Skip to main content
Log in

DLFPM-SSO-PE: privacy-preserving and security of intermediate data in cloud storage

  • Published:
Distributed and Parallel Databases Aims and scope Submit manuscript

Abstract

Nowadays, cloud computing has played a vital role in most data-intensive applications to store the data in the intermediated dataset. This effective cloud storage process helps to minimize the storage and processing cost while performing recomputing. Although the cloud provides numerous services, resources maintaining cost, outsourced user data protection from unauthorized users, the privacy of sensitive data, and computation complexity is still a major issue. A novel deep learning network-based frequent pattern mining model (DLFPM) is introduced to overcome these issues. Here, the presented method examines the frequent access information according to the layers of network functions. The network computes the sensitive information from the deep learning function. The identified sensitivity information is encrypted using the single sign-on associated with the Paillier encryption technique (SSO-PE) that avoids unauthorized access. The effective utilization of these algorithms continuously manages the sensitive data security that helps to minimize the computation cost and computation time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Bacis, Enrico, De Capitani, Sabrina, di Vimercati, Sara, Foresti, Stefano Paraboschi, Rosa, Marco, Samarati, Pierangela: Access control management for secure cloud storage. In: International Conference on Security and Privacy in Communication Systems, pp. 353–372. Springer, Cham (2016)

    Google Scholar 

  2. Li, J., Jigang, Wu., Chen, L.: Block-secure: Blockchain based scheme for secure P2P cloud storage. Inf. Sci. 465, 219–231 (2018)

    Article  Google Scholar 

  3. Xiong, S., Ni, Q., Wang, L., Wang, Q.: SEM-ACSIT: secure and efficient multi-authority access control for IoT cloud storage. IEEE Internet Things J. 7(4), 2914–2927 (2020)

    Article  Google Scholar 

  4. Zhang, Xuyun, Chang Liu, Jinjun Chen, and Wanchun Dou. "An upper-bound control approach for cost-effective privacy protection of intermediate dataset storage in cloud." In 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, pp. 518–525. IEEE, 2011.

  5. Begum, R. Sabin., Sugumar, R.: Novel entropy-based approach for cost-effective privacy preservation of intermediate datasets in cloud. Cluster. Comput. 22(4), 9581–9588 (2019)

    Google Scholar 

  6. Kanagarajan, S., Vellaichamy, S.: A heuristic approach for preserving intermediate data set storage on cloud using storage & regeneration cost based on user preference. Int. J Adv. Eng. Technol. 7(6), 1829 (2015)

    Google Scholar 

  7. Ni, Jianbing, Lin, Xiaodong, Shen, Xuemin Sherman: Toward edge-assisted Internet of Things: From security and efficiency perspectives. IEEE Network. 33(2), 50–57 (2019)

    Article  Google Scholar 

  8. Qiu, Meikang, Gai, Keke, Zhao, Hui, Liu, Meiqin: Privacy-preserving smart data storage for financial industry in cloud computing. Concurr Comput.: Pract. Exp. 30(5), e4278 (2018)

    Article  Google Scholar 

  9. Yang, P., Xiong, N., Ren, J.: Data security and privacy protection for cloud storage: A survey. IEEE Access 8, 131723–131740 (2020)

    Article  Google Scholar 

  10. Henze, Martin. "The Quest for Secure and Privacy-preserving Cloud-based Industrial Cooperation." In 2020 IEEE Conference on Communications and Network Security (CNS), pp. 1–5. IEEE, 2020.

  11. Shabir, Muhammad Yasir, Iqbal, Asif, Mahmood, Zahid, Ghafoor, AtaUllah: Analysis of classical encryption techniques in cloud computing. Tsinghua Sci. Technol. 21(1), 102–113 (2016)

    Article  Google Scholar 

  12. Salavi, Rashmi R., Math, Mallikarjun M., Kulkarni, U.P.: A Survey of Various Cryptographic Techniques: From Traditional Cryptography to Fully Homomorphic Encryption. In: Innovations in Computer Science and Engineering, pp. 295–305. Springer, Singapore (2019)

    Chapter  Google Scholar 

  13. Li, P., Li, J., Huang, Z., Li, T., Gao, C.-Z., Yiu, S.-M., Chen, K.: Multi-key privacy-preserving deep learning in cloud computing. Futur. Gener. Comput. Syst. 74, 76–85 (2017)

    Article  Google Scholar 

  14. Kwabena, O.-A., Qin, Z., Zhuang, T., Qin, Z.: MSCryptoNet: Multi-scheme privacy-preserving deep learning in cloud computing. IEEE Access. 7, 29344–29354 (2019)

    Article  Google Scholar 

  15. Li, X., Zhu, Y., Wang, J., Zhang, Ji.: Efficient and secure multi-dimensional geometric range query over encrypted data in cloud. J Parallel. Distrib. Comput. 131, 44–54 (2019)

    Article  Google Scholar 

  16. Ogiela, Urszula: Cognitive cryptography for data security in cloud computing. Concurr. Comput.: Pract. Exp. 32(18), e5557 (2020)

    Google Scholar 

  17. Idhammad, M., Afdel, K., Belouch, M.: Distributed intrusion detection system for cloud environments based on data mining techniques. Procedia Computer Science 127, 35–41 (2018)

    Article  Google Scholar 

  18. Xu, C., Wang, N., Zhu, L., Sharif, K., Zhang, C.: Achieving searchable and privacy-preserving data sharing for cloud-assisted E-healthcare system. IEEE Internet Things J. 6(5), 8345–8356 (2019). https://doi.org/10.1109/JIOT.2019.2917186

    Article  Google Scholar 

  19. Sharma, S., Powers, J., Chen, K.: PrivateGraph: privacy-preserving spectral analysis of encrypted graphs in the cloud. IEEE Trans. Knowl. Data Eng. 31(5), 981–995 (2019). https://doi.org/10.1109/TKDE.2018.2847662

    Article  Google Scholar 

  20. Yang, J., Xu, J., Weng, J. Zhou., Wong, D.S.: Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage. IEEE Trans. Cloud Comput. 9(1), 212–225 (2021). https://doi.org/10.1109/TCC.2018.2851256

    Article  Google Scholar 

  21. Singh, N., Singh, A.K.: Data privacy protection mechanisms in cloud. Data Sci. Eng. 3, 24–39 (2018). https://doi.org/10.1007/s41019-017-0046-0

    Article  Google Scholar 

  22. Dave, J., Saharan, S., Faruki, P., Laxmi, V., Gaur, M.S.: Secure Random Encryption for Deduplicated Storage. In: Shyamasundar, R., Singh, V., Vaidya, J. (eds.) Information Systems Security. ICISS 2017. Lecture Notes in Computer Science, vol. 10717. Springer, Cham (2017)

    Google Scholar 

  23. Wu, D.N., Gan, Q.Q., Wang, X.M.: Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting. IEEE Access. 6, 42445–42453 (2018). https://doi.org/10.1109/ACCESS.2018.2861424

    Article  Google Scholar 

  24. Guo, C., Zhuang, R., Su, C., Liu, C.Z., Choo, K.R.: Secure and efficient ${K}$ nearest neighbor query over encrypted uncertain data in cloud-IoT ecosystem. IEEE Internet Things J. 6(6), 9868–9879 (2019). https://doi.org/10.1109/JIOT.2019.2932775

    Article  Google Scholar 

  25. Badawi, A.A., Hoang, L., Mun, C.F., Laine, K., Aung, K.M.M.: PrivFT: private and fast text classification with homomorphic encryption. IEEE Access. 8, 226544–226556 (2020). https://doi.org/10.1109/ACCESS.2020.3045465

    Article  Google Scholar 

  26. Mohanty, Sachi Nandan, Ramya, K.C., Sheeba Rani, S., Gupta, D., Shankar, K., Lakshmanaprabu, S.K., Khanna. , A.: An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy. Future. Gener. Comput. Syst. 102, m1027-1037 (2020)

    Article  Google Scholar 

  27. Kaaniche, N., Laurent, M.: Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput. Commun. 111, 120–141 (2017)

    Article  Google Scholar 

  28. Shah, Meet, Mohammedhasan Shaikh, Vishwajeet Mishra, and Grinal Tuscano. "Decentralized cloud storage using blockchain." In 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), pp. 384–389. IEEE, 2020.

  29. Riad, Khaled, Huang, Teng, Ke, Lishan: A dynamic and hierarchical access control for IoT in multi-authority cloud storage. J Netw. Comput. Appl. 160, 102633 (2020)

    Article  Google Scholar 

  30. de Araujo, J.M.S.: Combination of WRF model and LSTM network for solar radiation forecasting—timor leste case study. Comput Water. Energy. Environ. Eng. 9(4), 108–144 (2020)

    Article  Google Scholar 

  31. https://www.kaggle.com/alukosayoenoch/cyber-security-breaches-data/activity

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sarala V..

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

V., S., Shanmugapriya, P. DLFPM-SSO-PE: privacy-preserving and security of intermediate data in cloud storage. Distrib Parallel Databases 40, 815–833 (2022). https://doi.org/10.1007/s10619-021-07352-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10619-021-07352-z

Keywords

Navigation