An IoT-Centric Data Protection Method for Preserving Security and Privacy in Cloud

被引:23
|
作者
Gupta, Rishabh [1 ]
Gupta, Ishu [2 ]
Singh, Ashutosh Kumar [1 ]
Saxena, Deepika [1 ]
Lee, Chung-Nan [2 ]
机构
[1] Natl Inst Technol, Dept Comp Applicat, Kurukshetra 136119, India
[2] Natl Sun Yat Sen Univ, Cloud Comp Res Ctr, Dept Comp Sci & Engn, Kaohsiung 804, Taiwan
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 02期
关键词
Artificial intelligence; cloud computing; Internet of Things (IoT); K-anonymization; security and privacy; SCHEME;
D O I
10.1109/JSYST.2022.3218894
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A malevolent utility provider may extract outsourced data from the cloud while storing, analyzing, and sharing the data among the involved entities to acquire sensitive information that can be misused. Therefore, data protection has become a challenging task that needs to be tackled appropriately. To address this pivotal and challenging issue, this article proposes a secure data protection method for preserving privacy in the cloud environment by effectively partitioning, partially decrypting, and analyzing the data that improves the model's efficiency while maintaining security. The model ensures the system's security and privacy by performing secure data storage, analysis, and sharing. The numerous experiments are conducted and achieved results demonstrate that the proposed method procures data privacy with high accuracy, precision, recall, and F1-score up to 96.85%, 96.65%, 96.85%, and 96.72% with a relative improvement up to 45.58%, 49.31%, 45.58%, and 48.46%, respectively, for varieties of datasets as compared to state-of-the-art works.
引用
收藏
页码:2445 / 2454
页数:10
相关论文
共 50 条
  • [31] Data-centric security: Integrating data privacy and data security
    Hennessy, S. D.
    Lauer, G. D.
    Zunic, N.
    Gerber, B.
    Nelson, A. C.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (02)
  • [32] Data-centric security: Integrating data privacy and data security
    Hennessy, Shawn D.
    Lauer, George D.
    Zunic, Nev
    Gerber, Benjamin
    Nelson, Adam C.
    IBM Journal of Research and Development, 2009, 53 (02):
  • [33] Data Security and Privacy in the Cloud
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Livraga, Giovanni
    Samarati, Pierangela
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2019, 2019, 10993
  • [34] Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
    Wang, Cong
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [35] Privacy preserving model-based authentication and data security in cloud computing
    Pawar, Ankush Balaram
    Ghumbre, Shashikant U.
    Jogdand, Rashmi M.
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) : 173 - 190
  • [36] Efficient Privacy Preserving Integrity Checking Model for Cloud Data Storage Security
    Subha, T.
    Jayashri, S.
    2016 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 55 - 60
  • [37] Medical big data analysis: preserving security and privacy with hybrid cloud technology
    Shanmugapriya, E.
    Kavitha, R.
    SOFT COMPUTING, 2019, 23 (08) : 2585 - 2596
  • [38] Medical big data analysis: preserving security and privacy with hybrid cloud technology
    E. Shanmugapriya
    R. Kavitha
    Soft Computing, 2019, 23 : 2585 - 2596
  • [39] A PRIVACY-PRESERVING STORAGE SECURITY FOR SPATIAL DATA IN DYNAMICS CLOUD ENVIRONMENT
    Sakthivel, S.
    Dhiyanesh, B.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [40] Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions
    Sun, Pan Jun
    IEEE ACCESS, 2019, 7 : 147420 - 147452