MLPAM: A Machine Learning and Probabilistic Analysis Based Model for Preserving Security and Privacy in Cloud Environment

被引:30
作者
Gupta, Ishu [1 ]
Gupta, Rishabh [1 ]
Singh, Ashutosh Kumar [1 ]
Buyya, Rajkumar [2 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Kurukshetra 136119, Haryana, India
[2] Univ Melbourne, Sch Comp & Informat Syst, Cloud Comp & Distributed Syst Lab, Melbourne, Vic 3010, Australia
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 03期
关键词
Cloud computing; Cryptography; Data models; Encryption; Computational modeling; Analytical models; Probabilistic logic; data leakage; data privacy; data security; distribution mechanism; machine learning;
D O I
10.1109/JSYST.2020.3035666
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The organizational valuable data needs to be shared with multiple parties and stakeholders in a cloud environment for storage, analysis, and data utilization. However, to ensure the security, preserve privacy while sharing the data effectively among various parties have become formidable challenges. In this article, by utilizing encryption, machine learning, and probabilistic approaches, we propose a novel model that supports multiple participants to securely share their data for distinct purposes. The model defines the access policy and communication protocol among the involved multiple untrusted parties to process the owners' data. The proposed model minimizes the risk associated with the leakage by providing a robust mechanism for prevention coupled with detection. The experimental results demonstrate the efficiency of the proposed model for different classifiers over various datasets. The proposed model ensures high accuracy and precision up to 97% and 100% relatively and secures a significant improvement up to 0.01%, 103%, 151%, 87%, 96%, 43%, and 186% for average probability, average success rate, detection rate, accuracy, precision, recall, and specificity, respectively, compared to the prior works that prove its effectiveness.
引用
收藏
页码:4248 / 4259
页数:12
相关论文
共 31 条
[1]   SeDaSC: Secure Data Sharing in Clouds [J].
Ali, Mazhar ;
Dhamotharan, Revathi ;
Khan, Eraj ;
Khan, Samee U. ;
Vasilakos, Athanasios V. ;
Li, Keqin ;
Zomaya, Albert Y. .
IEEE SYSTEMS JOURNAL, 2017, 11 (02) :395-404
[2]   Data Lineage in Malicious Environments [J].
Backes, Michael ;
Grimm, Niklas ;
Kate, Aniket .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (02) :178-191
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Dwork C., 2010, J. Priv. Confid., V1, DOI DOI 10.29012/JPC.V1I2.570
[5]  
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[6]   Semantic-Aware Searching Over Encrypted Data for Cloud Computing [J].
Fu, Zhangjie ;
Xia, Lili ;
Sun, Xingming ;
Liu, Alex X. ;
Xie, Guowu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) :2359-2371
[7]   Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack [J].
Gao, Chong-zhi ;
Cheng, Qiong ;
He, Pei ;
Susilo, Willy ;
Li, Jin .
INFORMATION SCIENCES, 2018, 444 :72-88
[8]   Layer-based Privacy and Security Architecture for Cloud Data Sharing [J].
Gupta, Ishu ;
Singh, Niharika ;
Singh, Ashutosh Kumar .
JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2019, 15 (02) :173-185
[9]  
Gupta I, 2020, J INF SCI ENG, V36, P993, DOI [10.6688/JISE.202009_36(5).0004, 10.6688/JISE.20200936(5).0004]
[10]   Dynamic threshold based information leaker identification scheme [J].
Gupta, Ishu ;
Singh, Ashutosh Kumar .
INFORMATION PROCESSING LETTERS, 2019, 147 :69-73