Abstract
Cloud systems are powerful computing resources used inevitably for data subscription and publication. Even though the cloud platform can handle the huge volume of data, privacy becomes a critical issue during data publishing. Hence, an effective technique for the privacy preservation of the data is required in the cloud computing environment. Accordingly, this paper proposes a technique for privacy protection using the dyadic product and an optimization algorithm. The privacy of the original database is protected by the construction of privacy preserved database using a dyadic square matrix obtained taking the dyadic product of two vectors, namely sensitive-utility (SU) coefficient and cumulative data key product. The selection of SU coefficient vector is based on the proposed (Crow search based Lion) C-Lion algorithm, which is designed by combining crow search algorithm with lion algorithm. The fitness of the proposed C-Lion algorithm is designed based on privacy and utility for the feasible selection of SU coefficient vector. The performance of the proposed privacy protection technique based on the C-Lion algorithm is evaluated using two factors, privacy, and utility. The experimental analysis shows that the proposed technique could attain the maximum utility of 0.909 with privacy 0.864 for the breast cancer dataset.
Similar content being viewed by others
References
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy- preserving public auditing for storage security in cloud computing. In: Proceedings of IEEE INFOCOM (2010)
Bhagyashri, S., Gurav, Y.B.: Privacy-preserving public auditing for secure cloud storage. IOSR J. Comput. Eng. 16(4), 33–38 (2014)
Satapathy, S.C., Bhateja, V., Raju, K.S., Janakiramaiah, B.: Computer communication. Networking and internet security. In: Proceedings of IC3T, vol. 5 (2016)
Prakash, M., Singaravel, G.: An approach for prevention of privacy breach and information leakage in sensitive data mining. Comput. Electr. Eng. 45, 134–140 (2015)
Torra, V.: Privacy in data mining. In: Handbook of Data Mining, Human Factor and Ergonomics (2009)
Herranz, J., Nin, J., Rodrıguez, P., Tassa, T.: Revisiting distance-based record linkage for privacy-preserving release of statistical datasets. Data Knowl. Eng. 100, 78–93 (2015)
Inan, A., Saygin, Y., Savas, E., Hintoglu, A., Levi, A.: Privacy preserving clustering on horizontally partitioned data. Data Knowl. Eng. 63(3), 646–666 (2007)
Li, T., Li, N., Zhang, J., Molloy, I.: Slicing: a new approach for privacy preserving data publishing. IEEE Trans. Knowl. Data Eng. 24(3), 561–574 (2012)
Pinkas, B.: Cryptographic techniques for privacy preserving data mining. ACM SIGKDD Explor. Newsl. 4(2), 12–19 (2002)
Yuan, J., Yu, S.: Efficient privacy-preserving biometric identification in cloud computing. In: Proceedings of IEEE INFOCOM (2013)
Li, M., Yu, S., Cao, N., Lou, W.: Authorized private keyword search over encrypted data in cloud computing. In: Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS) (2011)
Karlekar, N.P., Gomathi, N.: Kronecker product and bat algorithm-based coefficient generation for privacy protection on cloud. Int. J. Model. Simul. Sci. Comput. 8(4), 1750021 (2017)
Gehrke, J.: Models and methods for privacy-preserving data publishing and analysis. In: Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 316–316 (2006)
Yang, Z., Zhong, S., Wright, R.N.: Anonymity-preserving data collection. In: Proceedings of the 11th ACM SIGKDD Conference on Knowledge discovery in data mining, pp. 334–343 (2005)
Warner, S.L.: Randomized response: a survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc. 60(309), 63–69 (1965)
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM CACM 24(2), 84–90 (1981)
Jakobsson, M., Juels, A., Rivest, R.L.: Making mix nets robust for electronic voting by randomized partial checking. In: Proceedings of the 11th USENIX Security Symposium, pp. 339–353 (2002)
Fung, B., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 14 (2010)
Yang, K., Zhang, K., Jia, X., Hasan, M.A., Shen, X.S.: Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms. Inf. Sci. 387, 116–131 (2017)
Fahad, A., Tari, Z., Almalawi, A., Goscinski, A., Khalil, I., Mahmood, A.: PPFSCADA: privacy preserving framework for SCADA data publishing. Future Gener. Comput. Syst. 37, 496–511 (2014)
Yang, K., Jia, X., Zhang, K., Shen, X.S.: Privacy-preserving data publish-subscribe service on cloud-based platforms. In: IACR Cryptology ePrint Archive, pp. 1–10 (2014)
Zhang, H., Zhou, Z., Ye, L., Xiaojiang, D.U.: Towards privacy preserving publishing of set-valued data on hybrid cloud. IEEE Trans. Cloud Comput. 99, 1–14 (2015)
Chandramohan, D., Vengattaraman, T., Dhavachelvan, P.: A secure data privacy preservation for on-demand cloud service. J. King Saud Univ.-Eng. Sci. 29(2), 144–150 (2017)
Kulkarni, Y.R., Murugan, T.S.: C-mixture and multi-constraints based genetic algorithm for collaborative data publishing. J. King Saud Univ.-Comput. Inf. Sci. (2016)
Askarzadeh, A.: A novel metaheuristic method for solving constrained engineering optimization problems: crow search algorithm. Comput. Struct. 169, 1–12 (2016)
Rajakumar, B.R.: Lion algorithm for standard and large scale bilinear system identification: a global optimization based on lion’s social behavior. In: IEEE Congress on Evolutionary Computation (CEC) July 6–11, Beijing, China (2014)
Zhang, J.: Visualization for Information Retrieval, pp. 21–46. Springer, New York (2008)
Vectors and dyadics .https://web.stanford.edu/class/me331b/documents/VectorBasisIndependent.pdf. Accessed July 2017
Talk: Dyadic product. https://en.wikipedia.org/wiki/Talk%3ADyadic_product. Accessed July 2017
Breast Cancer Wisconsin (Original) Data Set. https://archive.ics.uci.edu/ml/datasets/breast+cancer+wisconsin+(original). Accessed July 2017
Heart Disease Data Set. http://archive.ics.uci.edu/ml/datasets/heart+Disease. Accessed July 2017
Pima Indian diabetes dataset. https://archive.ics.uci.edu/ml/datasets/pima+indians+diabetes. Accessed July 2017
Yang, X.S.: A new metaheuristic bat-inspired algorithm. In: Gonzalez, J.R. (ed.) Nature Inspired Cooperative Strategies for Optimization (NISCO 2010), Studies in Computational Intelligence, vol. 284, pp. 65–74. Springer, Berlin (2010)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
George, A., Sumathi, A. Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud. Cluster Comput 22 (Suppl 1), 1277–1288 (2019). https://doi.org/10.1007/s10586-017-1589-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-1589-6