A differential approach and deep neural network based data privacy-preserving model in cloud environment

被引:8
作者
Gupta R. [1 ]
Gupta I. [2 ]
Saxena D. [1 ]
Singh A.K. [1 ]
机构
[1] Department of Computer Applications, National Institute of Technology, Haryana, Kurukshetra
[2] Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung
关键词
Cloud computing; Deep neural network; Differential privacy; Optimization; Privacy preservation;
D O I
10.1007/s12652-022-04367-x
中图分类号
学科分类号
摘要
Data outsourcing has become indispensable to allow information sharing among multiple parties. The users do not fully trust the cloud platform since it is operated by a third party. Preserving privacy while sharing the data among different parties is a challenging task; therefore, users apply the differential privacy mechanism to protect their data. However, such protection mechanisms suffer from the problem of degradation of learning results. In this paper, the authors address the degradation of the learning results due to noise injection into user’s data through ϵ-differential privacy. A differential approach and deep neural network based data privacy-preserving model is proposed, which injects noise at an appropriate position by exploiting the properties of the Laplace transform to maintain the accuracy level. The experiments are conducted over Steel Plates Fault, Spambase, Banknote Authentication, and Monk Problem datasets for deep neural network classifier to evaluate the model’s efficiency in accuracy, precision, recall, and F1-score terms. The achieved results show that the proposed model ensures high accuracy, precision, recall, and F1-score up to 99.75%, 99.72%, 99.72%, and 99.72%, and improvement up to 19.34%, 30.67%, 29.39%, and 32.11%, respectively, as compared to existing approaches. © 2022, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.
引用
收藏
页码:4659 / 4674
页数:15
相关论文
共 32 条
[1]  
Ali M., Dhamotharan R., Khan E., Khan S.U., Vasilakos A.V., Li K., Zomaya A.Y., Sedasc: secure data sharing in clouds, IEEE Syst J, 11, 2, pp. 395-404, (2015)
[2]  
Anand A., Singh A., A hybrid optimization-based medical data hiding scheme for industrial internet of things security, IEEE Trans on Indus Inform, (2022)
[3]  
Cisco Secure
[4]  
Frank A., Uci Machine Learning Repository, (2010)
[5]  
Fu Z., Xia L., Sun X., Liu A.X., Xie G., Semantic-aware searching over encrypted data for cloud computing, IEEE Trans Inform Foren Secur, 13, 9, pp. 2359-2371, (2018)
[6]  
Gao C.-Z., Cheng Q., He P., Susilo W., Li J., Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack, Inf Sci, 444, pp. 72-88, (2018)
[7]  
Gong M., Feng J., Xie Y., Privacy-enhanced multi-party deep learning, Neural Netw, 121, pp. 484-496, (2020)
[8]  
Gupta I., Gupta R., Singh A.K., Buyya R., Mlpam: a machine learning and probabilistic analysis based model for preserving security and privacy in cloud environment, IEEE Syst J, 15, pp. 4248-4259, (2020)
[9]  
Hassan A., Hamza R., Yan H., Li P., An efficient outsourced privacy preserving machine learning scheme with public verifiability, IEEE Access, 7, pp. 146322-146330, (2019)
[10]  
Hauer B., Data and information leakage prevention within the scope of information security, IEEE Access, 3, pp. 2554-2565, (2015)