Abstract
The explosive growth of cloud computing had resulted in the growth of fields such as ubiquitous computing, mobile cloud computing, Big Data Analytics and Cyber Physical Systems etc., Mobile Cloud Computing (MCC) is the integration of Mobile computing and Cloud computing and has gained tremendous popularity in recent years. In MCC, mobile users access the cloud services with the mobile device. Generally, the users of mobile cloud can select their services from the broker using an agent. There is an agreement between the users and service provider called SLA. Data are of varying types and they require different security levels based on their requirement. Classification of Mobile user’s data is a time-consuming process. A superior naive classifier for secure data classification in agent based mobile cloud computing is proposed in this paper. The agent classifies the user’s data into three different groups namely, low, medium, high. Then, the data are encrypted using Advanced Encryption Standards (AES). Encrypted data is transferred to the broker for selecting for suitable service agent.But the broker has many to one relationship with service agents. Then the data is sent to the cloud service provider for storage. The stored data is then homomorphically encrypted which enables the cloud provider and cloud user to process the data without the need for decryption. Performance analysis demonstrates that our proposed method reduces classification time and provides better security and integrity on mobile cloud data.
Similar content being viewed by others
References
Han, Q., Liang, S., Zhang, H.: Mobile cloud sensing, big data and 5G networks make an intelligent and smart world. J. IEEE Trans. Netw. 29(2), 40–45 (2015)
Pal, S., Khatua, S., Sanyal, N.C.S.: A new trusted and collaborative agent based approach for ensuring cloud security. Int. J. Eng. Cryptogr. Secur. 10(1), 71–78 (2012)
Singh, A., Malhotra, M.: Agent based framework for scalability in cloud computing. Int. J. Comput. Sci. Eng. Technol. 3(4), 41–45 (2013)
Wang, C., Sherman, S., Wang, Q., Ren, K., Lou, W.: Privacy preserving public auditing for secure cloud storage. J. IEEE Trans. Comput. 62(2), 362–375 (2013)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. J. Elsevier Futur. Gener. Comput. Syst. 28(3), 583–592 (2012)
Nabeel, M., Shang, N., Fellow, E.B.: Privacy preserving policy based content sharing in public clouds. J. IEEE Trans. Knowl. Data Eng. 25(11), 2602–2614 (2013)
Fuka, K., Hanka, R.: Feature set reduction for document classification problems. In: Proceedings of International Joint Conference on Artificial Intelligence and Text Learning: Beyond Supervision, Seattle (2013)
Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: IEEE transactions on Services Computing (2014)
Xu, J.-S., Huang, R.-C.: Secure document service for cloud computing. In: Journal of Springer-Cloud Computing, pp. 541–546 (2009)
Sim, K.M.: Complex and concurrent negotiations for multiple interrelated E-markets. J. IEEE Trans. Cybern. 43(1), 230–245 (2013)
Chen, C.-L., Woei-JiunnTsaur, Y.-Y.C., Chang, Y.-C.: A secure mobile DRM system based on cloud architecture. J. Spec. Issue Mobile Collab. Technol. Internet ServiceComSIS 11(3), 925–941 (2014)
Gentry, C., Halevi, S., Smart, N.P.: Homomorphic evaluation of the AES circuit. Adv. Cryptol. CRYPTO 7417, 850–867 (2012)
Alpaeslan, E., Bahsi, H.: Security level classification of confidential documents written in Turkish. J. Soc. Inf. Telecommun. Eng. 329–334
Talib, A.M., Atan, R., Abdullah, R., Azrifah, M.: Security framework of cloud data storage based on multi agent system architecture –a pilot study. In: Proceedings of IEEE International Conference on Information Retrieval and knowledge Management, pp. 54–59 (2012)
Wang, H., Wang, J.: An effective image representation method using kernel classification. In: 2014 IEEE 26th International Conference on Tools with Artificial Intelligence, pp. 853–858 (2014)
Van Mieghem, P.: Performance analysis of communications networks and systems. http://www.cambridge.org/us/academic/subjects/engineering/communications-and-signal-processing/performance-analysis-communications-networks-and-systems (2014)
Triguero, I., Peralta, D., Bacardit, J., García, S., Herrera, F.: MRPR: a Map Reduce solution for prototype reduction in big data classification. Neuro Comput. 150, 331–345 (2015)
Wang, J., Wang, H., Zhou, Y., McDonald, N.: Multiple kernel multivariate performance learning using cutting plane algorithm. In: 2015 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1870–1875 (2015)
Garg, P., Sharma, V.: An efficient and secure data storage in mobile cloud computing through RSA and Hash function. In: Proceedings of IEEE International Conference on Issues and Challenges in Intelligent Computing Techniques, pp 334–339 (2014)
Mayor, S., Pant, B.: Document classification using support vector machine. Int. J. Environ. Sci. Technol. 4(04), 1741–1745 (2012)
Rawat, S., Chowdhury, R., Bansal, D.A.: Data integrity of cloud data storages (CDSs) in cloud. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(3), 588–592 (2011)
Singh, S., Sharma, S.: Improving security mechanism to access HDFS data by mobile consumers using middleware-layer framework. In: Proceedings of IEEE International Conference on Computing, Communication and Networking Technologies, pp 1–7 (2014)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Arvind, K.S., Manimegalai, R. Secure data classification using superior naive classifier in agent based mobile cloud computing. Cluster Comput 20, 1535–1542 (2017). https://doi.org/10.1007/s10586-017-0797-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-0797-4