A Data Obfuscation Method Using Ant-Lion-Rider Optimization for Privacy Preservation in the Cloud

被引:0
作者
Paramarthi, Nagaraju [1 ]
Rao, Nagamalleswara N. [2 ]
机构
[1] Acharya Nagarjuna Univ, Coll Engn & Technol, Guntur, Andhra Pradesh, India
[2] RVR & JC Coll Engn, Dept IT, Guntur, Andhra Pradesh, India
关键词
Cloud Computing; Cryptography; Data Obfuscation; Privacy; Utility; ATTRIBUTE-BASED ENCRYPTION;
D O I
10.4018/IJDST.300353
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, an obfuscation-based technique, namely AROA-based BMCG method, is developed for secure data transmission in cloud. Initially, the input data with the mixed attributes is provided to the privacy preservation process directly, where the data matrix and bilinear map coefficient generation co-efficient is multiplied through Hilbert space-based tensor product. Here, bilinear map coefficient is the new coefficient proposed to multiply with original data matrix, and the OB-MECC encryption is utilized in the privacy preservation phase to maintain the security of the data. The derivation of bilinear map coefficient is used to handle both the utility and the sensitive information. The new algorithm called AROA is developed by integrating the ALO with ROA. The performance and the comparative analysis of the proposed AROA-based BMCG method is done using the metrics, such as accuracy and information loss. The proposed AROA-based BMCG method obtained a maximal accuracy of 94% and minimal information loss of 6%, respectively.
引用
收藏
页数:21
相关论文
共 38 条
  • [1] Data Security Enhancement in Public Cloud Storage using Data Obfuscation and Steganography
    Amalarethinam, D. I. George
    FathimaMary, B.
    [J]. 2017 2ND WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT), 2017, : 181 - 184
  • [2] [Anonymous], 2016, INDIAN J SCI TECHNOL, DOI DOI 10.17485/ijst/2016/v9i19/93824
  • [3] [Anonymous], HEART DIS DATA SET
  • [4] [Anonymous], 2013, DATA OBFUSCATION
  • [5] [Anonymous], 2010, UCI Machine Learning Repository
  • [6] Arockiam L., 2014, INT J COMPUTER APPL, V88, P17
  • [7] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [8] A Novel Multi-Secret Sharing Approach for Secure Data Warehousing and On-Line Analysis Processing in the Cloud
    Attasena, Varunya
    Harbi, Nouria
    Darmont, Jerome
    [J]. INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2015, 11 (02) : 22 - 43
  • [9] RideNN: A New Rider Optimization Algorithm-Based Neural Network for Fault Diagnosis in Analog Circuits
    Binu, D.
    Kariyappa, B. S.
    [J]. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2019, 68 (01) : 2 - 26
  • [10] Brammya, 2019, J NETW COMMUN SYST, V2, P1