Skip to main content
Log in

Secure data classification using superior naive classifier in agent based mobile cloud computing

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The explosive growth of cloud computing had resulted in the growth of fields such as ubiquitous computing, mobile cloud computing, Big Data Analytics and Cyber Physical Systems etc., Mobile Cloud Computing (MCC) is the integration of Mobile computing and Cloud computing and has gained tremendous popularity in recent years. In MCC, mobile users access the cloud services with the mobile device. Generally, the users of mobile cloud can select their services from the broker using an agent. There is an agreement between the users and service provider called SLA. Data are of varying types and they require different security levels based on their requirement. Classification of Mobile user’s data is a time-consuming process. A superior naive classifier for secure data classification in agent based mobile cloud computing is proposed in this paper. The agent classifies the user’s data into three different groups namely, low, medium, high. Then, the data are encrypted using Advanced Encryption Standards (AES). Encrypted data is transferred to the broker for selecting for suitable service agent.But the broker has many to one relationship with service agents. Then the data is sent to the cloud service provider for storage. The stored data is then homomorphically encrypted which enables the cloud provider and cloud user to process the data without the need for decryption. Performance analysis demonstrates that our proposed method reduces classification time and provides better security and integrity on mobile cloud data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Han, Q., Liang, S., Zhang, H.: Mobile cloud sensing, big data and 5G networks make an intelligent and smart world. J. IEEE Trans. Netw. 29(2), 40–45 (2015)

    Article  Google Scholar 

  2. Pal, S., Khatua, S., Sanyal, N.C.S.: A new trusted and collaborative agent based approach for ensuring cloud security. Int. J. Eng. Cryptogr. Secur. 10(1), 71–78 (2012)

    Google Scholar 

  3. Singh, A., Malhotra, M.: Agent based framework for scalability in cloud computing. Int. J. Comput. Sci. Eng. Technol. 3(4), 41–45 (2013)

    Google Scholar 

  4. Wang, C., Sherman, S., Wang, Q., Ren, K., Lou, W.: Privacy preserving public auditing for secure cloud storage. J. IEEE Trans. Comput. 62(2), 362–375 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  5. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. J. Elsevier Futur. Gener. Comput. Syst. 28(3), 583–592 (2012)

    Article  Google Scholar 

  6. Nabeel, M., Shang, N., Fellow, E.B.: Privacy preserving policy based content sharing in public clouds. J. IEEE Trans. Knowl. Data Eng. 25(11), 2602–2614 (2013)

    Article  Google Scholar 

  7. Fuka, K., Hanka, R.: Feature set reduction for document classification problems. In: Proceedings of International Joint Conference on Artificial Intelligence and Text Learning: Beyond Supervision, Seattle (2013)

  8. Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: IEEE transactions on Services Computing (2014)

  9. Xu, J.-S., Huang, R.-C.: Secure document service for cloud computing. In: Journal of Springer-Cloud Computing, pp. 541–546 (2009)

  10. Sim, K.M.: Complex and concurrent negotiations for multiple interrelated E-markets. J. IEEE Trans. Cybern. 43(1), 230–245 (2013)

    Article  Google Scholar 

  11. Chen, C.-L., Woei-JiunnTsaur, Y.-Y.C., Chang, Y.-C.: A secure mobile DRM system based on cloud architecture. J. Spec. Issue Mobile Collab. Technol. Internet ServiceComSIS 11(3), 925–941 (2014)

    Google Scholar 

  12. Gentry, C., Halevi, S., Smart, N.P.: Homomorphic evaluation of the AES circuit. Adv. Cryptol. CRYPTO 7417, 850–867 (2012)

    MATH  Google Scholar 

  13. Alpaeslan, E., Bahsi, H.: Security level classification of confidential documents written in Turkish. J. Soc. Inf. Telecommun. Eng. 329–334

  14. Talib, A.M., Atan, R., Abdullah, R., Azrifah, M.: Security framework of cloud data storage based on multi agent system architecture –a pilot study. In: Proceedings of IEEE International Conference on Information Retrieval and knowledge Management, pp. 54–59 (2012)

  15. Wang, H., Wang, J.: An effective image representation method using kernel classification. In: 2014 IEEE 26th International Conference on Tools with Artificial Intelligence, pp. 853–858 (2014)

  16. Van Mieghem, P.: Performance analysis of communications networks and systems. http://www.cambridge.org/us/academic/subjects/engineering/communications-and-signal-processing/performance-analysis-communications-networks-and-systems (2014)

  17. Triguero, I., Peralta, D., Bacardit, J., García, S., Herrera, F.: MRPR: a Map Reduce solution for prototype reduction in big data classification. Neuro Comput. 150, 331–345 (2015)

    Google Scholar 

  18. Wang, J., Wang, H., Zhou, Y., McDonald, N.: Multiple kernel multivariate performance learning using cutting plane algorithm. In: 2015 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1870–1875 (2015)

  19. Garg, P., Sharma, V.: An efficient and secure data storage in mobile cloud computing through RSA and Hash function. In: Proceedings of IEEE International Conference on Issues and Challenges in Intelligent Computing Techniques, pp 334–339 (2014)

  20. Mayor, S., Pant, B.: Document classification using support vector machine. Int. J. Environ. Sci. Technol. 4(04), 1741–1745 (2012)

    Google Scholar 

  21. Rawat, S., Chowdhury, R., Bansal, D.A.: Data integrity of cloud data storages (CDSs) in cloud. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(3), 588–592 (2011)

    Google Scholar 

  22. Singh, S., Sharma, S.: Improving security mechanism to access HDFS data by mobile consumers using middleware-layer framework. In: Proceedings of IEEE International Conference on Computing, Communication and Networking Technologies, pp 1–7 (2014)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. S. Arvind.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Arvind, K.S., Manimegalai, R. Secure data classification using superior naive classifier in agent based mobile cloud computing. Cluster Comput 20, 1535–1542 (2017). https://doi.org/10.1007/s10586-017-0797-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-0797-4

Keywords

Navigation