A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization

被引:39
作者
Ahamad, Danish [1 ]
Hameed, Shabi Alam [2 ]
Akhtar, Mobin [3 ]
机构
[1] Shaqra Univ, Coll Sci & Arts, Dept Comp Sci, Sajir, Saudi Arabia
[2] Shaqra Univ, Dept Comp Sci, Coll Sci & Humanities, Huraymla, Saudi Arabia
[3] Riyadh Elm Univ, Dept Basic Sci, Riyadh, Saudi Arabia
关键词
Cloud security; Privacy preservation; Optimal key generation; Jaya-based shark smell optimization; Hybrid optimization; Multi-objective function; AUTHENTICATION; ENCRYPTION;
D O I
10.1016/j.jksuci.2020.10.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rising volume of sensitive and personal data being harvested by data controllers has increased the security essentials in the cloud system. The cloud module is not used just to store the data, but also to process them on cloud premises. Security for the cloud premises is essential as the cloud has lot of outsourced, unprotected sensitive data for the public access. This has resulted repeated data violations, and thus there is a need for the advanced legal data protection constraints. Various studies were conducted to adopt the privacy preservation in the cloud, and most of the state-of-the-art techniques fail to handle the optimal privacy when dealing with sensitive data, as it requires separate data sanitization and restoration models. To overcome this challenge, this paper tempts to develop the privacy preservation model in the cloud environment using the advancements of artificial intelligent techniques. Artificial Intelligent capabilities are working in the business cloud computing environment to make organizations more efficient, strategic, and insight-driven. However, by hosting the data, cloud computing offers businesses high flexibility, agility, and cost savings. The two main phases of the proposed privacy preservation system are the data sanitization and restoration. Moreover, the proposed sanitization process depends on the optimal key generation, which is performed by the hybrid meta-heuristic algorithm. This hybrid algorithm merges two well-performed algorithms, such as Shark Smell Optimization (SSO) and Jaya Algorithm (JA), and thus termed as Jaya-based Shark Smell Optimization (J-SSO). The optimal key generation is accomplished by deriving a multi-objective function that involves the parameters, such as the degree of modification, hiding ratio, and information preservation ratio. Finally, the performance analysis has proved the efficiency of the proposed model over the state-of-the-art models in enhancing cloud security. (C) 2022 Published by Elsevier B.V. on behalf of King Saud University.
引用
收藏
页码:2343 / 2358
页数:16
相关论文
共 35 条
[1]   A New Metaheuristic Algorithm Based on Shark Smell Optimization [J].
Abedinia, Oveis ;
Amjady, Nima ;
Ghasemi, Ali .
COMPLEXITY, 2016, 21 (05) :97-116
[2]   Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption [J].
Alabdulatif, Abdulatif ;
Kumarage, Heshan ;
Khalil, Ibrahim ;
Yi, Xun .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 90 :28-45
[3]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[4]   Assessing information security risks in the cloud: A case study of Australian local government authorities [J].
Ali, Omar ;
Shrestha, Anup ;
Chatfield, Akemi ;
Murray, Peter .
GOVERNMENT INFORMATION QUARTERLY, 2020, 37 (01)
[5]   Genetically modified glowworm swarm optimization based privacy preservation in cloud computing for healthcare sector [J].
Annie Alphonsa M.M. ;
Amudhavalli P. .
Evolutionary Intelligence, 2018, 11 (1-2) :101-116
[6]  
Behl A., 2011, Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT), P217, DOI 10.1109/WICT.2011.6141247
[7]   PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT [J].
Belguith, Sana ;
Kaaniche, Nesrine ;
Laurent, Maryline ;
Jemai, Abderrazak ;
Attia, Rabah .
COMPUTER NETWORKS, 2018, 133 :141-156
[8]   Threshold Prediction for Segmenting Tumour from Brain MRI Scans [J].
Beno, M. Marsaline ;
Valarmathi, I. R. ;
Swamy, S. M. ;
Rajakumar, B. R. .
INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY, 2014, 24 (02) :129-137
[9]   Analysis of Stability, Local Convergence, and Transformation Sensitivity of a Variant of the Particle Swarm Optimization Algorithm [J].
Bonyadi, Mohammad Reza ;
Michalewicz, Zbigniew .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2016, 20 (03) :370-385
[10]   Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations [J].
Choi, Myeonggil ;
Lee, Changhan .
SUSTAINABILITY, 2015, 7 (09) :12032-12051