[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Privacy preserving framework using Gaussian mutation based firebug optimization in cloud computing

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

In recent years, the data exchange among the service providers and users has been increased tremendously. Various organizations like banking sectors, health as well as government associations collect and process the data regarding an individual for their beneficial purpose. However, data confidentiality and data privacy are still considered as significant challenges while sharing sensitive data. The cloud storage servers based on unencrypted data are susceptible to both external and internal attacks established by strangers or untrustworthy cloud service providers. Since the medical data are sensitive, the risk based on privacy enhances at the moment of subcontracting entity medical records to the cloud. The significant intention of the proposed approach involves securing and preserving sensitive healthcare data. Here, data hiding and data restoration operations are considered as two significant operations of the proposed framework. Initially, an optimal key is generated in the data hiding operation. This paper proposes a Gaussian mutation-based firebug optimization (GM-FBO) algorithm for the generation of an optimal key. The experiments are conducted using three different healthcare datasets, namely HPD, Medical MIMIC-III, and MHEALTH. The efficiency of the proposed model is compared with different state-of-the-art techniques to determine the efficiency of the system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no new data were created or analysed in this study.

References

  1. Elmisery AM, Rho S, Aborizka M (2019) A new computing environment for collective privacy protection from constrained healthcare devices to IoT cloud services. Clust Comput 22(1):1611–1638

    Article  Google Scholar 

  2. Sathya A, Raja SKS (2021) Privacy preservation-based access control intelligence for cloud data storage in smart healthcare infrastructure. Wirel Pers Commun 118(4):3595–3614

    Article  Google Scholar 

  3. Sendhil R and Amuthan A (2021) Contextual fully homomorphic encryption schemes-based privacy preserving framework for securing fog-assisted healthcare data exchanging applications. Int J Inform Technol, pp.1–9

  4. Liu H, Yao X, Yang T, Ning H (2018) Cooperative privacy preservation for wearable devices in hybrid computing-based smart health. IEEE Internet Things J 6(2):1352–1362

    Article  Google Scholar 

  5. Xie Q, Sundararaj V, Mr R (2021) Analyzing the factors affecting the attitude of public toward lockdown, institutional trust, and civic engagement activities. J Community Psychol. https://doi.org/10.1002/jcop.22681

    Article  Google Scholar 

  6. Mewada S, Gautam SS, Sharma P (2020) Artificial bee colony-based approach for privacy preservation of medical data. Int J Inform Syst Mod Des (IJISMD) 11(3):22–39

    Article  Google Scholar 

  7. Madan S, Goswami P (2020) A privacy preservation model for big data in map-reduced framework based on k-anonymisation and swarm-based algorithms. Int J Intell Eng Inform 8(1):38–53

    Google Scholar 

  8. Kalia P, Bansal D and Sofat S (2021) Privacy preservation in cloud computing using randomized encoding. Wirel Pers Commun, pp.1–13

  9. Tu NA, Wong KS, Demirci MF, Lee YK (2021) Toward efficient and intelligent video analytics with visual privacy protection for large-scale surveillance. J Supercomput. https://doi.org/10.1007/s11227-021-03865-7

    Article  Google Scholar 

  10. Mansour HO, Siraj MM, Ghaleb FA, Saeed F, Alkhammash EH, Maarof MA (2021) Quasi-Identifier recognition algorithm for privacy preservation of cloud data based on risk reidentification. Wirel Commun Mob Comput 2021:7154705. https://doi.org/10.1155/2021/7154705

    Article  Google Scholar 

  11. Alphonsa MA, Amudhavalli P (2018) Genetically modified glowworm swarm optimization based privacy preservation in cloud computing for healthcare sector. Evol Intel 11(1):101–116

    Article  Google Scholar 

  12. Wu X, Xu X, Dai F, Gao J, Ji G, and Qi L (2020) An Ensemble of Random Decision Trees with Personalized Privacy Preservation in Edge-Cloud Computing. In: 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), pp. 779–786. IEEE

  13. Abdo MA, Abdel-Hamid AA. and Elzouka HA (2020) A Cloud-based Mobile Healthcare Monitoring Framework with Location Privacy Preservation. In: 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT) (pp. 1–8). IEEE

  14. Khatiwada P, Bhusal H, Chatterjee A and Gerdes MW (2020) A Proposed Access Control-Based Privacy Preservation Model to Share Healthcare Data in Cloud. In: 2020 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)(50308) (pp. 40–47). IEEE

  15. Ahamad D, Hameed SA, Akhtar M (2020) A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. J King Saud Univ Comput Inform Sci. https://doi.org/10.1016/j.jksuci.2020.10.015

    Article  Google Scholar 

  16. Mondal A, Goswami RT (2021) Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security. Microprocess Microsyst 81:103719

    Article  Google Scholar 

  17. Yang X, Wang M, Wang X, Chen G, Wang C (2020) Stateless cloud auditing scheme for non-manager dynamic group data with privacy preservation. IEEE Access 8:212888–212903

    Article  Google Scholar 

  18. Fang C, Guo Y, Wang N, Ju A (2020) Highly efficient federated learning with strong privacy preservation in cloud computing. Comput Secur 96:101889

    Article  Google Scholar 

  19. Jayaram R, Prabakaran S (2020) Onboard disease prediction and rehabilitation monitoring on secure edge-cloud integrated privacy preserving healthcare system. Egypt Inform J. https://doi.org/10.1016/j.eij.2020.12.003

    Article  Google Scholar 

  20. Prabha KM, Saraswathi PV (2020) Suppressed K-anonymity multi-factor authentication based schmidt-samoa cryptography for privacy preserved data access in cloud computing. Comput Commun 158:85–94

    Article  Google Scholar 

  21. Mandala J, Rao MCS (2019) Privacy preservation of data using crow search with adaptive awareness probability. J Inform Secur Appl 44:157–169

    Google Scholar 

  22. Noel MM, Muthiah-Nakarajan V, Amali GB and Trivedi AS (2021) A new biologically inspired global optimization algorithm based on firebug reproductive swarming behaviour. Exp Syst Appl, p.115408

  23. Karthik E and Sethukarasi T (2021) Sarcastic user behavior classification and prediction from social media data using firebug swarm optimization-based long short-term memory. The J Supercomput, pp.1–25

  24. Sulis E, Terna P, Di Leva A, Boella G, Boccuzzi A (2020) Agent-oriented decision support system for business processes management with genetic algorithm optimization: an application in healthcare. J Med Syst 44(9):1–7

    Article  Google Scholar 

  25. Chen H, Zhang Q, Luo J, Xu Y, Zhang X (2020) An enhanced bacterial foraging optimization and its application for training kernel extreme learning machine. Appl Soft Comput 86:105884

    Article  Google Scholar 

  26. Shivashankar M, Mary SA (2021) Privacy preservation of data using modified rider optimization algorithm: optimal data sanitization and restoration model. Exp Syst 38(3):e12663

    Google Scholar 

  27. Asaumya (2021) HealthCare Problem: Prediction Stroke Patients, Kaggle, 17-Jul-2018. [Online]. Available: https://www.kaggle.com/asaumya/healthcare-problem-prediction-stroke-patients. [Accessed: 20-Oct-2021]

  28. Johnson AE, Pollard TJ, Shen L, Li-Wei HL, Feng M, Ghassemi M, Moody B, Szolovits P, Celi LA, Mark RG (2016) MIMIC-III, a freely accessible critical care database. Sci data 3(1):1–9

    Article  Google Scholar 

  29. Banos O, Garcia R, Holgado-Terriza JA, Damas M, Pomares H, Rojas I, Saez A and Villalonga C (2014) mHealthDroid: a novel framework for agile development of mobile health applications. In: International workshop on ambient assisted living. Springer, Cham pp. 91–98

  30. Bansal JC (2019) Particle swarm optimization. Evolutionary and swarm intelligence algorithms. Springer, Cham, pp 11–23

    Google Scholar 

  31. Yang XS (2009) Firefly algorithms for multimodal optimization. In: International symposium on stochastic algorithms. Springer: Berlin, Heidelberg pp. 169–178

  32. Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67

    Article  Google Scholar 

  33. Miranda-López V, Tchernykh A, Babenko M, Avetisyan A, Toporkov V, Drozdov AY (2020) 2Lbp-RRNS: two-levels RRNS with backpropagation for increased reliability and privacy-preserving of secure multi-clouds data storage. IEEE Access 8:199424–199439

    Article  Google Scholar 

  34. Sundararaj V, Muthukumar S, Kumar RS (2018) An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Comput Secur 77:277–288

    Article  Google Scholar 

  35. Sundararaj V (2016) An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. Int J Intell Eng Syst 9(3):117–126

    Google Scholar 

  36. Sundararaj V (2019) Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction. Int J Biomed Eng Technol 31(4):325

    Article  Google Scholar 

  37. Sundararaj V, Anoop V, Dixit P, Arjaria A, Chourasia U, Bhambri P, MR, Rejeesh. and Regu Sundararaj, (2020) CCGPA-MPPT: Cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system. Prog Photovoltaics Res Appl 28(11):1128–1145

    Article  Google Scholar 

  38. Ravikumar S, Kavitha D (2021) CNN-OHGS: CNN-oppositional-based Henry gas solubility optimization model for autonomous vehicle control system. J Field Robot. https://doi.org/10.1002/rob.22020

    Article  Google Scholar 

  39. Ravikumar S and Kavitha D (2020) IoT based home monitoring system with secure data storage by Keccak–Chaotic sequence in cloud server. J Ambient Intell Human Comput pp.1–13

  40. Rejeesh MR (2019) Interest point based face recognition using adaptive neuro fuzzy inference system. Multimed Tools Appl 78(16):22691–22710

    Article  Google Scholar 

  41. Kavitha D, Ravikumar S (2021) IOT and context-aware learning-based optimal neural network model for real-time health monitoring. Trans Emerg Telecommun Technol 32(1):e4132

    Google Scholar 

  42. Edwin AC, Madheswari AN (2013) Job scheduling and VM provisioning in clouds. In: 2013 Third International Conference on Advances in Computing and Communications. IEEE, pp 261–264

    Chapter  Google Scholar 

  43. Nirmal Kumar SJ, Ravimaran S, Alam MM (2020) An effective non-commutative encryption approach with optimized genetic algorithm for ensuring data protection in cloud computing. Comput Model Eng Sci 125(2):671–697

    Google Scholar 

  44. Gowthul Alam MM, Baulkani S (2017) Reformulated query-based document retrieval using optimised kernel fuzzy clustering algorithm. Int J Bus Intell Data Min 12(3):299

    Google Scholar 

  45. Alam MG, Baulkani S (2016) A hybrid approach for web document clustering using K-means and artificial bee colony algorithm. Int J Intell Eng Syst 9(4):11–20

    Google Scholar 

  46. Madheswari AN (2013) Performance optimized routing for SLA enforcement in cloud computing. In: 2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE). IEEE, pp 689–693

    Google Scholar 

  47. Sundararaj V, Selvi M (2021) Opposition grasshopper optimizer based multimedia data distribution using user evaluation strategy. Multimed Tools Appl 80(19):29875–29891

    Article  Google Scholar 

  48. Rejeesh MR, Thejaswini P (2020) MOTF: multi-objective optimal trilateral filtering based partial moving frame algorithm for image denoising. Multimed Tools Appl 79(37):28411–28430

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Anand.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Human and animal rights

This article does not contain any studies with human or animal subjects performed by any of the authors.

Informed consent

Informed consent does not apply as this was a retrospective review with no identifying patient information.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Anand, K., Vijayaraj, A. & Vijay Anand, M. Privacy preserving framework using Gaussian mutation based firebug optimization in cloud computing. J Supercomput 78, 9414–9437 (2022). https://doi.org/10.1007/s11227-021-04173-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-04173-w

Keywords

Navigation