A privacy-preserving model based on differential approach for sensitive data in cloud environment

被引:0
作者
Ashutosh Kumar Singh
Rishabh Gupta
机构
[1] National Institute of Technology,Department of Computer Applications
来源
Multimedia Tools and Applications | 2022年 / 81卷
关键词
Machine learning; Cloud computing; Differential privacy; Laplace distribution; k-anonymity;
D O I
暂无
中图分类号
学科分类号
摘要
A large amount of data and applications need to be shared with various parties and stakeholders in the cloud environment for storage, computation, and data utilization. Since a third party operates the cloud platform, owners cannot fully trust this environment. However, it has become a challenge to ensure privacy preservation when sharing data effectively among different parties. This paper proposes a novel model that partitions data into sensitive and non-sensitive parts, injects the noise into sensitive data, and performs classification tasks using k-anonymization, differential privacy, and machine learning approaches. It allows multiple owners to share their data in the cloud environment for various purposes. The model specifies communication protocol among involved multiple untrusted parties to process owners’ data. The proposed model preserves actual data by providing a robust mechanism. The experiments are performed over Heart Disease, Arrhythmia, Hepatitis, Indian-liver-patient, and Framingham datasets for Support Vector Machine, K-Nearest Neighbor, Random Forest, Naive Bayes, and Artificial Neural Network classifiers to compute the efficiency in terms of accuracy, precision, recall, and F1-score of the proposed model. The achieved results provide high accuracy, precision, recall, and F1-score up to 93.75%, 94.11%, 100%, and 87.99% and improvement up to 16%, 29%, 12%, and 11%, respectively, compared to previous works.
引用
收藏
页码:33127 / 33150
页数:23
相关论文
共 93 条
[1]  
Ali M(2015)SedaSC: secure data sharing in clouds IEEE Syst J 11 395-404
[2]  
Dhamotharan R(2015)Security in cloud computing: opportunities and challenges Info sci 305 357-383
[3]  
Khan E(2017)Privacy-preserving deep learning via additively homomorphic encryption IEEE Trans Inf Forensic Secur 13 1333-1345
[4]  
Khan SU(2015)A k-anonymous approach to privacy preserving collaborative filtering J Comput Syst Sci 81 1000-1011
[5]  
Vasilakos AV(2020)Privacy preserving classification on local differential privacy in data centers J Parallel Distrib Comput 135 70-82
[6]  
Li K(2010)UCI Machine Learning Repository http://archive.ics.uci.edu/ml. Irvine, CA: University of California Sch Inf Comput Sci 213 2-2
[7]  
Zomaya AY(2018)Semantic-aware searching over encrypted data for cloud computing IEEE Trans Inf Forensic Secur 13 2359-2371
[8]  
Ali M(2018)Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack Inf Sci 444 72-88
[9]  
Khan SU(2018)Privacy-preserving machine learning as a service Proc Priv Enhanc Tech 2018 123-142
[10]  
Vasilakos AV(2017)Efficient multimedia big data anonymization Multimed Tools Appl 76 17855-17872