Differential and Access Policy Based Privacy-Preserving Model in Cloud Environment

被引:6
作者
Gupta, Rishabh [1 ]
Singh, Ashutosh Kumar [1 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Kurukshetra, Haryana, India
来源
JOURNAL OF WEB ENGINEERING | 2022年 / 21卷 / 03期
关键词
Cloud computing; differential privacy; machine learning; privacy-preserving; access control;
D O I
10.13052/jwe1540-9589.2132
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud computing has multiple benefits in terms of minimum cost, maximum efficiency, and high scalability, which prompts shifting a large amount of data from the local machine to the cloud environment for storage, computation, and data sharing among various parties stakeholders. However, owners do not fully trust the cloud platform operated by a third party. Therefore, security and privacy emerge as critical issues while sharing data among different parties. In this paper, a novel privacy-preserving model is proposed by utilizing encryption, differential privacy, and machine learning approaches. It facilitates data owners to share their data securely in the cloud environment. The model defines access policy and communication protocol among the involved untrusted parties for data processing and privacy preservation. The proposed model is evaluated by executing experiments using distinct datasets. The achieved results reveal that the proposed model provides high accuracy, precision, recall, and f1-score up to 98%, 98%, 97%, and 97%, respectively, over the state of the art methods.
引用
收藏
页码:609 / 632
页数:24
相关论文
共 24 条
[1]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[2]  
Dwork Cynthia, 2010, Journal of Privacy and Confidentiality, V1, P135, DOI [DOI 10.29012/JPC.V1I2.570, 10.29012/jpc.v1i2.570]
[3]   Semantic-Aware Searching Over Encrypted Data for Cloud Computing [J].
Fu, Zhangjie ;
Xia, Lili ;
Sun, Xingming ;
Liu, Alex X. ;
Xie, Guowu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) :2359-2371
[4]   Data and Information Leakage Prevention Within the Scope of Information Security [J].
Hauer, Barbara .
IEEE ACCESS, 2015, 3 :2554-2565
[5]   Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems [J].
Hur, Junbeom ;
Noh, Dong Kun .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (07) :1214-1221
[6]   An Efficient Attribute-Based Encryption Scheme With Policy Update and File Update in Cloud Computing [J].
Li, Jianqiang ;
Wang, Shulan ;
Li, Yuan ;
Wang, Haiyan ;
Wang, Huiwen ;
Wang, Huihui ;
Chen, Jianyong ;
You, Zhuhong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) :6500-6509
[7]   Multi-authority fine-grained access control with accountability and its application in cloud [J].
Li, Jin ;
Chen, Xiaofeng ;
Chow, Sherman S. M. ;
Huang, Qiong ;
Wong, Duncan S. ;
Liu, Zheli .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 112 :89-96
[8]   Privacy-preserving machine learning with multiple data providers [J].
Li, Ping ;
Li, Tong ;
Ye, Heng ;
Li, Jin ;
Chen, Xiaofeng ;
Xiang, Yang .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 :341-350
[9]   Privacy-preserving outsourced classification in cloud computing [J].
Li, Ping ;
Li, Jin ;
Huang, Zhengan ;
Gao, Chong-Zhi ;
Chen, Wen-Bin ;
Chen, Kai .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01) :277-286
[10]   Differentially private Naive Bayes learning over multiple data sources [J].
Li, Tong ;
Li, Jin ;
Liu, Zheli ;
Li, Ping ;
Jia, Chunfu .
INFORMATION SCIENCES, 2018, 444 :89-104