Abstract
Cloud file access is the most widely used peer-to-peer (P2P) application, in which users share their data and other users can access it via P2P networks. The need for security in the cloud system grows day by day, as organizations collect a massive amount of users' confidential information. Both the outsourced data and the unprotected user's sensitive data need to be protected under the cloud security claims since the advanced P2P networks are prone to damage. The recurring security breach in the cloud necessitates the establishment of an advanced legal data protection strategy. Various researchers have attempted to develop privacy-preserving cloud computing systems employing Artificial Intelligence (AI) techniques, however, they have not been successful in achieving optimal privacy. AI approaches implemented in the cloud assist applications in efficient data management by analyzing, updating, classifying, and providing users with real-time decision-making support. AI approaches can also detect fraudulent activity by analyzing deviations in normal data patterns entering the system. To handle the security concerns in the cloud, this paper presents a novel cybersecurity architecture using the Chaotic chemotaxis and Gaussian mutation-based Bacterial Foraging Optimization with a genetic crossover operation (CGBFO-GC) algorithm. The CGBF0-GC algorithm cleanses and restores the data using a multiobjective optimal key generation mechanism based on the following constraints: data preservation, modification, and hiding ratio. The simulation results show that the proposed methodology outperforms existing methods in terms of convergence, key sensitivity analysis, and resistance to known and chosen-plaintext attacks.
Similar content being viewed by others
Availability of data and material
Data sharing is not applicable to this article as no new data were created or analyzed in this study.
References
Sabin Begum R, Sugumar R (2019) Novel entropy-based approach for cost-effective privacy preservation of intermediate datasets in cloud. Clust Comput 22(4):9581–9588
Kanwal T, Anjum A, Khan A (2020) Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities. Clust Comput 1–25
Kaaniche N, Laurent M (2017) Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput Commun 111:120–141
Ma Z, Ma J, Miao Y, Liu X, Choo KKR, Yang R, Wang X (2020) Lightweight privacy-preserving medical diagnosis in edge computing. IEEE Trans Serv Comput
Fang C, Guo Y, Wang N, Ju A (2020) Highly efficient federated learning with strong privacy preservation in cloud computing. Comput Secur 96:101889
Berlato S, Carbone R, Lee AJ, Ranise S (2020, October). Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (pp. 208–221)
Shankar K (2021) Improving the Security and Authentication of the Cloud with IoT using Hybrid Optimization Based Quantum Hash Function. Journal of Intelligent Systems and Internet of Things 1(2):61–71
Sundararaj V (2016) An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. Int J Intell Eng Syst 9(3):117–126
Sundararaj V, Anoop V, Dixit P, Arjaria A, Chourasia U, Bhambri P, Rejeesh MR, Sundararaj R (2020) CCGPA-MPPT: Cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system. Prog Photovolt Res Appl 28(11):1128–1145
Vinu S (2019) Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wirel Pers Commun 104(1):173–197
Sundararaj V, Muthukumar S, Kumar RS (2018) An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Comput Secur 77:277–288
Rejeesh MR (2019) Interest point based face recognition using adaptive neuro fuzzy inference system. Multimed Tools Appl 78(16):22691–22710
Gowthul Alam MM, Baulkani S (2019) Geometric structure information based multi-objective function to increase fuzzy clustering performance with artificial and real-life data. Soft Comput 23(4):1079–1098
Gowthul Alam MM, Baulkani S (2019) Local and global characteristics-based kernel hybridization to increase optimal support vector machine performance for stock market prediction. Knowl Inf Syst 60(2):971–1000
Hassan BA (2020) CSCF: a chaotic sine cosine firefly algorithm for practical application problems. Neural Comput Appl 1–20
Hassan BA, Rashid TA (2021) A multidisciplinary ensemble algorithm for clustering heterogeneous datasets. Neural Comput Applic 1–24
Haseena KS, Anees S, Madheswari N (2014) Power optimization using EPAR protocol in MANET. IJISET-International Journal of Innovative Science, Engineering & Technology 1(6)
Jose J, Gautam N, Tiwari M, Tiwari T, Suresh A, Sundararaj V, Rejeesh MR (2021) An image quality enhancement scheme employing adolescent identity search algorithm in the NSST domain for multimodal medical image fusion. Biomed Signal Process Control 66:102480
Anand K, Vijayaraj A, Vijay Anand M (2022) Privacy preserving framework using Gaussian mutation based firebug optimization in cloud computing. J Supercomput 78:9414–9437. https://doi.org/10.1007/s11227-021-04173-w
Ahamad D, Hameed SA, Akhtar M (2020) A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. Journal of King Saud University-Computer and Information Sciences
Ahmad W, Wang S, Ullah A, Mahmood Z (2018) Reputation-aware trust and privacy-preservation for mobile cloud computing. IEEE Access 6:46363–46381
Li J, Kuang X, Lin S, Ma X, Tang Y (2020) Privacy preservation for machine learning training and classification based on homomorphic encryption schemes. Inf Sci 526:166–179
Abirami P, Vijay Bhanu S (2020) Enhancing cloud security using crypto-deep neural network for privacy preservation in trusted environment. Soft Comput 24(24):18927–18936
Park JY, Huh EN (2020) A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement. J Inf Process Syst 16.1
Meng S, Huang W, Yin X, Khosravi MR, Li Q, Wan S, Qi L (2020) Security-aware dynamic scheduling for real-time optimization in cloud-based industrial applications. IEEE Trans Ind Inf
Sugumaran M, Bala Murugan B, Kamalraj D (2014) An architecture for data security in cloud computing. In 2014 World Congress on Computing and Communication Technologies, pp. 252–255. IEEE
Gupta I, Singh N, Singh AK (2019) Layer-based privacy and security architecture for cloud data sharing. J Commun Softw Syst 15(2):173–185
Cardoso Margarida GMS (2013) Logical discriminant models – Chapter 8 in Quantitative Modeling in Marketing and Management Edited by Luiz Moutinho and Kun-Huang Huarng. World Scientific. p. 223–253. ISBN 978–9814407717
Wl odzisl and Rafal Adamczak and Krzysztof Grabczewski and Grzegorz Zal. A hybrid method for extraction of logical rules from data. Department of Computer Methods, Nicholas Copernicus University
De Vito S, Massera E, Piga M, Martinotto L, Di Francia G (2008) On field calibration of an electronic nose for benzene estimation in an urban pollution monitoring scenario. Sensors Actuators B Chem 129(2):750–757. ISSN 0925–4005
Rajasekar N, Kumar NK, Venugopalan R (2013) Bacterial foraging algorithm based solar PV parameter estimation. Sol Energy 97:255–265
Xu Y, Chen H, Heidari AA, Luo J, Zhang Q, Zhao X, Li C (2019) An efficient chaotic mutative moth-flame-inspired optimizer for global optimization tasks. Expert Syst Appl 129:135–155
Yue X, Zhang H (2020) Modified hybrid bat algorithm with genetic crossover operation and smart inertia weight for multilevel image segmentation. Appl Soft Comput 90:106157
Manogaran G, Thota C, Kumar MV (2016) MetaCloudDataStorage architecture for big data security in cloud computing. Procedia Comput Sci 87:128–133
Talib AM, Atan R, Abdullah R, Murad MAA (2010) Security framework of cloud data storage based on multi agent system architecture: Semantic literature review. Comput Inform Sci 3(4):175
Ramasamy S, Gnanamurthy RK (2020) Cluster Based Multi Layer User Authentication Data Center Storage Architecture for Big Data Security in Cloud Computing. J Internet Technol 21(1):159–171
Sharma S, Mishra A, Singhai D (2020) Secure cloud storage architecture for digital medical record in cloud environment using blockchain
Thakare VR, Singh KJ (2020) Cloud Security Architecture Based on Fully Homomorphic Encryption. In Architecture and Security Issues in Fog Computing Applications, pp. 83–89. IGI Global
Ghani A, Badshah A, Jan S, Alshdadi AA, Daud A (2020) Cloud storage architecture: research challenges and opportunities. arXiv preprint arXiv:2004.06809
Kumar YK, Shafi RM (2020) An efficient and secure data storage in cloud computing using modified RSA public key cryptosystem. Int J Electr Comput Eng 10(1):530
Malik A, Aggarwal M, Sharma B, Singh A, Singh KK (2020) Optimal Elliptic Curve Cryptography-Based Effective Approach for Secure Data Storage in Clouds. Int J Knowl Syst Sci (IJKSS) 11(4):65–81
Murugesan A, Saminathan B, Al‐Turjman F, Kumar RL (2020) Analysis on homomorphic technique for data security in fog computing. Trans Emerg Telecommun Technol e3990
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Anand, K., Vijayaraj, A. & Vijay Anand, M. An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud. Peer-to-Peer Netw. Appl. 15, 2007–2020 (2022). https://doi.org/10.1007/s12083-022-01322-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-022-01322-7