Privacy Preserving with Modified Grey Wolf Optimization Over Big Data Using Optimal K Anonymization Approach

被引:6
作者
Kumar, S. Sai [1 ]
Reddy, Anumala Reethika [2 ]
Krishna, B. Sivarama [3 ]
Rao, J. Nageswara [3 ]
Kiran, Ajmeera [4 ]
机构
[1] PVP Siddhartha Inst Technol, Dept IT, Vijayawada, Andhra Pradesh, India
[2] Vignans Inst Informat Technol, Dept CSE, Visakhaptnam 530049, AP, India
[3] Lakireddy Bali Reddy Coll Engn, Dept Comp Sci & Engn, Mylavaram 521230, AP, India
[4] MLR Inst Technol MLRIT, Dept Comp Sci & Engn, Dundigal Police Stn Rd, Hyderabad 500043, Telangana, India
关键词
Data anonymization; map-reduce; grey Wolf optimization; k means clustering; fuzzy c means clustering; CHALLENGES; SECURITY;
D O I
10.1142/S0219265921410395
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An optimal approach to anonymization using small data is proposed in this study. Map Reduce is a big data processing framework used across distributed applications. Prior to the development of a map reduce framework, data are distributed and clustered using a hybrid clustering algorithm. The algorithm used for grouping together similar techniques utilises the k-means clustering algorithm, along with the MFCM clustering algorithm. Clustered data is then fed into the map reduce frame work after it has been clustered. In order to guarantee privacy, the optimal k anonymization method is recommended. When using generalisation and randomization, there are two techniques that can be employed: K-anonymity, which is unique to each, depends on the type of the quasi identifier attribute. Our method replaces the standard k anonymization process by employing an optimization algorithm that dynamically determines the optimal k value. This algorithm uses the Modified Grey Wolf Optimization (MGWO) algorithm for optimization. The memory, execution time, accuracy, and error value are used to assess the recommended method's practise. This experiment has shown that the suggested method will always finish ahead of the existing method by using the least amount of time while ensuring the greatest level of security. The current technique gets the lowest accuracy and the privacy proposed achieves the maximum accuracy while compared to the current technique. The solution is implemented in Java with Hadoop Map-Reduce, and it is tested and deployed in the cloud on Google Cloud Platform.
引用
收藏
页数:24
相关论文
共 28 条
[1]   Parallel implementation for 3D medical volume fuzzy segmentation [J].
AlZu'bi, Shadi ;
Shehab, Mohammed ;
Al-Ayyoub, Mahmoud ;
Jararweh, Yaser ;
Gupta, Brij .
PATTERN RECOGNITION LETTERS, 2020, 130 :312-318
[2]   Detection of flood disaster system based on IoT, big data and convolutional deep neural network [J].
Anbarasan, M. ;
Muthu, BalaAnand ;
Sivaparthipan, C. B. ;
Sundarasekar, Revathi ;
Kadry, Seifedine ;
Krishnamoorthy, Sujatha ;
Samuel, Dinesh Jackson R. ;
Dasel, A. Antony .
COMPUTER COMMUNICATIONS, 2020, 150 :150-157
[3]   Big Data security and privacy: A review [J].
Bardi, Matturdi ;
Zhou Xianwei ;
Li Shuai ;
Lin Fuhong .
CHINA COMMUNICATIONS, 2014, 11 (02) :135-145
[4]  
Bushra S. Nikkath, 2015, INT J INNOVATIVE RES, V3, P11937
[5]   A Multiple-Kernel Fuzzy C-Means Algorithm for Image Segmentation [J].
Chen, Long ;
Chen, C. L. Philip ;
Lu, Mingzhu .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2011, 41 (05) :1263-1274
[6]   A course on big data analytics [J].
Eckroth, Joshua .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 118 :166-176
[7]   Energy Big Data Analytics and Security: Challenges and Opportunities [J].
Hu, Jiankun ;
Vasilakos, Athanasios V. .
IEEE TRANSACTIONS ON SMART GRID, 2016, 7 (05) :2423-2436
[8]   Big data privacy: a technological perspective and review [J].
Jain P. ;
Gyanchandani M. ;
Khare N. .
Journal of Big Data, 2016, 3 (01)
[9]  
Kiran Ajmeera, 2020, Proceedings of the Third International Conference on Computational Intelligence and Informatics. ICCII 2018. Advances in Intelligent Systems and Computing (AISC 1090), P723, DOI 10.1007/978-981-15-1480-7_66
[10]  
Kiran Ajmeera, 2018, RECENT PATENTS COMPU, V11, P1, DOI [10.2174/2213275911666181119113913, DOI 10.2174/2213275911666181119113913]