Skip to main content
Log in

Cloud-HPA: hierarchical privacy perseverance anatomy for data storage in cloud environment

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Sharing the data in the cloud environment may generate some loopholes and backdoor entries for intruders. In concern to the attributes of storage records, generally vertical and horizontal partitioning is used that can acquire resilient privacy strength. The paper portrays privacy perseverance hierarchy-oriented collaborative architecture to store data over the cloud. To improve privacy and not let attackers break through, an algorithm has been designed, which keeps the sensitive and non-sensitive records isolated by applying different properties such as cryptography & Anonymization series. It includes generalization, l-diversity & t-closeness methods. An archetype model in the cloud environment has been implemented for identifying the validity of the proposed algorithm and optimization of architecture. For the evaluation, the unification level has been incorporated into the progressive algorithm that reduces the time and increases speed for the data restructuring which is used in privacy perseverance architecture. Further, the findings incorporate generalized statistical study to identify the behavior of the properties used and the complexity analysis of the work has been presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3
Algorithm 2
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data Availability

The datasets generated during and/or analysed during the current study are available in the Electronic Health Record (EHR) Data repository, https://datarade.ai/data-categories/electronic-health-record-ehr-data

References

  1. Deng T, Li X, Xiong J, Wu Y (2021) POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing. Multimed Tools Appl 1–22

  2. Gupta I, Gupta R, Singh AK, Buyya R (2021) MLPAM: a machine learning and probabilistic analysis based model for preserving security and privacy in cloud environment. IEEE Syst J 15(3):4248–4259

    Article  Google Scholar 

  3. Gupta I, Singh N, Singh AK (2019) Layer-based privacy and security architecture for cloud data sharing. J Commun Softw Syst 15(2):173–185

    Google Scholar 

  4. Shi H, Wang Y, Li Y, Ren Y, Guo C (2021) Region-based reversible medical image watermarking algorithm for privacy protection and integrity authentication. Multimed Tools Appl 1–37

  5. Singh N, Kumar J, Singh AK et al (2022) Privacy-preserving multi-keyword hybrid search over encrypted data in cloud. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-022-03889-8

  6. Gupta I, Saxena D, Singh AK, Lee CN (2023) SeCoM: an outsourced cloud-based secure communication model for advanced privacy preserving data computing and protection. IEEE Syst J. https://doi.org/10.1109/JSYST.2023.3272611

  7. Gupta I, Singh AK, Lee CN, Buyya R (2022) Secure data storage and sharing techniques for data protection in cloud environments: a systematic review, analysis, and future directions. IEEE Access 10:71247–71277

    Article  Google Scholar 

  8. Singh N, Singh AK (2018) Data privacy protection mechanisms in cloud. Data Sci Eng 3:24–39. https://doi.org/10.1007/s41019-017-0046-0

  9. Singh AK, Gupta I (2020) Online information leaker identification scheme for secure data sharing. Multimed Tools Appl 79:31165–31182

    Article  Google Scholar 

  10. Cheng SL, Wang LJ, Huang G, Du AY (2019) A privacy-preserving image retrieval scheme based secure kNN, DNA coding and deep hashing. Multimed Tools Appl 1–23

  11. Zhao X, Lin S, Chen X, Ou C, Liao C (2020) Application of face image detection based on deep learning in privacy security of intelligent cloud platform. Multimed Tools Appl 79(23):16707–16718

    Article  Google Scholar 

  12. Singh N, Singh AK (2019) SQL-injection vulnerabilities resolving using valid security tool in cloud. Pertanika J Sci Technol 27(1)

  13. Thilakanathan D, Chen S, Nepal S, Calvo R, Alem L (2014) A platform for secure monitoring and sharing of generic health data in the cloud. Futur Gener Comput Syst 35:102–113

    Article  Google Scholar 

  14. Singh N, Gupta I, Singh AK (2022) Senso_Scale: a framework to preserve privacy over cloud using sensitivity range. Advances in cyber security and intelligent analytics, CRC Press-Taylor & Francis Group, FL, USA

  15. Bayardo RJ Agrawal R (2005) Data privacy through optimal k-anonymization. In: 21st international conference on data engineering (ICDE’05). IEEE, pp 217–228

  16. Morampudi MK, Prasad MV, Raju US (2020) Privacy-preserving iris authentication using fully homomorphic encryption. Multimed Tools Appl 79

  17. Aggarwal CC, Yu PS (2008) A general survey of privacy-preserving data mining models and algorithms. In: Privacy-preserving data mining. Springer Boston, MA, pp 11–52

  18. Kushida CA, Nichols DA, Jadrnicek R, Miller R, Walsh JK, Griffin K (2012) Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies. Medical Care 50(Suppl):S82

    Article  Google Scholar 

  19. Liu C, Ranjan R, Yang C, Zhang X, Wang L, Chen J (2014) MuR-DPA: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans Comput 64(9):2609–2622

    Article  MathSciNet  Google Scholar 

  20. Ahson SA, Ilyas M (eds) (2010) Cloud computing and software services: theory and techniques. CRC Press

  21. Quantin C, Jaquet-Chiffelle DO, Coatrieux G, Benzenine E, Allaert FA (2011) Medical record search engines, using pseudonymised patient identity: an alternative to centralised medical records. Int J Med Inf 80(2):e6–e11

    Article  Google Scholar 

  22. Lv H, Liu Z, Hu Z, Nie L, Liu W, Ye X (2019) Research on improved privacy publishing algorithm based on set cover. Comput Sci Inf Syst 16(3):705–731

    Article  Google Scholar 

  23. Gupta I, Singh AK (2019) Dynamic threshold based information leaker identification scheme. Inf Process Lett 147:69–73

    Article  MathSciNet  Google Scholar 

  24. Liu C, Yang C, Zhang X, Chen J (2015) External integrity verification for outsourced big data in cloud and IoT: a big picture. Futur Gener Comput Syst 49:58–67

    Article  Google Scholar 

  25. Jin J, Ahn GJ, Hu H, Covington MJ, Zhang X (2011) Patient-centric authorization framework for electronic healthcare services. Comput Secur 30(2–3):116–127

    Article  Google Scholar 

  26. Hu J, Chen HH, Hou TW (2010) A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Comput Stand Interfaces 32(5–6):274–280

    Article  Google Scholar 

  27. Narayan S, Gagné M, Safavi-Naini R 2010 Privacy preserving EHR system using attribute-based infrastructure. In: Proceedings of the 2010 ACM workshop on cloud computing security workshop. pp 47–52

  28. Kumar N, Kaur K, Misra SC, Iqbal R (2016) An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. Peer-to-Peer Netw Appl 9(5):824–840

    Article  Google Scholar 

  29. Liu Z, Jiang ZL, Wang X, Yiu SM (2018) Practical attribute-based encryption: outsourcing decryption, attribute revocation and policy updating. J Netw Comput Appl 108:112–123

    Article  Google Scholar 

  30. Li J, Wang S, Li Y, Wang H, Wang H, Wang H, Chen J, You Z (2019) An efficient attribute-based encryption scheme with policy update and file update in cloud computing. IEEE Trans Ind Inform 15(12):6500–6509

    Article  Google Scholar 

  31. Neubauer T, Heurix J (2011) A methodology for the pseudonymization of medical data. Int J Med Inform 80(3):190–204

    Article  Google Scholar 

  32. Rahman SM, Masud MM, Hossain MA, Alelaiwi A, Hassan MM, Alamri A (2016) Privacy preserving secure data exchange in mobile P2P cloud healthcare environment. Peer-to-Peer Netw Appl 9(5):894–909

    Article  Google Scholar 

  33. Huang M, Chen Y, Chen BW, Liu J, Rho S, Ji W (2016) A semi-supervised privacy-preserving clustering algorithm for healthcare. Peer-to-Peer Netw Appl 9(5):864–875

    Article  Google Scholar 

  34. Lloret J, Sendra S, Jimenez JM, Parra L (2016) Providing security and fault tolerance in P2P connections between clouds for mHealth services. Peer-to-Peer Netw Appl 9(5):876–893

    Article  Google Scholar 

  35. Gupta R, Gupta I, Singh AK, Saxena D, Lee CN (2023) An IoT-centric data protection method for preserving security and privacy in cloud. IEEE Syst J 17(2):2445–2454

    Article  Google Scholar 

  36. Taneja H, Singh AK (2015) Preserving privacy of patients based on re-identification risk. Procedia Comput Sci 70:448–454

    Article  Google Scholar 

  37. Cern NH (2015) Cloud computing joins hunt for origins of the universe. Available. http://www.techrepublic.com/blog/european-technology

  38. Bayardo RJ, Agrawal R (2005) Data privacy through optimal k-anonymization. In: 21st international conference on data engineering (ICDE’05). IEEE, pp 217–228

  39. Fatma E, Hikal NA, Abou-Chadi FE (2013) Secret medical image sharing and EPR data embedding scheme over cloud computing environment. Int J Comput Appl 69(11)

  40. Kumar N, Kaur K, Misra SC, Iqbal R (2016) An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. Peer-to-Peer Netw Appl 9(5):824–840

    Article  Google Scholar 

  41. Kushida CA, Nichols DA, Jadrnicek R, Miller R, Walsh JK, Griffin K (2012) Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies. Med Care 50(Suppl):S82

    Article  Google Scholar 

  42. Kantarcioglu M (2010) Other privacy definitions: l-diversity and t-closeness. Technical Report

  43. (2011) Cloud Security Alliance. Technical report, http://www.cloudsecurityalliance.org

  44. Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) l-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data (TKDD) 1(1):3–es

  45. Huang M, Chen Y, Chen BW, Liu J, Rho S, Ji W (2016) A semi-supervised privacy-preserving clustering algorithm for healthcare. Peer-to-Peer Netw Appl 9(5):864–875

    Article  Google Scholar 

  46. Anantwar RG, Chatur PN, Anantwar SG (2012) Cloud computing and security models: a survey. Int J Eng Sci Innovative Technol (IJESIT) 1(2):39–44

    Google Scholar 

  47. Hao Z, Zhong S, Yu N (2011) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans Knowl Data Eng 23(9):1432–1437

    Article  Google Scholar 

  48. Hao Z, Zhong S, Yu N (2010) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. Technical report, SUNY Buffalo CSE department

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by the Science and Engineering Research Board (SERB) under the Department of Science and Technology (DST), Government of India, and in part by the National Institute of Technology, Kurukshetra, India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ishu Gupta.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, A.K., Singh, N. & Gupta, I. Cloud-HPA: hierarchical privacy perseverance anatomy for data storage in cloud environment. Multimed Tools Appl 83, 37431–37451 (2024). https://doi.org/10.1007/s11042-023-16674-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16674-2

Keywords

Navigation