Skip to main content
Log in

Brain storm-based Whale Optimization Algorithm for privacy-protected data publishing in cloud computing

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Cloud computing serves as a major boost for the digital era since it handles data from a large number of users simultaneously. Besides the several useful characteristics, providing security to the data stored in the cloud platform is a major challenge for the service providers. Privacy preservation schemes introduced in the literature trying to enhance the privacy and utility of the data structures by modifying the database with the secret key. In this paper, an optimization scheme, Brain Storm based Whale Optimization Algorithm (BS-WOA), is introduced for identifying the secret key. The database from the data owner is modified with the optimal secret key for constructing the retrievable perturbation data for preserving the privacy and utility. The proposed BS-WOA is designed through the hybridization of Brain Storm Optimization and Whale Optimization Algorithm. Simulation of the proposed technique with the BS-WOA is done in the three standard databases, such as chess T10I4D100 K, and the retail databases. When evaluated for the key size of 256, the proposed BS-WOA achieved privacy value of 0.186 and utility value of 0.8777 for the chess database, and thus, has improved performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Lee, J., Ko, H.J., Lee, E., Choi, W., Kim, U.M.: A data sanitization method for privacy preserving data re-publication. In: Proceedings of IEEE Fourth International Conference on Networked Computing and Advanced Information Management, pp. 28–31 (2008)

  2. Pan, Y., Xiaolin, G., Jian, A., Jing, Y., Jiancai, L., Feng, T.: A retrievable data perturbation method used in privacy-preserving in cloud computing. China Commun. 11(8), 73–84 (2014)

    Google Scholar 

  3. Kao, Y.H., Lee, W.B., Hsu, T.Y., Lin, C.Y.: Data perturbation method based on contrast mapping for reversible privacy-preserving data mining. J. Med. Biol. Eng. 35(6), 789–794 (2015)

    Google Scholar 

  4. Chinnasamy, A., Sivakumar, B., Selvakumari, P., Suresh, A.: Minimum connected dominating set based RSU allocation for smartCloud vehicles in VANET. Clust. Comput. (2018). https://doi.org/10.1007/s10586-018-1760-8

    Google Scholar 

  5. Huang, Q.L., YANG, Y.X., Fu, J.Y., Niu, X.X.: Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing. J. China Univ. Posts Telecommun. 20(6), 88–95 (2013)

    Google Scholar 

  6. Cheng, Y., Wang, Z.Y., Ma, J., Wu, J.J., Mei, S.Z., Ren, J.C.: Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage. J. Zhejiang Univ. Sci. C 14(2), 85–97 (2013)

    Google Scholar 

  7. Yang, K., Zhang, K., Jia, X., Hasan, M.A., Shen, X.S.: Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms. Inf. Sci. 387, 116–131 (2017)

    Google Scholar 

  8. Allard, T., Nguyen, B., Pucheral, P.: METAP: revisiting privacy-preserving data publishing using secure devices. Distrib. Parallel Databases 32(2), 191–244 (2014)

    Google Scholar 

  9. Jaina, I., Jain, V.K., Jain, R.: Correlation feature selection based improved-Binary Particle Swarm Optimization for gene selection and cancer classification. Appl. Soft Comput. 62, 203–215 (2018)

    Google Scholar 

  10. Sabin Begum, R., Sugumar, R.: Novel entropy-based approach for cost-effective privacy preservation of intermediate datasets in cloud. Clust. Comput. (2017). https://doi.org/10.1007/s10586-017-1238-0

    Google Scholar 

  11. Komninos, N., Junejo, A.K.: Privacy preserving attribute-based encryption for multiple cloud collaborative environment. In Proceedings of IEEE/ACM 8th International Conference on Utility and Cloud Computing, pp. 595–600 (2015)

  12. Fahad, A., Tari, Z., Almalawi, A., Goscinski, A.: PPFSCADA: privacy preserving framework for SCADA data publishing. Future Gener. Comput. Syst. 37, 496–511 (2014)

    Google Scholar 

  13. Wang, H.: Privacy-preserving data sharing in cloud computing. J. Comput. Sci. Technol. 25(3), 401–414 (2010)

    Google Scholar 

  14. Hong, M.Q., Zhao, W.B., Wang, P.Y.: Homomorphic encryption scheme based on elliptic curve cryptography for privacy protection of cloud computing. In: Proceedings of IEEE International Conference on Intelligent Data and Security (IDS), pp. 152–157 (2016)

  15. Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceeding of the 13th ACM Conference on Computer and Communications Security (CCS ‘06), pp. 79–88 (2006)

  16. Jiang, X., Yu, J., Kong, F., Cheng, X., Hao, R.: A novel privacy preserving keyword search scheme over encrypted cloud data. In: Proceedings of IEEE 10th International Conference on P2P, Parallel, Grid, Cloud, and Internet Computing, pp. 836–839 (2015)

  17. Palanisamy, B., Liu, L.: Privacy-preserving data publishing in the cloud: a multi-level utility-controlled approach. In: Proceedings of IEEE 8th International Conference on Cloud Computing, pp. 130–137 (2015)

  18. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowledge-Based Syst. 10(2), 557–570 (2002)

    Google Scholar 

  19. Cao, Z., Rong, X., Du, Z.: An improved brain storm optimization with dynamic clustering strategy. MATEC Web Conf. 95, 19002 (2017). https://doi.org/10.1051/matecconf/20179519002

    Google Scholar 

  20. Song, W., Wang, B., Wang, Q., Peng, Z., Lou, W., Cui, Y.: A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications. J. Parallel Distrib. Comput. 99, 14–27 (2016)

    Google Scholar 

  21. Mafarja, M., Mirjalili, S.: Whale optimization approaches for wrapper feature selection. Appl. Soft Comput. 62, 441–453 (2017)

    Google Scholar 

  22. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud Data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)

    Google Scholar 

  23. Langville, A.N., Stewart, W.J.: The Kronecker product and stochastic automata networks. J. Comput. Appl. Math. 167, 429–447 (2004)

    Google Scholar 

  24. Liu, S., Li, T.: A new hypernetwork model based on matrix operation. In: 2015 10th International Conference on Intelligent Systems and Knowledge Engineering (ISKE), Taipeipp. pp. 176–182 (2015)

  25. Frequent Itemset Mining Dataset Repository. http://fimi.ua.ac.be/data/. Accessed Nov 2017

  26. Wu, Z., Xu, G., Lu, C., Chen, E., Jiang, F., Li, G.: An effective approach for the protection of privacy text data in the CloudDB. World Wide Web (2017). https://doi.org/10.1007/s11280-017-0491-8

    Google Scholar 

  27. Suresh, A., Varatharajan, R.: Competent resource provisioning and distribution techniques for cloud computing environment. Clust. Comput. (2017). https://doi.org/10.1007/s10586-017-1293-6

    Google Scholar 

  28. Qiu, M., Ming, Z., Li, J., Gai, K., Zong, Z.: Phase-change memory optimization for green cloud with genetic algorithm. IEEE Trans. Comput. 64(12), 3528–3540 (2015)

    Google Scholar 

  29. Mirjalili, S., Lewis, A.: The whale optimization algorithm. Adv. Eng. Softw. 95, 51–67 (2016)

    Google Scholar 

  30. Shi, Y., Brain storm optimization algorithm. In: International Conference on Swarm Intelligence, pp. 303–309. Springer, Berlin (2011)

  31. Mafarja, M.M., Mirjalili, S.: Hybrid Whale Optimization Algorithm with simulated annealing for feature selection. Neurocomputing 260, 302–312 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Thanga Revathi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thanga Revathi, S., Ramaraj, N. & Chithra, S. Brain storm-based Whale Optimization Algorithm for privacy-protected data publishing in cloud computing. Cluster Comput 22 (Suppl 2), 3521–3530 (2019). https://doi.org/10.1007/s10586-018-2200-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-2200-5

Keywords

Navigation