Skip to main content
Log in

A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Maximizing the security of the cloud system is most important need of this world. Similarly, the data controllers are also increased stealing the sensitive and personal data from the cloud computing system. A repeated data violation occurs due to a large amount of outsourced and unsecured sensitive data. At present, numerous research works have been performed to secure the data in the cloud, but sometimes they do not succeed in securing the sensitive data. A Multi-Objective Privacy Preservation Model for Cloud Security utilizing Hunter Prey Optimization approach is proposed in this paper. Initially, the data is taken from 5 types of dataset like, concrete, Heart disease, Super Conductivity, Air Quality and wholesale customer datasets. The input data is given to the sanitization of data and restoration stage. In sanitization of data and restoration phase, SMA is utilized. After preventing the leakage in the data sanitization and restoration stage, the input data is applied to the key generation phase. Multi-objective functions such as the preservation of information ratio, the ratio of hiding, and the modification degree are performed at the key generation stage with the help of the hunter prey optimization algorithm to improve cloud data security. The proposed MOPP-CS-HPOA method is evaluated under some performances metrics, like modification degree, ratio of hiding, information preservation ratio, key sensitivity and computational time. Then the proposed MOPP-CS-HPOA method attains 35.69%, 38.504% and 31.805% higher information preservation ratio; 39.52%, 30.28% and 38.14% higher hiding ratio; analysed with MOPP-CS-JSSO, MOPP-CS-PS-BMFO and MOPP-CS-SVM-KNN-RF-NB-ANN methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Data availability statement

Nil.

Code availability

Nil.

References

  1. Shaik I, Chandran N (2022) Privacy and data protection in the enterprise world. CSI Transactions on ICT 10(1):37–45

    Article  Google Scholar 

  2. Shanmugapriya P (2022) DLFPM-SSO-PE: privacy-preserving and security of intermediate data in cloud storage. Distrib Parallel Databases 40(4):815–833

    Article  Google Scholar 

  3. Anand K, Vijayaraj A, Vijay Anand M (2021) An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud. Peer-to-Peer Netw Appl 15(4):2007–2020

    Article  Google Scholar 

  4. Xu Y, Mohammed AH (2023) An energy-aware resource management method in cloud-based Internet of Things using a multi-objective algorithm and crowding distance. Trans Emer Telecommun Technol 34(1):e4673

    Article  Google Scholar 

  5. Yang M, Ma H, Wei S, Zeng Y, Chen Y, Hu Y (2020) A multi-objective task scheduling method for fog computing in cyber-physical-social services. IEEE Access 8:65085–65095

    Article  Google Scholar 

  6. Wang Z, Qin J, Xiang X, Tan Y, Peng J (2023) A privacy-preserving cross-media retrieval on encrypted data in cloud computing. J Inf Secur Appl 73:103440

    Article  Google Scholar 

  7. Bhuyan HK, Ravi V, Yadav MS (2022) Multi-objective optimization-based privacy in data mining. Clust Comput 25(6):4275–4287

    Article  Google Scholar 

  8. Bingu R, Jothilakshmi S, Srinivasu N (2022) A comprehensive review on security and privacy preservation in cloud environment. Sustain Commun Netw Appl: Proceedings of ICSCN 2021:719–738

    Article  Google Scholar 

  9. Biswas C, Ganguly D, Mukherjee PS, Bhattacharya U, Hou Y (2022) Privacy-aware supervised classification: An informative subspace based multi-objective approach. Pattern Recogn 122:108301

    Article  Google Scholar 

  10. Boulemtafes A, Derhab A, Challal Y (2020) A review of privacy-preserving techniques for deep learning. Neurocomputing 384:21–45

    Article  Google Scholar 

  11. Sathya A, Raja SKS (2021) Privacy preservation-based access control intelligence for cloud data storage in smart healthcare infrastructure. Wireless Pers Commun 118:3595–3614

    Article  Google Scholar 

  12. Denis R, Madhubala P (2021) Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems. Multimed Tools Appl 80:21165–21202

    Article  Google Scholar 

  13. Xu X, Fu S, Li W, Dai F, Gao H, Chang V (2020) Multi-objective data placement for workflow management in cloud infrastructure using NSGA-II. IEEE Trans Emerg Topics Comput Intell 4(5):605–615

    Article  Google Scholar 

  14. Wen D, Zheng S, Chen J, Zheng Z, Ding C, Zhang L (2023) Hyperparameter-optimization-inspired long short-term memory network for air quality grade prediction. Information 14(4):243

    Article  Google Scholar 

  15. Attuluri S, Ramesh M (2023) Multi-objective discrete harmony search algorithm for privacy preservation in cloud data centers. Int J Info Tech 1–15

  16. Balashunmugaraja B, Ganeshbabu TR (2022) Privacy preservation of cloud data in business application enabled by multi-objective red deer-bird swarm algorithm. Knowl-Based Syst 236:107748

    Article  Google Scholar 

  17. Najafizadeh A, Salajegheh A, Rahmani AM, Sahafi A (2021) Privacy-preserving for the internet of things in multi-objective task scheduling in cloud-fog computing using goal programming approach. Peer-to-Peer Netw Appl 14:3865–3890

    Article  Google Scholar 

  18. Fan T, Cui Z (2021) Adaptive differential privacy preserving based on multi-objective optimization in deep neural networks. Concurr Comput: Pract Exp 33(20):e6367

    Article  Google Scholar 

  19. Ahamad D, Hameed SA, Akhtar M (2022) A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. J King Saud Univ-Comput Inf Sci 34(6):2343–2358

    Article  Google Scholar 

  20. Rubai SM (2022) Hybrid heuristic-based key generation protocol for intelligent privacy preservation in cloud sector. J Parallel Distrib Comput 163:166–180

    Article  Google Scholar 

  21. Singh AK, Gupta R (2022) A privacy-preserving model based on differential approach for sensitive data in cloud environment. Multimed Tools Appl 81(23):33127–33150

    Article  Google Scholar 

  22. Gupta R, Singh AK (2022) Privacy-preserving cloud data model based on differential approach. In 2022 Second International Conference on Power. Control Comp Technol (ICPC2T) (pp. 1–6). IEEE

  23. Kulkarni YR, Jagdale B, Sugave SR (2023) Optimized key generation-based privacy preserving data mining model for secure data publishing. Adv Eng Softw 175:103332

  24. Anand K, Vijayaraj A, Vijay Anand M (2022) An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud. Peer-to-Peer Netw Appl 15(4):2007–2020

    Article  Google Scholar 

  25. Shen J, Yang H, Vijayakumar P, Kumar N (2021) A privacy-preserving and untraceable group data sharing scheme in cloud computing. IEEE Trans Dependable Secure Comput 19(4):2198–2210

    Article  Google Scholar 

  26. Chinnasamy P, Padmavathi S, Swathy R, Rakesh S (2021) Efficient data security using hybrid cryptography on cloud computing. In Invent Comm Comput Technol: Proceedings of ICICCT 2020 (pp. 537–547). Springer Singapore

Download references

Acknowledgements

None

Funding

None.

Author information

Authors and Affiliations

Authors

Contributions

 Sahaya Stalin Jose G -(Corresponding Author)—Conceptualization Methodology, Original draft preparation. Sugitha G –Supervision Ayshwarya Lakshmi S.- Supervision. Preethi B C. –Supervision.

Corresponding author

Correspondence to Sahaya Stalin Jose G.

Ethics declarations

Ethical approval

Nil.

Conflicts of interest/Competing interests

Nil.

Consent to participate

Nil.

Consent for publication

Nil.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

G, S.J., Sugitha G, S, A.L. et al. A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm. Peer-to-Peer Netw. Appl. 17, 911–923 (2024). https://doi.org/10.1007/s12083-023-01591-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-023-01591-w

Keywords

Navigation