Abstract
Nowadays, cloud computing has played a vital role in most data-intensive applications to store the data in the intermediated dataset. This effective cloud storage process helps to minimize the storage and processing cost while performing recomputing. Although the cloud provides numerous services, resources maintaining cost, outsourced user data protection from unauthorized users, the privacy of sensitive data, and computation complexity is still a major issue. A novel deep learning network-based frequent pattern mining model (DLFPM) is introduced to overcome these issues. Here, the presented method examines the frequent access information according to the layers of network functions. The network computes the sensitive information from the deep learning function. The identified sensitivity information is encrypted using the single sign-on associated with the Paillier encryption technique (SSO-PE) that avoids unauthorized access. The effective utilization of these algorithms continuously manages the sensitive data security that helps to minimize the computation cost and computation time.
Similar content being viewed by others
References
Bacis, Enrico, De Capitani, Sabrina, di Vimercati, Sara, Foresti, Stefano Paraboschi, Rosa, Marco, Samarati, Pierangela: Access control management for secure cloud storage. In: International Conference on Security and Privacy in Communication Systems, pp. 353–372. Springer, Cham (2016)
Li, J., Jigang, Wu., Chen, L.: Block-secure: Blockchain based scheme for secure P2P cloud storage. Inf. Sci. 465, 219–231 (2018)
Xiong, S., Ni, Q., Wang, L., Wang, Q.: SEM-ACSIT: secure and efficient multi-authority access control for IoT cloud storage. IEEE Internet Things J. 7(4), 2914–2927 (2020)
Zhang, Xuyun, Chang Liu, Jinjun Chen, and Wanchun Dou. "An upper-bound control approach for cost-effective privacy protection of intermediate dataset storage in cloud." In 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, pp. 518–525. IEEE, 2011.
Begum, R. Sabin., Sugumar, R.: Novel entropy-based approach for cost-effective privacy preservation of intermediate datasets in cloud. Cluster. Comput. 22(4), 9581–9588 (2019)
Kanagarajan, S., Vellaichamy, S.: A heuristic approach for preserving intermediate data set storage on cloud using storage & regeneration cost based on user preference. Int. J Adv. Eng. Technol. 7(6), 1829 (2015)
Ni, Jianbing, Lin, Xiaodong, Shen, Xuemin Sherman: Toward edge-assisted Internet of Things: From security and efficiency perspectives. IEEE Network. 33(2), 50–57 (2019)
Qiu, Meikang, Gai, Keke, Zhao, Hui, Liu, Meiqin: Privacy-preserving smart data storage for financial industry in cloud computing. Concurr Comput.: Pract. Exp. 30(5), e4278 (2018)
Yang, P., Xiong, N., Ren, J.: Data security and privacy protection for cloud storage: A survey. IEEE Access 8, 131723–131740 (2020)
Henze, Martin. "The Quest for Secure and Privacy-preserving Cloud-based Industrial Cooperation." In 2020 IEEE Conference on Communications and Network Security (CNS), pp. 1–5. IEEE, 2020.
Shabir, Muhammad Yasir, Iqbal, Asif, Mahmood, Zahid, Ghafoor, AtaUllah: Analysis of classical encryption techniques in cloud computing. Tsinghua Sci. Technol. 21(1), 102–113 (2016)
Salavi, Rashmi R., Math, Mallikarjun M., Kulkarni, U.P.: A Survey of Various Cryptographic Techniques: From Traditional Cryptography to Fully Homomorphic Encryption. In: Innovations in Computer Science and Engineering, pp. 295–305. Springer, Singapore (2019)
Li, P., Li, J., Huang, Z., Li, T., Gao, C.-Z., Yiu, S.-M., Chen, K.: Multi-key privacy-preserving deep learning in cloud computing. Futur. Gener. Comput. Syst. 74, 76–85 (2017)
Kwabena, O.-A., Qin, Z., Zhuang, T., Qin, Z.: MSCryptoNet: Multi-scheme privacy-preserving deep learning in cloud computing. IEEE Access. 7, 29344–29354 (2019)
Li, X., Zhu, Y., Wang, J., Zhang, Ji.: Efficient and secure multi-dimensional geometric range query over encrypted data in cloud. J Parallel. Distrib. Comput. 131, 44–54 (2019)
Ogiela, Urszula: Cognitive cryptography for data security in cloud computing. Concurr. Comput.: Pract. Exp. 32(18), e5557 (2020)
Idhammad, M., Afdel, K., Belouch, M.: Distributed intrusion detection system for cloud environments based on data mining techniques. Procedia Computer Science 127, 35–41 (2018)
Xu, C., Wang, N., Zhu, L., Sharif, K., Zhang, C.: Achieving searchable and privacy-preserving data sharing for cloud-assisted E-healthcare system. IEEE Internet Things J. 6(5), 8345–8356 (2019). https://doi.org/10.1109/JIOT.2019.2917186
Sharma, S., Powers, J., Chen, K.: PrivateGraph: privacy-preserving spectral analysis of encrypted graphs in the cloud. IEEE Trans. Knowl. Data Eng. 31(5), 981–995 (2019). https://doi.org/10.1109/TKDE.2018.2847662
Yang, J., Xu, J., Weng, J. Zhou., Wong, D.S.: Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage. IEEE Trans. Cloud Comput. 9(1), 212–225 (2021). https://doi.org/10.1109/TCC.2018.2851256
Singh, N., Singh, A.K.: Data privacy protection mechanisms in cloud. Data Sci. Eng. 3, 24–39 (2018). https://doi.org/10.1007/s41019-017-0046-0
Dave, J., Saharan, S., Faruki, P., Laxmi, V., Gaur, M.S.: Secure Random Encryption for Deduplicated Storage. In: Shyamasundar, R., Singh, V., Vaidya, J. (eds.) Information Systems Security. ICISS 2017. Lecture Notes in Computer Science, vol. 10717. Springer, Cham (2017)
Wu, D.N., Gan, Q.Q., Wang, X.M.: Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting. IEEE Access. 6, 42445–42453 (2018). https://doi.org/10.1109/ACCESS.2018.2861424
Guo, C., Zhuang, R., Su, C., Liu, C.Z., Choo, K.R.: Secure and efficient ${K}$ nearest neighbor query over encrypted uncertain data in cloud-IoT ecosystem. IEEE Internet Things J. 6(6), 9868–9879 (2019). https://doi.org/10.1109/JIOT.2019.2932775
Badawi, A.A., Hoang, L., Mun, C.F., Laine, K., Aung, K.M.M.: PrivFT: private and fast text classification with homomorphic encryption. IEEE Access. 8, 226544–226556 (2020). https://doi.org/10.1109/ACCESS.2020.3045465
Mohanty, Sachi Nandan, Ramya, K.C., Sheeba Rani, S., Gupta, D., Shankar, K., Lakshmanaprabu, S.K., Khanna. , A.: An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy. Future. Gener. Comput. Syst. 102, m1027-1037 (2020)
Kaaniche, N., Laurent, M.: Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput. Commun. 111, 120–141 (2017)
Shah, Meet, Mohammedhasan Shaikh, Vishwajeet Mishra, and Grinal Tuscano. "Decentralized cloud storage using blockchain." In 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), pp. 384–389. IEEE, 2020.
Riad, Khaled, Huang, Teng, Ke, Lishan: A dynamic and hierarchical access control for IoT in multi-authority cloud storage. J Netw. Comput. Appl. 160, 102633 (2020)
de Araujo, J.M.S.: Combination of WRF model and LSTM network for solar radiation forecasting—timor leste case study. Comput Water. Energy. Environ. Eng. 9(4), 108–144 (2020)
https://www.kaggle.com/alukosayoenoch/cyber-security-breaches-data/activity
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
V., S., Shanmugapriya, P. DLFPM-SSO-PE: privacy-preserving and security of intermediate data in cloud storage. Distrib Parallel Databases 40, 815–833 (2022). https://doi.org/10.1007/s10619-021-07352-z
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10619-021-07352-z