ISSN : 2583-2646

Privacy Preservation Techniques in Cloud Computing

ESP Journal of Engineering & Technology Advancements
© 2023 by ESP JETA
Volume 3  Issue 1
Year of Publication : 2023
Authors : Himani Saini, Gopal Singh
:10.56472/25832646/JETA-V3I1P103

Citation:

Himani Saini, Gopal Singh, 2023. "Privacy Preservation Techniques in Cloud Computing" ESP Journal of Engineering & Technology Advancements  3(1): 15-20.

Abstract:

Cloud Computing helps customers to take benefit from the variety of services, such ason-demand self-service, universal network connectivity, risk transfer, a usage-based payment andlocation-independent resource sharing. The privacy of cloud data is a critical concern in the cloudcomputing environment that necessitates unique attention. Kanonymity is a useful concept for preserving privacy in cloud computing. The concept of generalization is most commonly used because of its little information loss. However, such algorithms are often computationally expensive, they struggle to perform well when dealing with massive amounts of data. This articleexamines the security risks and concerns that cloud consumers and service providers confront. This research study identifies the research gaps and proposes a method to address the problem

References:

[1] P. Krishnadoss and P. Jacob, “OCSA: Task scheduling algorithm in cloud computing environment,” Int. J. Intell. Eng. Syst., vol. 11, no. 3, pp. 271–279, 2018, doi: 10.22266/ijies2018.0630.29.
[2] S. A. Ali, M. Affan, and M. Alam, “A study of efficient energy management techniques for cloud computing environment,” Proc. 9th Int. Conf. Cloud Comput. Data Sci. Eng. Conflu. 2019, pp. 13–18, 2019, doi:10.1109/CONFLUENCE.2019.8776977.
[3] J. Wang, Y. Zhao, S. Jiang, and J. Le, “Providing privacy preserving in Cloud computing,” 3rd Int. Conf. Hum. Syst. Interact. HSI’2010 - Conf. Proc., pp. 472–475, 2010, doi: 10.1109/HSI.2010.5514526.
[4] S. Zhang, X. Li, Z. Tan, T. Peng, and G. Wang, “A caching and spatial [Formula presented]-anonymity drivenprivacy enhancement scheme in continuous location-based services,” Futur. Gener. Comput. Syst., vol. 94, pp.40–50, 2019, doi:10.1016/j.future.2018.10.053.
[5] A. Campan and T. M. Truta, “Data and structural K-anonymity in social networks,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 5456 LNCS, no. February, pp. 33– 54, 2009, doi:10.1007/978-3-642-01718-6_4.
[6] L. Sweeney, “Achieving k-anonymity privacy protection using generalization and suppression,” Int. J. Uncertainty, Fuzziness Knowlege-Based Syst., vol. 10, no. 5, pp. 571–588, 2002, doi: 10.1142/S021848850200165X.
[7] K. Arava and S. Lingamgunta, “Adaptive k-Anonymity Approach for Privacy Preserving in Cloud,” Arab. J. Sci. Eng., vol. 45, no. 4, pp. 2425–2432, 2020, doi: 10.1007/s13369-019-03999-0.
[8] S. E. Chang, A. Y. Liu, and W. C. Shen, “User trust in social networking services: A comparison of Facebook and LinkedIn,” Comput. Human Behav., vol. 69, pp. 207–217, 2017, doi: 10.1016/j.chb.2016.12.013.
[9] F. Fei, S. Li, H. Dai, C. Hu, W. Dou, and Q. Ni, “A K-Anonymity Based Schema for Location Privacy Preservation,” IEEE Trans. Sustain. Comput., vol. 4, no. 2, pp. 156–167, 2019, doi: 10.1109/TSUSC.2017.2733018.
[10] J. Ma et al., “De-Anonymizing Social Networks with Random Forest Classifier,” IEEE Access, vol. 6, no. c, pp. 10139–10150, 2017, doi: 10.1109/ACCESS.2017.2756904.
[11] J. Rao, R. Pattewar, and R. Chhallani, “A Privacy-Preserving Approach to Secure Location-Based Data,” pp. 47–55.
[12] S. Al-Kharji, Y. Tian, and M. Al-Rodhaan, “A Novel (K, X)-isomorphism Method for Protecting Privacy in Weighted social Network,” 21st Saudi Comput. Soc. Natl. Comput. Conf. NCC 2018, pp. 1–6, 2018, doi:10.1109/NCG.2018.8593107.
[13] E. Aghasian, S. Garg, and J. Montgomery, “A privacy-enhanced friending approach for users on multiple online social networks,” Computers, vol. 7, no. 3, 2018, doi: 10.3390/computers7030042.
[14] S. Krishnan and M. Chen, “Cloud-based system for fake tweet identification,” 2019 IFIP/IEEE Symp. Integr. Netw. Serv. Manag. IM 2019, pp. 720–721, 2019.
[15] H. Wang, D. He, and J. Yu, “Privacy-preserving incentive and rewarding scheme for crowd computing in socialmedia,” Inf.Sci. (Ny)., vol. 470, pp. 15–27, 2019, doi: 10.1016/j.ins.2018.07.016.
[16] C. zhi Gao, Q. Cheng, X. Li, and S. bing Xia, “Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network,” Cluster Comput., vol. 22, pp. 1655–1663, 2019, doi: 10.1007/s10586-017-1649-y.
[17] X. Zheng, Z. Cai, G. Luo, L. Tian, and X. Bai, “Privacy-preserved community discovery in online social networks,” Futur. Gener. Comput. Syst., vol. 93, pp. 1002–1009, 2019, doi: 10.1016/j.future.2018.04.020.
[18] S. M. Abdulhamid, M. S. Abd Latiff, S. H. H. Madni, and M. Abdullahi, “Fault tolerance aware scheduling technique for cloud computing environment using dynamic clustering algorithm,” Neural Comput. Appl., vol. 29, no. 1, pp. 279–293,2018, doi: 10.1007/s00521-016-2448-8.
[19] J. Andrew, J. Karthikeyan, and J. Jebastin, “Privacy Preserving Big Data Publication on Cloud Using Mondrian Anonymization Techniques and Deep Neural Networks,” 2019 5th Int. Conf. Adv. Comput. Commun. Syst. ICACCS 2019, pp. 722–727, 2019, doi: 10.1109/ICACCS.2019.8728384.
[20] S. Ergün, B. B. Kirlar, S. Z. Alparslan Gok, and G. W. Weber, “An Application Of Crypto Cloud Computing In Social Networks By Cooperative Game Theory,” J. Ind. Manag. Optim., vol. 16, no. 4, pp. 1927–1941, 2020, doi:10.3934/jimo.2019036.
[21] P. Singh, Y. K. Dwivedi, K. S. Kahlon, R. S. Sawhney, A. A. Alalwan, and N. P. Rana, “Smart Monitoring andControlling of Government Policies Using Social Media and Cloud Computing,” Inf. Syst. Front., vol. 22, no.2, pp. 315–337, 2020,doi: 10.1007/s10796-019-09916-y.
[22] Sanjaikanth E Vadakkethil Somanathan Pillai. (2021). Balancing Precision and Privacy: Harnessing Location-Based Services in Healthcare Delivery. International Journal on Recent and Innovation Trends in Computing and Communication, 9(12), 50–56. Retrieved from https://www.ijritcc.org/index.php/ijritcc/article/view/10963
[23] Hu, Wen-Chen, Sanjaikanth E. Vadakkethil Somanathan Pillai, and Abdelrahman Ahmed ElSaid. "Mobile Health Text Misinformation Identification Using Mobile Data Mining," International Journal of Mobile Devices, Wearable Technology, and Flexible Electronics (IJMDWTFE) 12, no.1: 1-14. http://doi.org/10.4018/IJMDWTFE.311433
[24] Chanthati, Sasibhushan Roa. (2021). A segmented approach to encouragement of entrepreneurship using data science. World Journal of Advanced Engineering Technology and Science. https://doi.org/10.30574/wjaets.2024.12.2.0330.
[25] Naga Ramesh Palakurti, 2022. "AI Applications in Food Safety and Quality Control" ESP Journal of Engineering & Technology Advancements 2(3): 48-61.
[26] Ayyalasomayajula, Madan Mohan Tito, Srikrishna Ayyalasomayajula, and Sailaja Ayyalasomayajula. "Efficient Dental X-Ray Bone Loss Classification: Ensemble Learning With Fine-Tuned VIT-G/14 And Coatnet-7 For Detecting Localized Vs. Generalized Depleted Alveolar Bone." Educational Administration: Theory and Practice 28.02 (2022).
[27] Bhat, V. Gojanur, and R. Hegde. 2015. 4G protocol and architecture for BYOD over Cloud Computing. In Communications and Signal Processing (ICCSP), 2015 International Conference on. 0308-0313. Google Scholar.
[28] Aparna Bhat, Rajeshwari Hegde, “Comprehensive Study of Renewable Energy Resources and Present Scenario in India,” 2015 IEEE International Conference on Engineering and Technology (ICETECH), Coimbatore, TN, India, 2015.
[29] Piyush Ranjan, 2022.”Fundamentals Of Digital Transformation In Financial Services: Key Drivers and Strategies”, International Journal of Core Engineering & Management, Volume 7, Issue 3, PP 41-50, [Link]

Keywords:

Cloud Computing, k-anonymity, Privacy Preservation, Security, Swarm Intelligence.