[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content

Advertisement

Log in

An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Cloud file access is the most widely used peer-to-peer (P2P) application, in which users share their data and other users can access it via P2P networks. The need for security in the cloud system grows day by day, as organizations collect a massive amount of users' confidential information. Both the outsourced data and the unprotected user's sensitive data need to be protected under the cloud security claims since the advanced P2P networks are prone to damage. The recurring security breach in the cloud necessitates the establishment of an advanced legal data protection strategy. Various researchers have attempted to develop privacy-preserving cloud computing systems employing Artificial Intelligence (AI) techniques, however, they have not been successful in achieving optimal privacy. AI approaches implemented in the cloud assist applications in efficient data management by analyzing, updating, classifying, and providing users with real-time decision-making support. AI approaches can also detect fraudulent activity by analyzing deviations in normal data patterns entering the system. To handle the security concerns in the cloud, this paper presents a novel cybersecurity architecture using the Chaotic chemotaxis and Gaussian mutation-based Bacterial Foraging Optimization with a genetic crossover operation (CGBFO-GC) algorithm. The CGBF0-GC algorithm cleanses and restores the data using a multiobjective optimal key generation mechanism based on the following constraints: data preservation, modification, and hiding ratio. The simulation results show that the proposed methodology outperforms existing methods in terms of convergence, key sensitivity analysis, and resistance to known and chosen-plaintext attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Availability of data and material

Data sharing is not applicable to this article as no new data were created or analyzed in this study.

References

  1. Sabin Begum R, Sugumar R (2019) Novel entropy-based approach for cost-effective privacy preservation of intermediate datasets in cloud. Clust Comput 22(4):9581–9588

  2. Kanwal T, Anjum A, Khan A (2020) Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities. Clust Comput 1–25

  3. Kaaniche N, Laurent M (2017) Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput Commun 111:120–141

    Article  Google Scholar 

  4. Ma Z, Ma J, Miao Y, Liu X, Choo KKR, Yang R, Wang X (2020) Lightweight privacy-preserving medical diagnosis in edge computing. IEEE Trans Serv Comput

  5. Fang C, Guo Y, Wang N, Ju A (2020) Highly efficient federated learning with strong privacy preservation in cloud computing. Comput Secur 96:101889

  6. Berlato S, Carbone R, Lee AJ, Ranise S (2020, October). Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (pp. 208–221)

  7. Shankar K (2021) Improving the Security and Authentication of the Cloud with IoT using Hybrid Optimization Based Quantum Hash Function. Journal of Intelligent Systems and Internet of Things 1(2):61–71

    Google Scholar 

  8. Sundararaj V (2016) An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. Int J Intell Eng Syst 9(3):117–126

    Google Scholar 

  9. Sundararaj V, Anoop V, Dixit P, Arjaria A, Chourasia U, Bhambri P, Rejeesh MR, Sundararaj R (2020) CCGPA-MPPT: Cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system. Prog Photovolt Res Appl 28(11):1128–1145

    Article  Google Scholar 

  10. Vinu S (2019) Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wirel Pers Commun 104(1):173–197

    Article  Google Scholar 

  11. Sundararaj V, Muthukumar S, Kumar RS (2018) An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Comput Secur 77:277–288

    Article  Google Scholar 

  12. Rejeesh MR (2019) Interest point based face recognition using adaptive neuro fuzzy inference system. Multimed Tools Appl 78(16):22691–22710

    Article  Google Scholar 

  13. Gowthul Alam MM, Baulkani S (2019) Geometric structure information based multi-objective function to increase fuzzy clustering performance with artificial and real-life data. Soft Comput 23(4):1079–1098

    Article  Google Scholar 

  14. Gowthul Alam MM, Baulkani S (2019) Local and global characteristics-based kernel hybridization to increase optimal support vector machine performance for stock market prediction. Knowl Inf Syst 60(2):971–1000

    Article  Google Scholar 

  15. Hassan BA (2020) CSCF: a chaotic sine cosine firefly algorithm for practical application problems. Neural Comput Appl 1–20

  16. Hassan BA, Rashid TA (2021) A multidisciplinary ensemble algorithm for clustering heterogeneous datasets. Neural Comput Applic 1–24

  17. Haseena KS, Anees S, Madheswari N (2014) Power optimization using EPAR protocol in MANET. IJISET-International Journal of Innovative Science, Engineering & Technology 1(6)

  18. Jose J, Gautam N, Tiwari M, Tiwari T, Suresh A, Sundararaj V, Rejeesh MR (2021) An image quality enhancement scheme employing adolescent identity search algorithm in the NSST domain for multimodal medical image fusion. Biomed Signal Process Control 66:102480

  19. Anand K, Vijayaraj A, Vijay Anand M (2022) Privacy preserving framework using Gaussian mutation based firebug optimization in cloud computing. J Supercomput 78:9414–9437. https://doi.org/10.1007/s11227-021-04173-w

    Article  Google Scholar 

  20. Ahamad D, Hameed SA, Akhtar M (2020) A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. Journal of King Saud University-Computer and Information Sciences

  21. Ahmad W, Wang S, Ullah A, Mahmood Z (2018) Reputation-aware trust and privacy-preservation for mobile cloud computing. IEEE Access 6:46363–46381

    Article  Google Scholar 

  22. Li J, Kuang X, Lin S, Ma X, Tang Y (2020) Privacy preservation for machine learning training and classification based on homomorphic encryption schemes. Inf Sci 526:166–179

    Article  MathSciNet  Google Scholar 

  23. Abirami P, Vijay Bhanu S (2020) Enhancing cloud security using crypto-deep neural network for privacy preservation in trusted environment. Soft Comput 24(24):18927–18936

  24. Park JY, Huh EN (2020) A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement. J Inf Process Syst 16.1

  25. Meng S, Huang W, Yin X, Khosravi MR, Li Q, Wan S, Qi L (2020) Security-aware dynamic scheduling for real-time optimization in cloud-based industrial applications. IEEE Trans Ind Inf

  26. Sugumaran M, Bala Murugan B, Kamalraj D (2014) An architecture for data security in cloud computing. In 2014 World Congress on Computing and Communication Technologies, pp. 252–255. IEEE

  27. Gupta I, Singh N, Singh AK (2019) Layer-based privacy and security architecture for cloud data sharing. J Commun Softw Syst 15(2):173–185

  28. Cardoso Margarida GMS (2013) Logical discriminant models – Chapter 8 in Quantitative Modeling in Marketing and Management Edited by Luiz Moutinho and Kun-Huang Huarng. World Scientific. p. 223–253. ISBN 978–9814407717

  29. Wl odzisl and Rafal Adamczak and Krzysztof Grabczewski and Grzegorz Zal. A hybrid method for extraction of logical rules from data. Department of Computer Methods, Nicholas Copernicus University

  30. De Vito S, Massera E, Piga M, Martinotto L, Di Francia G (2008) On field calibration of an electronic nose for benzene estimation in an urban pollution monitoring scenario. Sensors Actuators B Chem 129(2):750–757. ISSN 0925–4005

  31. Rajasekar N, Kumar NK, Venugopalan R (2013) Bacterial foraging algorithm based solar PV parameter estimation. Sol Energy 97:255–265

  32. Xu Y, Chen H, Heidari AA, Luo J, Zhang Q, Zhao X, Li C (2019) An efficient chaotic mutative moth-flame-inspired optimizer for global optimization tasks. Expert Syst Appl 129:135–155

  33. Yue X, Zhang H (2020) Modified hybrid bat algorithm with genetic crossover operation and smart inertia weight for multilevel image segmentation. Appl Soft Comput 90:106157

  34. Manogaran G, Thota C, Kumar MV (2016) MetaCloudDataStorage architecture for big data security in cloud computing. Procedia Comput Sci 87:128–133

  35. Talib AM, Atan R, Abdullah R, Murad MAA (2010) Security framework of cloud data storage based on multi agent system architecture: Semantic literature review. Comput Inform Sci 3(4):175

    Google Scholar 

  36. Ramasamy S, Gnanamurthy RK (2020) Cluster Based Multi Layer User Authentication Data Center Storage Architecture for Big Data Security in Cloud Computing. J Internet Technol 21(1):159–171

    Google Scholar 

  37. Sharma S, Mishra A, Singhai D (2020) Secure cloud storage architecture for digital medical record in cloud environment using blockchain

  38. Thakare VR, Singh KJ (2020) Cloud Security Architecture Based on Fully Homomorphic Encryption. In Architecture and Security Issues in Fog Computing Applications, pp. 83–89. IGI Global

  39. Ghani A, Badshah A, Jan S, Alshdadi AA, Daud A (2020) Cloud storage architecture: research challenges and opportunities. arXiv preprint arXiv:2004.06809

  40. Kumar YK, Shafi RM (2020) An efficient and secure data storage in cloud computing using modified RSA public key cryptosystem. Int J Electr Comput Eng 10(1):530

  41. Malik A, Aggarwal M, Sharma B, Singh A, Singh KK (2020) Optimal Elliptic Curve Cryptography-Based Effective Approach for Secure Data Storage in Clouds. Int J Knowl Syst Sci (IJKSS) 11(4):65–81

  42. Murugesan A, Saminathan B, Al‐Turjman F, Kumar RL (2020) Analysis on homomorphic technique for data security in fog computing. Trans Emerg Telecommun Technol e3990

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Anand.

Ethics declarations

Conflict of interest

The authors declare that they do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Anand, K., Vijayaraj, A. & Vijay Anand, M. An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud. Peer-to-Peer Netw. Appl. 15, 2007–2020 (2022). https://doi.org/10.1007/s12083-022-01322-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-022-01322-7

Keywords

Navigation