Security aware index based quasi–identifier approach for privacy preservation of data sets for cloud applications

Abstract

Privacy preservation is a major task in cloud based applications. Many applications are built in the cloud for their economic benefits and operational convenience. The obtained information in the cloud is often seen as valuable for individuals through malicious intent. There is a lot of personal information and potentially secure data that people stored on their computers, and this information is generally transferred to the cloud. In this document, we propose an efficient index based quasi- identifier approach to ensure privacy preservation and achieve high data utility over incremental and distributed data sets. The modified Fuzzy C Means algorithm is used to construct the clusters by similarity. Anonymised data is retrieved by means of tuple partitioning in the data sets. Analysis results illustrate that the proposed method is more efficient for preserving privacy on incremental data sets than existing approaches. It is implemented in the working platform of Java.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

References

  1. 1.

    Pasupuleti, S.K., Ramalingam, S., Buyya, R.: An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. J. Netw. Comput. Appl. 64, 12–22 (2016)

    Article  Google Scholar 

  2. 2.

    Chen, B.W., Rho, S., Yang, L.T.: Privacy-preserved big data analysis based on asymmetric imputation kernels and multiside similarities. Future Gener. Comput. Syst. 78, 859–866 (2016)

    Article  Google Scholar 

  3. 3.

    Hemanth Kumar, N.P., Prabhudeva, S.: Security and privacy preservation on cloud-based big data analysis (CBDA): a review. Commun. Appl. Electron. 6(1), 35–42 (2016)

    Article  Google Scholar 

  4. 4.

    Wang, H.: Privacy-preserving data sharing in cloud computing. J. Comput. Sci. Technol. 25(3), 401–414 (2010)

    Article  Google Scholar 

  5. 5.

    Lyu, C., Sun, S.F., Zhang, Y., Pande, A., Haining, L., Dawu, G.: Privacy-preserving data sharing scheme over cloud for social applications. J. Netw. Comput. Appl. 74, 44–55 (2016)

    Article  Google Scholar 

  6. 6.

    Hu, G., Xiao, D., Xiang, T., Bai, S., Zhang, Y.: A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud. Inf. Sci. 387, 132–145 (2017)

    Article  Google Scholar 

  7. 7.

    Drosatosa, G., Efraimidis, P.S., Athanasiadis, I.N., Stevens, M., D’Hondt, E.: Privacy-preserving computation of participatory noise maps in the cloud. J. Syst. Softw. 92, 170–183 (2014)

    Article  Google Scholar 

  8. 8.

    Yuan, J., Tian, Y.: Practical privacy-preserving mapreduce based K-means clustering over large-scale dataset. IEEE Trans. Cloud Comput. 3(2), 1 (2017)

    Article  Google Scholar 

  9. 9.

    Hu, W., Wang, S., Chung, F.L., Liu, Y., Ying, W.: Privacy preserving and fast decision for novelty detection using support vector data description. Soft. Comput. 19(5), 1171–1186 (2014)

    Article  Google Scholar 

  10. 10.

    Herranz, J., Nin, J., Rodríguez, P., Tassa, T.: Revisiting distance-based record linkage for privacy-preserving release of statistical datasets. Data Knowl. Eng. 100, 78–93 (2015)

    Article  Google Scholar 

  11. 11.

    Patil, A.N., Phursule, R.N.: Efficient personalized privacy preservation using anonymization. Int. Res. J. Eng. Technol. (2016). https://doi.org/10.21474/IJAR01/1721

    Article  Google Scholar 

  12. 12.

    Gou, Z., Yamaguchi, S., Gupta, B.B.: Analysis of Various Security Issues and Challenges in Cloud Computing Environment: A Survey, pp. 221–247. IGI Global, Pennsylvania (2017)

    Google Scholar 

  13. 13.

    Gupta, B.B.: Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives, p. 666. CRC Press, Boca Raton (2018)

    Google Scholar 

  14. 14.

    Nagesh, A., Agarwal, S: Preservation of privacy using back-propagation neural networks in cloud. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 5 (2015)

  15. 15.

    Gupta, B., Agrawal, D.P., Yamaguchi, S.: Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. IGI Global, Pennsylvania (2016)

    Book  Google Scholar 

  16. 16.

    Stergiou, C., Psannis, K.E., Kim, B.E., Gupta, B.: Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. 78, 964–975 (2018)

    Article  Google Scholar 

  17. 17.

    Zhang, X., Liu, C., Nepal, S., Chen, J.: An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. J. Comput. Syst. Sci. 79(5), 542–555 (2013)

    MathSciNet  Article  Google Scholar 

  18. 18.

    Negi, P., Mishra, A.: Enhanced CBF packet filtering method to detect DDoS attack in cloud computing environment. IJCSI Int. J. Comput. Sci. 10(2), 142–146 (2013)

    Google Scholar 

  19. 19.

    Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y.: Vasilakos AV, Security and privacy for storage and computation in cloud computing. J. Inf. Sci. 258, 371–386 (2014)

    Article  Google Scholar 

  20. 20.

    Gupta, B.B., Badve, O.P.: Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. Neural Comput. Appl. 28(12), 3655–3682 (2016)

    Article  Google Scholar 

  21. 21.

    Gupta, B.B., Gupta, S., Chaudhary, P.: Enhancing the browser-side context-aware sanitization of suspicious HTML5 code for halting the DOM-based XSS vulnerabilities in cloud. Int. J. Cloud Appl. Comput. 7, 1–31 (2017)

    Google Scholar 

  22. 22.

    Casinoa, F., Domingo-Ferrerb, J., Puigb, D.: A Solanasa (2014) k-anonymous approach to privacy preserving collaborative filtering. J. Comput. Syst. Sci. 81(6), 1000–1011 (2014)

    Article  Google Scholar 

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to Rayapati Venkata Sudhakar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Sudhakar, R.V., Rao, T.C.M. Security aware index based quasi–identifier approach for privacy preservation of data sets for cloud applications. Cluster Comput 23, 2579–2589 (2020). https://doi.org/10.1007/s10586-019-03028-7

Download citation

Keywords

  • Privacy preserving
  • Cloud computing
  • Secure
  • Modified fuzzy C means algorithm
  • Anonymised data
  • Quasi- identifier