access icon free Effective convolution method for privacy preserving in cloud over big data using map reduce framework

Cloud computing is used to connect several number of remote servers through Internet to accumulate and recover large data anywhere and anytime. As of the conventional privacy defending process, there is a possibility for malevolent assault on the sensitive information accumulated in the cloud. In this research, the authors have proposed a competent large data convert among privacy defending by Hadoop map reduce in the cloud. The procedure exploits fuzzy C-means clustering (FCM) algorithm grouping the data. For dimensionality reduction, map reduce framework will be used. In evaluation module, the recommended technique performed with the aid of K-nearest neighbour (KNN) classification algorithm in this phase using KNN technique to check the convolution process based on the threshold value, which is improving the utility of the privacy data. The consequence acquired illustrates that authors’ proposed scheme has enhanced the clustering exactness and also accomplishes the effectual convolution procedure to improve the privacy. From the experimental results, the proposed research achieved an effective clustering accuracy 76.07% and the existing K-means approach gets the clustering accuracy of 73.5% which is minimum value when compared to the proposed researches. The suggested technique is implemented in JAVA with Cloud Sim platform.

Inspec keywords: fuzzy set theory; pattern clustering; Big Data; security of data; pattern classification; parallel processing; nearest neighbour methods; cloud computing; data privacy

Other keywords: effective clustering accuracy; evaluation module; malevolent assault; remote servers; dimensionality reduction; convolution process; recommended technique; Cloud Sim platform; K-means approach; Hadoop map; Internet; KNN technique; privacy preserving; conventional privacy defending process; effectual convolution procedure; big data; FCM algorithm; sensitive information; cloud computing; map reduce framework; clustering exactness; effective convolution method; fuzzy C-means clustering algorithm; threshold value; K-nearest neighbour classification algorithm; privacy data; JAVA

Subjects: Parallel software; Other DBMS; Combinatorial mathematics; Data security; Internet software

References

    1. 1)
      • 12. Worku, S.G., Xu, C., Zhao, J., et al: ‘Secure and efficient privacy-preserving public auditing scheme for cloud storage’, Elsevier Comput. Electr. Eng., 2014, 40, (5), pp. 17031713.
    2. 2)
      • 27. Derbeko, P., Dolev, S., Gudes, E., et al: ‘Security and privacy aspects in MapReduce on clouds: a survey’, Elsevier Comput. Sci. Rev., 2016, 20, pp. 128.
    3. 3)
      • 31. Nikkath Bushra, S., Chandrasekar, A.: ‘Privacy preservation on big data using PK-anonymization’, Int. J. Innov. Res. Comput. Commun. Eng., 2015, 3, (11), pp. 1193711942.
    4. 4)
      • 28. Zhou, J., Cao, Z., Dong, X., et al: ‘Security and privacy for cloud-based IoT: challenges’, IEEE Commun. Mag., 2017, 55, (1), pp. 2633.
    5. 5)
      • 24. Aldeen, Y.A. A.S., Salleh, M., Aljeroudi, Y.: ‘An innovative privacy preserving technique for incremental datasets on cloud computing’, Elsevier J. Biomed. Inform., 2016, 62, pp. 107116.
    6. 6)
      • 15. Bargh, M.S., Choenni, S., Meijer, R.: ‘On design and deployment of two privacy-preserving procedures for judicial-data dissemination’, Elsevier Gov. Inf. Q, 2016, 33, (3), pp. 113.
    7. 7)
      • 14. Sulochana, M., Dubey, O.: ‘Preserving data confidentiality using multi-cloud architecture’, Elsevier Procedia Comput. Sci., 2015, 50, pp. 357362.
    8. 8)
      • 26. Vennila, S., Priyadarshini, J.: ‘Scalable privacy preservation in big data a survey’, Elsevier Procedia Comput. Sci., 2015, 50, pp. 369373.
    9. 9)
      • 19. Yan, Z., Ding, W., Niemi, V., et al: ‘Two schemes of privacy-preserving trust evaluation’, Future Gener. Comput. Syst., 2016, 62, pp. 175189.
    10. 10)
      • 13. Wei, L., Zhu, H., Cao, Z., et al: ‘Security and privacy for storage and computation in cloud computing’, Elsevier Inf.Sci., 2014, 258, pp. 371386.
    11. 11)
      • 6. Liu, Q, Wang, G., Jie Wu, J.: ‘Secure and privacy preserving keyword searching for cloud storage services’, Elsevier J. Netw. Comput. Appl., 2012, 35, (3), pp. 927933.
    12. 12)
      • 11. Zhang, Y., Chen, X., Li, X., et al: ‘Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing’, Elsevier Inf. Sci., 2016, 379, pp. 120.
    13. 13)
      • 20. Abuadbba, A., Khalil, I., Atiquzzaman, M.: ‘Robust privacy preservation and authenticity of the collected data in cognitive radio network – Walsh–Hadamard based steganographic approach’, Elsevier Pervasive Mob. Comput., 2015, 22, pp. 5870.
    14. 14)
      • 17. Zhang, X., Liu, C., Nepal, S.: ‘An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud’, Elsevier J. Comput. Syst. Sci., 2013, 79, (5), pp. 542555.
    15. 15)
      • 25. Colombo, P., Ferrari, E.: ‘Privacy aware access control for big data: a research roadmap’, Elsevier Big Data Res., 2015, 2, (4), pp. 145154.
    16. 16)
      • 10. Razaque, A., Rizvi, S.S.: ‘Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment’, Elsevier Comput. Secur., 2016, 62, pp. 328347.
    17. 17)
      • 8. Yang, J.J., Li, J.Q., Yu, N.: ‘A hybrid solution for privacy preserving medical data sharing in the cloud environment’, Elsevier Future Gener. Comput. Syst., 2015, 43, pp. 7486.
    18. 18)
      • 32. Mehta, B.B., Rao, U.P.: ‘Privacy preserving big data publishing: a scalablek-anonymization approach using MapReduce’, IET Softw., 2017, 11, (5), pp. 271276.
    19. 19)
      • 4. Fu, Z., Huang, F., Sun, X., et al: ‘Enabling semantic search based on conceptual graphs over encrypted outsourced data’, IEEE Trans. Services Comput., 2016, doi: 10.1109/TSC.2016.2622697.
    20. 20)
      • 16. Liu, Z., Chen, X., Yang, J., et al: ‘New order preserving encryption model for outsourced databases in cloud environments’, Elsevier J. Netw. Comput. Appl., 2016, 59, pp. 198207.
    21. 21)
      • 9. Zhang, X., Yang, L.T., Chang, L., et al: ‘A scalable two-phase top-down specialization approach for data anonymization using map reduce on cloud’, IEEE Trans. Parallel Distrib. Syst., 2014, 25, (2), pp. 363373..
    22. 22)
      • 21. Song, W., Wang, B., Wang, Q., et al: ‘A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications’, Elsevier J. Parallel Distrib. Comput., 2016, 99, pp. 125.
    23. 23)
      • 18. Akgün, M.A., Bayrak, A.O., Ozer, B., et al: ‘Privacy preserving processing of genomic data: a survey’, Elsevier J. Biomed. Inf., 2015, 56, pp. 103111.
    24. 24)
      • 30. Dolev, S., Li, Y., Sharma, S.: ‘Privacy-preserving secret shared computations using mapreduce’, 2018Available at: https://arxiv.org/abs/1801.10323.
    25. 25)
      • 7. Dong, X., Yu, J., Luo, Y., et al: ‘Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing’, Elsevier Comput. Secur., 2014, 42, pp. 151164.
    26. 26)
      • 22. Pasupuleti, S.K., Ramalingam, S., Buyya, R.: ‘An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing’, Elsevier J. Netw. Comput. Appl., 2016, 64, pp. 1222.
    27. 27)
      • 2. Ali, M., Khan, S.U., Vasilakos, A.V.: ‘Security in cloud computing: opportunities and challenges’, Inf. Sci., 2015, 305, pp. 357383.
    28. 28)
      • 23. Sahi, A., Lai, D., Li, Y.: ‘Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan’, Elsevier Comput. Biol. Med., 2016, 78, pp. 18.
    29. 29)
      • 1. Ali, M., Dhamotharan, R., Khan, E., et al: ‘SeDaSC: secure data sharing in clouds’, IEEE Syst. J., 2017, 11, (2), pp. 395404.
    30. 30)
      • 3. Yan, Z., Li, X., Wang, M., et al: ‘Flexible data access control based on trust and reputation in cloud computing’, IEEE Trans. Cloud Comput, 2017, 5, (3), pp. 485498.
    31. 31)
      • 5. Li, J., Liu, Z., Chen, X., et al: ‘L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing’, Elsevier Knowledge-Based Syst., 2015, 79, pp. 1826.
    32. 32)
      • 29. Yan, Z., Zhang, P., Vasilakos, A.V.: ‘A security and trust framework for virtualized networks and software-defined networking’, Secur. Commun. Netw., 2016, 9, (16), pp. 30593069.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-sen.2018.5258
Loading

Related content

content/journals/10.1049/iet-sen.2018.5258
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading