Abstract
Cloud computing is a popular model for providing data storage services from remote computing facilities through internet. Security is known as an element for protecting sensitive information from vulnerable attacks and ensuring information confidentiality, integrity and authenticity. Privacy is the assurance that users could maintain complete control over their sensitive information. Cloud storage-based data publication is significant in medical field where it contains sensitive information such as nature of the disease, patient medical history, and effects of the illness. The publisher should not disclose any of the individual or sensitive information of the individuals with the research board while publishing the reports to the medical data analysts. Deciding on the nature of sensitivity, the user may be allowed to access the information from cloud environment that is a complex process. In order to ensure the complete privacy of individual medical history, the present research work employs k-anonymization to upgrade the privacy policies in the cloud storage. In addition to this, the genetic grey wolf optimization algorithm is employed to decide the data to be published based on the information preserved for privacy purposes. The proposed work is evaluated in a real cloud infrastructure with respect to privacy, utility and information losses. The results show that the proposed method is efficient for privacy-based data publication as it conceals the sensitive information effectively.
Similar content being viewed by others
References
Ari, A. A. A., et al. (2019). Enabling privacy and security in cloud of things: Architecture, applications, security and privacy challenges. Applied Computing and Informatics. https://doi.org/10.1016/j.aci.2019.11.005.
Takabi, H., Joshi, J. B. D., & Ahn, G.-J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security and Privacy,8(6), 24–31.
Thokchom, S., & Saikia, D. K. (2020). Privacy preserving integrity checking of shared dynamic cloud data with user revocation. Journal of Information Security and Applications,50, 102427.
Kundalwal, M. K., Chatterjee, K., & Singh, A. (2019). An improved privacy preservation technique in health-cloud. ICT Express,5(3), 167–172.
Liang, K., et al. (2014). A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing. IEEE Transactions on Information Forensics and Security,9(10), 1667–1680.
Bibal-Benifa, J. V., & Dharma, D. (2018). A hybrid auto-scaler for resource scaling in cloud environment. Journal of Parallel and Distributed Computing. https://doi.org/10.1016/j.jpdc.2018.04.016.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks,76, 146–164.
Raigoza, J., & Jituri, K. (2016). Evaluating performance of symmetric encryption algorithms. In 2016 international conference on computational science and computational intelligence (CSCI). https://doi.org/10.1109/csci.2016.0258.
Sehgal, N. K., & Bhatt, P. C. P. (2018). Future trends in cloud computing. Cloud Computing. https://doi.org/10.1007/978-3-319-77839-6_12.
Romanou, A. (2018). The necessity of the implementation of privacy by design in sectors where data protection concerns arise. Computer Law and Security Review,34(1), 99–110.
Rosario, B., & Hearst, M. A. (2014). Classifying semantic relations in bioscience texts. In Proceedings of the 42nd annual meeting of the association for computational linguistics (ACL 2004). Association for Computational Linguistics 2004. http://biotext.berkeley.edu/dis_treat_data.html.
Twenty Newsgroup Dataset. https://archive.ics.uci.edu/ml/datasets/Twenty+Newsgroups.
Reuters 21578 Dataset. https://archive.ics.uci.edu/ml/datasets/Reuters-21578+Text+Categorization+Collection.
Caton, S., Bubendorfer, K., Chard, K., & Rana, O. F. (2012). Social cloud computing: A vision for socially motivated resource sharing. IEEE Transactions on Services Computing,5(4), 551–563.
Liu, X., Zhang, Y., Wang, B., & Yan, J. (2013). Mona: Secure multi-owner data sharing for dynamic groups in the cloud. IEEE Transactions on Parallel and Distributed Systems,24(6), 1182–1191. https://doi.org/10.1109/tpds.2012.331.
Chu, C.-K., Chow, S. S. M., Tzeng, W.-G., Zhou, J., & Deng, R. H. (2014). Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Transactions on Parallel and Distributed Systems,25(2), 468–477. https://doi.org/10.1109/tpds.2013.112.
Cui, B., Liu, Z., & Wang, L. (2016). Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage. IEEE Transactions on Computers,65(8), 2374–2385. https://doi.org/10.1109/tc.2015.2389959.
Sundareswaran, S., Squicciarini, A. C., & Lin, D. (2012). Ensuring distributed accountability for data sharing in the cloud. IEEE Transactions on Dependable and Secure Computing,9(4), 556–568.
Shen, J., Zhou, T., Chen, X., Li, J., & Susilo, W. (2018). Anonymous and traceable group data sharing in cloud computing. IEEE Transactions on Information Forensics and Security,13(4), 912–925. https://doi.org/10.1109/tifs.2017.2774439.
Abdel Hameed, S. A., Moussa, S. M., & Khalifa, M. E. (2019). Restricted sensitive attributes-based sequential anonymization (RSA-SA) approach for privacy-preserving data stream publishing. Knowledge-Based Systems,164, 1–20.
Wang, H. (2010). Privacy-preserving data sharing in cloud computing. Journal of Computer Science and Technology,25(3), 401–414. https://doi.org/10.1007/s11390-010-9333-1.
Ding, W., Yan, Z., & Deng, R. (2017). Privacy-preserving data processing with flexible access control. IEEE Transactions on Dependable and Secure Computing. https://doi.org/10.1109/tdsc.2017.2786247.
Zhang, X., Liu, C., Nepal, S., Pandey, S., & Chen, J. (2013). A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate datasets in cloud. IEEE Transactions on Parallel and Distributed Systems,24(6), 1192–1202. https://doi.org/10.1109/tpds.2012.238.
Wang, B., Li, B., & Li, H. (2014). Oruta: Privacy-preserving public auditing for shared data in the cloud. IEEE Transactions on Cloud Computing,2(1), 43–56. https://doi.org/10.1109/TCC.2014.2299807.
Sanchez, R., Almenares, F., Arias, P., Diaz-Sanchez, D., & Marin, A. (2012). Enhancing privacy and dynamic federation in IdM for consumer cloud computing. IEEE Transactions on Consumer Electronics,58(1), 95–103. https://doi.org/10.1109/tce.2012.6170060.
Mehta, K., Liu, D., & Wright, M. (2012). Protecting location privacy in sensor networks against a global eavesdropper. IEEE Transactions on Mobile Computing,11(2), 320–336. https://doi.org/10.1109/tmc.2011.32.
Hassan, F., Domingo-Ferrer, J., & Soria-Comas, J. (2018). Anonymization of unstructured data via named-entity recognition. In International conference on modeling decisions for artificial intelligence (pp. 296–305). Cham: Springer.
Raghupathi, W., & Raghupathi, V. (2014). Big data analytics in healthcare: Promise and potential. Health Information Science and Systems. https://doi.org/10.1186/2047-2501-2-3.
Sweeney, L. (2002). Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems,10(05), 571–588. https://doi.org/10.1142/s021848850200165x.
Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2013). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems,25(1), 222–233.
Yang, X., Ma, T., Tang, M., & Tian, W. (2014). A survey of privacy preserving data publishing using generalization and suppression. Applied Mathematics and Information Sciences,8(3), 1103–1116.
Hajian, S., Domingo-Ferrer, J., & Orio, F. (2014). Generalization-based privacy preservation and discrimination prevention in data publishing and mining. Data Mining and Knowledge Discovery,28(5–6), 1158–1188.
Kenig, B., & Tassa, T. (2012). A practical approximation algorithm for optimal k-anonymity. Data Mining and Knowledge Discovery,25(1), 134–168.
Singh, N., & Singh, A. K. (2018). Data privacy protection mechanisms in cloud. Data Science and Engineering,3(1), 24–39.
Hua, J., Tang, A., Fang, Y., Shen, Z., & Zhong, S. (2016). Privacy-preserving utility verification of the data published by non-interactive differentially private mechanisms. IEEE Transactions on Information Forensics and Security,11(10), 2298–2311.
Soria-Comas, J., Domingo-Ferrer, J., Sanchez, D., & Megias, D. (2017). Individual differential privacy: A utility-preserving formulation of differential privacy guarantees. IEEE Transactions on Information Forensics and Security,12(6), 1418–1429.
Kumar, P., & Alphonse, P. J. A. (2018). Attribute based encryption in cloud computing: A survey, gap analysis, and future directions. Journal of Network and Computer Applications,108, 37–52.
Enamul, K. M., Wang, H., & Bertino, E. (2011). Efficient systematic clustering method for k-anonymization. Acta Informatica,48(1), 51–66.
Loukides, G., Gkoulalas-Divanis, A., & Malin, B. (2011). COAT: Constraint-based anonymization of transactions. Knowledge and Information Systems,28(2), 251–281.
Centre for Advanced Computing and Research, Noorul Islam Centre for Higher Education. http://nichecloud.in/.
Kulkarni, Y. R., & Murugan, T. S. (2018). C-mixture and multi-constraints based genetic algorithm for collaborative data publishing. Journal of King Saud University—Computer and Information Sciences,30(2), 175–184.
Meyer-Baese A., & Schmid, V. (2014). In Pattern recognition and signal analysis in medical imaging (2nd edn).
Mirjalili, S., Mirjalili, S. M., & Lewis, A. (2014). Grey wolf optimizer. Advances in Engineering Software,69, 46–61.
Acknowledgements
The support extended for the work in terms of computing facilities by Noorul Islam Centre for Higher Education, India is greatly acknowledged.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Bibal Benifa, J.V., Venifa Mini, G. Privacy Based Data Publishing Model for Cloud Computing Environment. Wireless Pers Commun 113, 2215–2241 (2020). https://doi.org/10.1007/s11277-020-07320-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07320-3