© The Institution of Engineering and Technology
Cloud computing is used to connect several number of remote servers through Internet to accumulate and recover large data anywhere and anytime. As of the conventional privacy defending process, there is a possibility for malevolent assault on the sensitive information accumulated in the cloud. In this research, the authors have proposed a competent large data convert among privacy defending by Hadoop map reduce in the cloud. The procedure exploits fuzzy C-means clustering (FCM) algorithm grouping the data. For dimensionality reduction, map reduce framework will be used. In evaluation module, the recommended technique performed with the aid of K-nearest neighbour (KNN) classification algorithm in this phase using KNN technique to check the convolution process based on the threshold value, which is improving the utility of the privacy data. The consequence acquired illustrates that authors’ proposed scheme has enhanced the clustering exactness and also accomplishes the effectual convolution procedure to improve the privacy. From the experimental results, the proposed research achieved an effective clustering accuracy 76.07% and the existing K-means approach gets the clustering accuracy of 73.5% which is minimum value when compared to the proposed researches. The suggested technique is implemented in JAVA with Cloud Sim platform.
References
-
-
1)
-
12. Worku, S.G., Xu, C., Zhao, J., et al: ‘Secure and efficient privacy-preserving public auditing scheme for cloud storage’, Elsevier Comput. Electr. Eng., 2014, 40, (5), pp. 1703–1713.
-
2)
-
27. Derbeko, P., Dolev, S., Gudes, E., et al: ‘Security and privacy aspects in MapReduce on clouds: a survey’, Elsevier Comput. Sci. Rev., 2016, 20, pp. 1–28.
-
3)
-
31. Nikkath Bushra, S., Chandrasekar, A.: ‘Privacy preservation on big data using PK-anonymization’, Int. J. Innov. Res. Comput. Commun. Eng., 2015, 3, (11), pp. 11937–11942.
-
4)
-
28. Zhou, J., Cao, Z., Dong, X., et al: ‘Security and privacy for cloud-based IoT: challenges’, IEEE Commun. Mag., 2017, 55, (1), pp. 26–33.
-
5)
-
24. Aldeen, Y.A. A.S., Salleh, M., Aljeroudi, Y.: ‘An innovative privacy preserving technique for incremental datasets on cloud computing’, Elsevier J. Biomed. Inform., 2016, 62, pp. 107–116.
-
6)
-
15. Bargh, M.S., Choenni, S., Meijer, R.: ‘On design and deployment of two privacy-preserving procedures for judicial-data dissemination’, Elsevier Gov. Inf. Q, 2016, 33, (3), pp. 1–13.
-
7)
-
14. Sulochana, M., Dubey, O.: ‘Preserving data confidentiality using multi-cloud architecture’, Elsevier Procedia Comput. Sci., 2015, 50, pp. 357–362.
-
8)
-
26. Vennila, S., Priyadarshini, J.: ‘Scalable privacy preservation in big data a survey’, Elsevier Procedia Comput. Sci., 2015, 50, pp. 369–373.
-
9)
-
19. Yan, Z., Ding, W., Niemi, V., et al: ‘Two schemes of privacy-preserving trust evaluation’, Future Gener. Comput. Syst., 2016, 62, pp. 175–189.
-
10)
-
13. Wei, L., Zhu, H., Cao, Z., et al: ‘Security and privacy for storage and computation in cloud computing’, Elsevier Inf.Sci., 2014, 258, pp. 371–386.
-
11)
-
6. Liu, Q, Wang, G., Jie Wu, J.: ‘Secure and privacy preserving keyword searching for cloud storage services’, Elsevier J. Netw. Comput. Appl., 2012, 35, (3), pp. 927–933.
-
12)
-
11. Zhang, Y., Chen, X., Li, X., et al: ‘Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing’, Elsevier Inf. Sci., 2016, 379, pp. 1–20.
-
13)
-
20. Abuadbba, A., Khalil, I., Atiquzzaman, M.: ‘Robust privacy preservation and authenticity of the collected data in cognitive radio network – Walsh–Hadamard based steganographic approach’, Elsevier Pervasive Mob. Comput., 2015, 22, pp. 58–70.
-
14)
-
17. Zhang, X., Liu, C., Nepal, S.: ‘An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud’, Elsevier J. Comput. Syst. Sci., 2013, 79, (5), pp. 542–555.
-
15)
-
25. Colombo, P., Ferrari, E.: ‘Privacy aware access control for big data: a research roadmap’, Elsevier Big Data Res., 2015, 2, (4), pp. 145–154.
-
16)
-
10. Razaque, A., Rizvi, S.S.: ‘Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment’, Elsevier Comput. Secur., 2016, 62, pp. 328–347.
-
17)
-
8. Yang, J.J., Li, J.Q., Yu, N.: ‘A hybrid solution for privacy preserving medical data sharing in the cloud environment’, Elsevier Future Gener. Comput. Syst., 2015, 43, pp. 74–86.
-
18)
-
32. Mehta, B.B., Rao, U.P.: ‘Privacy preserving big data publishing: a scalablek-anonymization approach using MapReduce’, IET Softw., 2017, 11, (5), pp. 271–276.
-
19)
-
4. Fu, Z., Huang, F., Sun, X., et al: ‘Enabling semantic search based on conceptual graphs over encrypted outsourced data’, IEEE Trans. Services Comput., 2016, .
-
20)
-
16. Liu, Z., Chen, X., Yang, J., et al: ‘New order preserving encryption model for outsourced databases in cloud environments’, Elsevier J. Netw. Comput. Appl., 2016, 59, pp. 198–207.
-
21)
-
9. Zhang, X., Yang, L.T., Chang, L., et al: ‘A scalable two-phase top-down specialization approach for data anonymization using map reduce on cloud’, IEEE Trans. Parallel Distrib. Syst., 2014, 25, (2), pp. 363–373..
-
22)
-
21. Song, W., Wang, B., Wang, Q., et al: ‘A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications’, Elsevier J. Parallel Distrib. Comput., 2016, 99, pp. 1–25.
-
23)
-
18. Akgün, M.A., Bayrak, A.O., Ozer, B., et al: ‘Privacy preserving processing of genomic data: a survey’, Elsevier J. Biomed. Inf., 2015, 56, pp. 103–111.
-
24)
-
30. Dolev, S., Li, Y., Sharma, S.: ‘Privacy-preserving secret shared computations using mapreduce’, 2018.
-
25)
-
7. Dong, X., Yu, J., Luo, Y., et al: ‘Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing’, Elsevier Comput. Secur., 2014, 42, pp. 151–164.
-
26)
-
22. Pasupuleti, S.K., Ramalingam, S., Buyya, R.: ‘An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing’, Elsevier J. Netw. Comput. Appl., 2016, 64, pp. 12–22.
-
27)
-
2. Ali, M., Khan, S.U., Vasilakos, A.V.: ‘Security in cloud computing: opportunities and challenges’, Inf. Sci., 2015, 305, pp. 357–383.
-
28)
-
23. Sahi, A., Lai, D., Li, Y.: ‘Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan’, Elsevier Comput. Biol. Med., 2016, 78, pp. 1–8.
-
29)
-
1. Ali, M., Dhamotharan, R., Khan, E., et al: ‘SeDaSC: secure data sharing in clouds’, IEEE Syst. J., 2017, 11, (2), pp. 395–404.
-
30)
-
3. Yan, Z., Li, X., Wang, M., et al: ‘Flexible data access control based on trust and reputation in cloud computing’, IEEE Trans. Cloud Comput, 2017, 5, (3), pp. 485–498.
-
31)
-
5. Li, J., Liu, Z., Chen, X., et al: ‘L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing’, Elsevier Knowledge-Based Syst., 2015, 79, pp. 18–26.
-
32)
-
29. Yan, Z., Zhang, P., Vasilakos, A.V.: ‘A security and trust framework for virtualized networks and software-defined networking’, Secur. Commun. Netw., 2016, 9, (16), pp. 3059–3069.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-sen.2018.5258
Related content
content/journals/10.1049/iet-sen.2018.5258
pub_keyword,iet_inspecKeyword,pub_concept
6
6