Abstract
Sharing the data in the cloud environment may generate some loopholes and backdoor entries for intruders. In concern to the attributes of storage records, generally vertical and horizontal partitioning is used that can acquire resilient privacy strength. The paper portrays privacy perseverance hierarchy-oriented collaborative architecture to store data over the cloud. To improve privacy and not let attackers break through, an algorithm has been designed, which keeps the sensitive and non-sensitive records isolated by applying different properties such as cryptography & Anonymization series. It includes generalization, l-diversity & t-closeness methods. An archetype model in the cloud environment has been implemented for identifying the validity of the proposed algorithm and optimization of architecture. For the evaluation, the unification level has been incorporated into the progressive algorithm that reduces the time and increases speed for the data restructuring which is used in privacy perseverance architecture. Further, the findings incorporate generalized statistical study to identify the behavior of the properties used and the complexity analysis of the work has been presented.
Similar content being viewed by others
Data Availability
The datasets generated during and/or analysed during the current study are available in the Electronic Health Record (EHR) Data repository, https://datarade.ai/data-categories/electronic-health-record-ehr-data
References
Deng T, Li X, Xiong J, Wu Y (2021) POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing. Multimed Tools Appl 1–22
Gupta I, Gupta R, Singh AK, Buyya R (2021) MLPAM: a machine learning and probabilistic analysis based model for preserving security and privacy in cloud environment. IEEE Syst J 15(3):4248–4259
Gupta I, Singh N, Singh AK (2019) Layer-based privacy and security architecture for cloud data sharing. J Commun Softw Syst 15(2):173–185
Shi H, Wang Y, Li Y, Ren Y, Guo C (2021) Region-based reversible medical image watermarking algorithm for privacy protection and integrity authentication. Multimed Tools Appl 1–37
Singh N, Kumar J, Singh AK et al (2022) Privacy-preserving multi-keyword hybrid search over encrypted data in cloud. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-022-03889-8
Gupta I, Saxena D, Singh AK, Lee CN (2023) SeCoM: an outsourced cloud-based secure communication model for advanced privacy preserving data computing and protection. IEEE Syst J. https://doi.org/10.1109/JSYST.2023.3272611
Gupta I, Singh AK, Lee CN, Buyya R (2022) Secure data storage and sharing techniques for data protection in cloud environments: a systematic review, analysis, and future directions. IEEE Access 10:71247–71277
Singh N, Singh AK (2018) Data privacy protection mechanisms in cloud. Data Sci Eng 3:24–39. https://doi.org/10.1007/s41019-017-0046-0
Singh AK, Gupta I (2020) Online information leaker identification scheme for secure data sharing. Multimed Tools Appl 79:31165–31182
Cheng SL, Wang LJ, Huang G, Du AY (2019) A privacy-preserving image retrieval scheme based secure kNN, DNA coding and deep hashing. Multimed Tools Appl 1–23
Zhao X, Lin S, Chen X, Ou C, Liao C (2020) Application of face image detection based on deep learning in privacy security of intelligent cloud platform. Multimed Tools Appl 79(23):16707–16718
Singh N, Singh AK (2019) SQL-injection vulnerabilities resolving using valid security tool in cloud. Pertanika J Sci Technol 27(1)
Thilakanathan D, Chen S, Nepal S, Calvo R, Alem L (2014) A platform for secure monitoring and sharing of generic health data in the cloud. Futur Gener Comput Syst 35:102–113
Singh N, Gupta I, Singh AK (2022) Senso_Scale: a framework to preserve privacy over cloud using sensitivity range. Advances in cyber security and intelligent analytics, CRC Press-Taylor & Francis Group, FL, USA
Bayardo RJ Agrawal R (2005) Data privacy through optimal k-anonymization. In: 21st international conference on data engineering (ICDE’05). IEEE, pp 217–228
Morampudi MK, Prasad MV, Raju US (2020) Privacy-preserving iris authentication using fully homomorphic encryption. Multimed Tools Appl 79
Aggarwal CC, Yu PS (2008) A general survey of privacy-preserving data mining models and algorithms. In: Privacy-preserving data mining. Springer Boston, MA, pp 11–52
Kushida CA, Nichols DA, Jadrnicek R, Miller R, Walsh JK, Griffin K (2012) Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies. Medical Care 50(Suppl):S82
Liu C, Ranjan R, Yang C, Zhang X, Wang L, Chen J (2014) MuR-DPA: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans Comput 64(9):2609–2622
Ahson SA, Ilyas M (eds) (2010) Cloud computing and software services: theory and techniques. CRC Press
Quantin C, Jaquet-Chiffelle DO, Coatrieux G, Benzenine E, Allaert FA (2011) Medical record search engines, using pseudonymised patient identity: an alternative to centralised medical records. Int J Med Inf 80(2):e6–e11
Lv H, Liu Z, Hu Z, Nie L, Liu W, Ye X (2019) Research on improved privacy publishing algorithm based on set cover. Comput Sci Inf Syst 16(3):705–731
Gupta I, Singh AK (2019) Dynamic threshold based information leaker identification scheme. Inf Process Lett 147:69–73
Liu C, Yang C, Zhang X, Chen J (2015) External integrity verification for outsourced big data in cloud and IoT: a big picture. Futur Gener Comput Syst 49:58–67
Jin J, Ahn GJ, Hu H, Covington MJ, Zhang X (2011) Patient-centric authorization framework for electronic healthcare services. Comput Secur 30(2–3):116–127
Hu J, Chen HH, Hou TW (2010) A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Comput Stand Interfaces 32(5–6):274–280
Narayan S, Gagné M, Safavi-Naini R 2010 Privacy preserving EHR system using attribute-based infrastructure. In: Proceedings of the 2010 ACM workshop on cloud computing security workshop. pp 47–52
Kumar N, Kaur K, Misra SC, Iqbal R (2016) An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. Peer-to-Peer Netw Appl 9(5):824–840
Liu Z, Jiang ZL, Wang X, Yiu SM (2018) Practical attribute-based encryption: outsourcing decryption, attribute revocation and policy updating. J Netw Comput Appl 108:112–123
Li J, Wang S, Li Y, Wang H, Wang H, Wang H, Chen J, You Z (2019) An efficient attribute-based encryption scheme with policy update and file update in cloud computing. IEEE Trans Ind Inform 15(12):6500–6509
Neubauer T, Heurix J (2011) A methodology for the pseudonymization of medical data. Int J Med Inform 80(3):190–204
Rahman SM, Masud MM, Hossain MA, Alelaiwi A, Hassan MM, Alamri A (2016) Privacy preserving secure data exchange in mobile P2P cloud healthcare environment. Peer-to-Peer Netw Appl 9(5):894–909
Huang M, Chen Y, Chen BW, Liu J, Rho S, Ji W (2016) A semi-supervised privacy-preserving clustering algorithm for healthcare. Peer-to-Peer Netw Appl 9(5):864–875
Lloret J, Sendra S, Jimenez JM, Parra L (2016) Providing security and fault tolerance in P2P connections between clouds for mHealth services. Peer-to-Peer Netw Appl 9(5):876–893
Gupta R, Gupta I, Singh AK, Saxena D, Lee CN (2023) An IoT-centric data protection method for preserving security and privacy in cloud. IEEE Syst J 17(2):2445–2454
Taneja H, Singh AK (2015) Preserving privacy of patients based on re-identification risk. Procedia Comput Sci 70:448–454
Cern NH (2015) Cloud computing joins hunt for origins of the universe. Available. http://www.techrepublic.com/blog/european-technology
Bayardo RJ, Agrawal R (2005) Data privacy through optimal k-anonymization. In: 21st international conference on data engineering (ICDE’05). IEEE, pp 217–228
Fatma E, Hikal NA, Abou-Chadi FE (2013) Secret medical image sharing and EPR data embedding scheme over cloud computing environment. Int J Comput Appl 69(11)
Kumar N, Kaur K, Misra SC, Iqbal R (2016) An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. Peer-to-Peer Netw Appl 9(5):824–840
Kushida CA, Nichols DA, Jadrnicek R, Miller R, Walsh JK, Griffin K (2012) Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies. Med Care 50(Suppl):S82
Kantarcioglu M (2010) Other privacy definitions: l-diversity and t-closeness. Technical Report
(2011) Cloud Security Alliance. Technical report, http://www.cloudsecurityalliance.org
Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) l-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data (TKDD) 1(1):3–es
Huang M, Chen Y, Chen BW, Liu J, Rho S, Ji W (2016) A semi-supervised privacy-preserving clustering algorithm for healthcare. Peer-to-Peer Netw Appl 9(5):864–875
Anantwar RG, Chatur PN, Anantwar SG (2012) Cloud computing and security models: a survey. Int J Eng Sci Innovative Technol (IJESIT) 1(2):39–44
Hao Z, Zhong S, Yu N (2011) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans Knowl Data Eng 23(9):1432–1437
Hao Z, Zhong S, Yu N (2010) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. Technical report, SUNY Buffalo CSE department
Acknowledgements
This work was supported in part by the Science and Engineering Research Board (SERB) under the Department of Science and Technology (DST), Government of India, and in part by the National Institute of Technology, Kurukshetra, India.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Singh, A.K., Singh, N. & Gupta, I. Cloud-HPA: hierarchical privacy perseverance anatomy for data storage in cloud environment. Multimed Tools Appl 83, 37431–37451 (2024). https://doi.org/10.1007/s11042-023-16674-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-16674-2