International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Design of Hybrid Metaheuristic Optimization Algorithm for Trust-Aware Privacy Preservation in Cloud Computing

Author NameAuthor Details

Himani Saini, Gopal Singh, Manju Rohil

Himani Saini[1]

Gopal Singh[2]

Manju Rohil[3]

[1]Department of Computer Science and Applications, Maharshi Dayanand University, Rohtak (Haryana), India.

[2]Department of Computer Science and Applications, Maharshi Dayanand University, Rohtak (Haryana), India.

[3]Ch. Devi Lal Government Polytechnic, Nathusari Chopta, Sirsa (Haryana), India.

Abstract

The growing relevance of trust and privacy preservation in cloud computing environments stems from the need to preserve sensitive data, comply with regulations, and maintain user confidence in the face of evolving cyber risks and privacy issues. This study suggests a unique key strength assessment, trust model, and ABC-GOA hybrid optimization technique-based privacy-preserving mechanism. The trust model is essential for determining how trustworthy cloud service providers (CSPs) are. To assess the trustworthiness of CSPs, it considers elements including reputation, regulatory compliance, and user input. The trust model assists users in selecting CSPs for their requirements in data storage and processing by taking these factors into account. The suggested system includes key strength assessment, which uses Shannon entropy to assess the reliability of cryptographic keys, to improve data security. This assessment guarantees that the encryption keys used to safeguard sensitive data are robust enough to fend against assaults and illegal access. Users may be sure that their data is private and safe in the cloud environment by calculating the key strength. The hybrid ABC-GOA optimization approach optimizes the suggested mechanism's privacy and data security and this method combines the benefits of the two algorithms to improve the capabilities for exploration and exploitation. The ABC-GOA algorithm effectively explores the solution space and identifies the best solution, enhancing the privacy-preserving mechanism's overall functionality. To tackle an optimization challenge, our proposed model was compared to current models. The suggested model using the ABC-GOA algorithm has the greatest optimal cost value for privacy preservation, data security, and computational efficiency. This demonstrates the excellence and potency of our suggested technique in resolving the issues presented by data security and privacy in cloud systems.

Index Terms

Cloud Service Provider (CSP)

Trust Model

Artificial Bee Colony (ABC)

Grasshopper Optimization Algorithm (GOA)

Advanced Encryption Standard (AES)

Key Strength

Cloud Computing

Reference

  1. 1.
    K. Solomon Doss and S. Kamalakkannan, “Hybrid optimization-based privacy preservation of database publishing in cloud environment,” Concurr Comput, vol. 34, no. 11, May 2022, doi: 10.1002/cpe.6844.
  2. 2.
    R. T. Moreno, J. Garcia-Rodriguez, J. B. Bernabe, and A. Skarmeta, “A Trusted Approach for Decentralised and Privacy-Preserving Identity Management,” IEEE Access, vol. 9, pp. 105788–105804, 2021, doi: 10.1109/ACCESS.2021.3099837.
  3. 3.
    X. Ma, J. Ma, H. Li, Q. Jiang, and S. Gao, “ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks,” Future Generation Computer Systems, vol. 79, pp. 82–94, Feb. 2018, doi: 10.1016/J.FUTURE.2017.09.060.
  4. 4.
    L. Xu, T. Bao, L. Zhu, and Y. Zhang, “Trust-based privacy-preserving photo sharing in online social networks,” IEEE Trans Multimedia, vol. 21, no. 3, pp. 591–602, Mar. 2019, doi: 10.1109/TMM.2018.2887019.
  5. 5.
    L. Guo, C. Zhang, and Y. Fang, “A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks,” IEEE Trans Dependable Secure Comput, vol. 12, no. 4, pp. 413–427, Jul. 2015, doi: 10.1109/TDSC.2014.2355824.
  6. 6.
    Y. Pu, T. Xiang, C. Hu, A. Alrawais, and H. Yan, “An efficient blockchain-based privacy preserving scheme for vehicular social networks,” Inf Sci (N Y), vol. 540, pp. 308–324, Nov. 2020, doi: 10.1016/J.INS.2020.05.087.
  7. 7.
    Z. Geng, Y. He, C. Wang, G. Xu, K. Xiao, and S. Yu, “A Blockchain based Privacy-Preserving Reputation Scheme for Cloud Service,” IEEE International Conference on Communications, Jun. 2021, doi: 10.1109/ICC42927.2021.9500841.
  8. 8.
    P. Sharma, R. Jindal, and M. D. Borah, “Blockchain-based decentralized architecture for cloud storage system,” Journal of Information Security and Applications, vol. 62, p. 102970, Nov. 2021, doi: 10.1016/J.JISA.2021.102970.
  9. 9.
    H. Cheng, C. Rong, M. Qian, and W. Wang, “Accountable privacy-preserving mechanism for cloud computing based on identity-based encryption,” IEEE Access, vol. 6, pp. 37869–37882, Jun. 2018, doi: 10.1109/ACCESS.2018.2851599.
  10. 10.
    M. Vivekanandan, V. N. Sastry, and U. Srinivasulu Reddy, “Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment,” Peer Peer Netw Appl, vol. 14, no. 3, pp. 1572–1595, May 2021, doi: 10.1007/S12083-020-01065-3/FIGURES/11.
  11. 11.
    H. Al-Balasmeh, M. Singh, and R. Singh, “Framework of data privacy preservation and location obfuscation in vehicular cloud networks,” Concurr Comput, vol. 34, no. 5, p. e6682, Feb. 2022, doi: 10.1002/CPE.6682.
  12. 12.
    M. Kumar et al., “A smart privacy preserving framework for industrial IoT using hybrid meta-heuristic algorithm,” Scientific Reports 2023 13:1, vol. 13, no. 1, pp. 1–17, Apr. 2023, doi: 10.1038/s41598-023-32098-2.
  13. 13.
    A. K. Singh and R. Gupta, “A privacy-preserving model based on differential approach for sensitive data in cloud environment,” Multimed Tools Appl, vol. 81, no. 23, pp. 33127–33150, Sep. 2022, doi: 10.1007/S11042-021-11751-W/TABLES/10.
  14. 14.
    M. Firdaus and K. H. Rhee, “A Joint Framework to Privacy-Preserving Edge Intelligence in Vehicular Networks,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13720 LNCS, pp. 156–167, Aug. 2022, doi: 10.1007/978-3-031-25659-2_12.
  15. 15.
    P. Silva, C. Gonçalves, N. Antunes, M. Curado, and B. Walek, “Privacy risk assessment and privacy-preserving data monitoring,” Expert Syst Appl, vol. 200, p. 116867, Aug. 2022, doi: 10.1016/J.ESWA.2022.116867.
  16. 16.
    J. Kaushal, “Research on Privacy-Preserving Technology for Cloud Computing,” International Journal of Scientific Research & Engineering Trends, vol. 8, pp. 2395–566.
  17. 17.
    J. Yogesh Deshmukh, S. K. Yadav, and G. M. Bhandari, “Attribute-Based encryption mechanism with Privacy-Preserving approach in cloud computing,” Mater Today Proc, vol. 80, pp. 1786–1791, Jan. 2023, doi: 10.1016/J.MATPR.2021.05.609.
  18. 18.
    N. R. Nayak, A. Kumar, S. Ray, and A. K. Tamrakar, “Blockchain-Based Cloud Resource Allocation Mechanism for Privacy Preservation.” EasyChair, Feb. 14, 2023.
  19. 19.
    Y. Xu, M. Xiao, J. Wu, H. Tan, and G. Gao, “A Personalized Privacy Preserving Mechanism for Crowdsourced Federated Learning,” IEEE Trans Mob Comput, pp. 1–17, Jan. 2023, doi: 10.1109/TMC.2023.3237636.
  20. 20.
    M. Zhang, M. Yang, G. Shen, Z. Xia, and Y. Wang, “A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things,” Inf Sci (N Y), vol. 623, pp. 293–310, Apr. 2023, doi: 10.1016/J.INS.2022.11.169.
  21. 21.
    M. A. El-Shorbagy and A. M. El-Refaey, “Hybridization of Grasshopper Optimization Algorithm with Genetic Algorithm for Solving System of Non-Linear Equations,” IEEE Access, vol. 8, pp. 220944–220961, 2020, doi: 10.1109/ACCESS.2020.3043029.
  22. 22.
    A. G. Gad, “Particle Swarm Optimization Algorithm and Its Applications: A Systematic Review,” Archives of Computational Methods in Engineering 2022 29:5, vol. 29, no. 5, pp. 2531–2561, Apr. 2022, doi: 10.1007/S11831-021-09694-4.
  23. 23.
    L. M. R. Rere, M. I. Fanany, and A. M. Arymurthy, “Simulated Annealing Algorithm for Deep Learning,” Procedia Comput Sci, vol. 72, pp. 137–144, Jan. 2015, doi: 10.1016/J.PROCS.2015.12.114.
  24. 24.
    N. Nayar, S. Gautam, P. Singh, and G. Mehta, “Ant Colony Optimization: A Review of Literature and Application in Feature Selection,” Lecture Notes in Networks and Systems, vol. 173 LNNS, pp. 285–297, 2021, doi: 10.1007/978-981-33-4305-4_22/COVER.
  25. 25.
    M. Dubey, V. Kumar, M. Kaur, and T. P. Dao, “A Systematic Review on Harmony Search Algorithm: Theory, Literature, and Applications,” Math Probl Eng, vol. 2021, 2021, doi: 10.1155/2021/5594267.
  26. 26.
    M. F. Ahmad, N. A. M. Isa, W. H. Lim, and K. M. Ang, “Differential evolution: A recent review based on state-of-the-art works,” Alexandria Engineering Journal, vol. 61, no. 5, pp. 3831–3872, May 2022, doi: 10.1016/J.AEJ.2021.09.013.
  27. 27.
    L. Shen, J. Li, Y. Wu, Z. Tang, and Y. Wang, “Optimization of Artificial Bee Colony Algorithm Based Load Balancing in Smart Grid Cloud,” 2019 IEEE PES Innovative Smart Grid Technologies Asia, ISGT 2019, pp. 1131–1134, May 2019, doi: 10.1109/ISGT-ASIA.2019.8881232.
  28. 28.
    S. Saremi, S. Mirjalili, and A. Lewis, “Grasshopper Optimisation Algorithm: Theory and application,” Advances in Engineering Software, vol. 105, pp. 30–47, Mar. 2017, doi: 10.1016/J.ADVENGSOFT.2017.01.004.
  29. 29.
    A. Praveena and B. Bharathi, “An approach to remove duplication records in healthcare dataset based on Mimic Deep Neural Network (MDNN) and Chaotic Whale Optimization (CWO),” Concurr Eng Res Appl, vol. 29, no. 1, pp. 58–67, Mar. 2021, doi: 10.1177/1063293X21992014/ASSET/IMAGES/LARGE/10.1177_1063293X21992014-FIG6.JPEG.
  30. 30.
    A. Ahmad et al., “Toward modeling and optimization of features selection in Big Data based social Internet of Things,” Future Generation Computer Systems, vol. 82, pp. 715–726, May 2018, doi: 10.1016/J.FUTURE.2017.09.028.
  31. 31.
    S. Jiang, J. Cao, H. Wu, K. Chen, and X. Liu, “Privacy-preserving and efficient data sharing for blockchain-based intelligent transportation systems,” Inf Sci (N Y), vol. 635, pp. 72–85, Jul. 2023, doi: 10.1016/J.INS.2023.03.121.
  32. 32.
    Dikshit Pratyush, Sengupta Jayasree, Bajpai Vaibhav, “Recent Trends on Privacy-Preserving Technologies under Standardization at the IETF,” ACM SIGCOMM Computer Communication Review, vol. 53, no. 2, pp. 22–30, Jul. 2023, doi: 10.1145/3610381.3610385.
  33. 33.
    Y. Meraihi, A. B. Gabis, S. Mirjalili, and A. Ramdane-Cherif, “Grasshopper optimization algorithm: Theory, variants, and applications,” IEEE Access, vol. 9, pp. 50001–50024, 2021, doi: 10.1109/ACCESS.2021.3067597.
  34. 34.
    S. Kumar, M. K. Chaube, S. N. Nenavath, S. K. Gupta, and S. K. Tetarave, “Privacy preservation and security challenges: a new frontier multimodal machine learning research,” International Journal of Sensor Networks, vol. 39, no. 4, pp. 227–245, 2022, doi: 10.1504/IJSNET.2022.125113.
SCOPUS
SCImago Journal & Country Rank