revisiting distance-based record linkage for privacy-preserving release of statistical datasets. Data Knowl. Eng. 100, 78–93 (2015)CrossRefGoogle Scholar
  11. 11.
    Patil, A.N., Phursule, R.N.: Efficient personalized privacy preservation using anonymization. Int. Res. J. Eng. Technol. (2016).  https://doi.org/10.21474/IJAR01/1721 CrossRefGoogle Scholar
  12. 12.
    Gou, Z., Yamaguchi, S., Gupta, B.B.: Analysis of Various Security Issues and Challenges in Cloud Computing Environment: A Survey, pp. 221–247. IGI Global, Pennsylvania (2017)Google Scholar
  13. 13.
    Gupta, B.B.: Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives, p. 666. CRC Press, Boca Raton (2018)Google Scholar
  14. 14.
    Nagesh, A., Agarwal, S: Preservation of privacy using back-propagation neural networks in cloud. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 5 (2015)Google Scholar
  15. 15.
    Gupta, B., Agrawal, D.P., Yamaguchi, S.: Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. IGI Global, Pennsylvania (2016)CrossRefGoogle Scholar
  16. 16.
    Stergiou, C., Psannis, K.E., Kim, B.E., Gupta, B.: Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. 78, 964–975 (2018)CrossRefGoogle Scholar
  17. 17.
    Zhang, X., Liu, C., Nepal, S., Chen, J.: An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. J. Comput. Syst. Sci. 79(5), 542–555 (2013)MathSciNetCrossRefGoogle Scholar
  18. 18.
    Negi, P., Mishra, A.: Enhanced CBF packet filtering method to detect DDoS attack in cloud computing environment. IJCSI Int. J. Comput. Sci. 10(2), 142–146 (2013)Google Scholar
  19. 19.
    Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y.: Vasilakos AV, Security and privacy for storage and computation in cloud computing. J. Inf. Sci. 258, 371–386 (2014)CrossRefGoogle Scholar
  20. 20.
    Gupta, B.B., Badve, O.P.: Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. Neural Comput. Appl. 28(12), 3655–3682 (2016)CrossRefGoogle Scholar
  21. 21.
    Gupta, B.B., Gupta, S., Chaudhary, P.: Enhancing the browser-side context-aware sanitization of suspicious HTML5 code for halting the DOM-based XSS vulnerabilities in cloud. Int. J. Cloud Appl. Comput. 7, 1–31 (2017)Google Scholar
  22. 22.
    Casinoa, F., Domingo-Ferrerb, J., Puigb, D.: A Solanasa (2014) k-anonymous approach to privacy preserving collaborative filtering. J. Comput. Syst. Sci. 81(6), 1000–1011 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2020

Authors and Affiliations

  • Rayapati Venkata Sudhakar
    • 1
    Email author
  • T. Ch. Malleswara Rao
    • 2
  1. 1.Department of Computer Science & EngineeringSt. Martin’s Engineering CollegeSecunderabadIndia
  2. 2.Sreenidhi Institute of Science and TechnologyHyderabadIndia

Personalised recommendations