Loading…

An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud

Cloud file access is the most widely used peer-to-peer (P2P) application, in which users share their data and other users can access it via P2P networks. The need for security in the cloud system grows day by day, as organizations collect a massive amount of users' confidential information. Bot...

Full description

Saved in:
Bibliographic Details
Published in:Peer-to-peer networking and applications 2022-07, Vol.15 (4), p.2007-2020
Main Authors: Anand, K., Vijayaraj, A., Vijay Anand, M.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c319t-c9c0404174fdc23224159c79524ace24a81df46e0d06f330d381d7784effadcd3
cites cdi_FETCH-LOGICAL-c319t-c9c0404174fdc23224159c79524ace24a81df46e0d06f330d381d7784effadcd3
container_end_page 2020
container_issue 4
container_start_page 2007
container_title Peer-to-peer networking and applications
container_volume 15
creator Anand, K.
Vijayaraj, A.
Vijay Anand, M.
description Cloud file access is the most widely used peer-to-peer (P2P) application, in which users share their data and other users can access it via P2P networks. The need for security in the cloud system grows day by day, as organizations collect a massive amount of users' confidential information. Both the outsourced data and the unprotected user's sensitive data need to be protected under the cloud security claims since the advanced P2P networks are prone to damage. The recurring security breach in the cloud necessitates the establishment of an advanced legal data protection strategy. Various researchers have attempted to develop privacy-preserving cloud computing systems employing Artificial Intelligence (AI) techniques, however, they have not been successful in achieving optimal privacy. AI approaches implemented in the cloud assist applications in efficient data management by analyzing, updating, classifying, and providing users with real-time decision-making support. AI approaches can also detect fraudulent activity by analyzing deviations in normal data patterns entering the system. To handle the security concerns in the cloud, this paper presents a novel cybersecurity architecture using the Chaotic chemotaxis and Gaussian mutation-based Bacterial Foraging Optimization with a genetic crossover operation (CGBFO-GC) algorithm. The CGBF0-GC algorithm cleanses and restores the data using a multiobjective optimal key generation mechanism based on the following constraints: data preservation, modification, and hiding ratio. The simulation results show that the proposed methodology outperforms existing methods in terms of convergence, key sensitivity analysis, and resistance to known and chosen-plaintext attacks.
doi_str_mv 10.1007/s12083-022-01322-7
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2683503018</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2683503018</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-c9c0404174fdc23224159c79524ace24a81df46e0d06f330d381d7784effadcd3</originalsourceid><addsrcrecordid>eNp9UMlOwzAQjRBIlMIPcLLEOTBesh2rik2qxAXOlvGSukqcYDuVytfjUAQ3LjOjmffezLwsu8ZwiwGqu4AJ1DQHQnLANMXqJFvghpZ5yQo4_a0ZOc8uQtgBlJgWZJH1K4e02wontULvQkbtreiQGbxorWvRMEbb208R7eCQ6NrB27jt5zkKWk5eIyWiQCHOBI2EU2j0di_kIR-9DtrvZxXrkOyGSV1mZ0Z0QV_95GX29nD_un7KNy-Pz-vVJpcUNzGXjQQGDFfMKEnSOwwXjayagjAhdQo1VoaVGhSUhlJQNDWqqmbaGKGkosvs5qg7-uFj0iHy3TB5l1ZyUta0AAq4TihyREk_hOC14en0XvgDx8BnW_nRVp5s5d-28iqR6JEUEti12v9J_8P6AoyQfDM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2683503018</pqid></control><display><type>article</type><title>An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud</title><source>Springer Nature</source><creator>Anand, K. ; Vijayaraj, A. ; Vijay Anand, M.</creator><creatorcontrib>Anand, K. ; Vijayaraj, A. ; Vijay Anand, M.</creatorcontrib><description>Cloud file access is the most widely used peer-to-peer (P2P) application, in which users share their data and other users can access it via P2P networks. The need for security in the cloud system grows day by day, as organizations collect a massive amount of users' confidential information. Both the outsourced data and the unprotected user's sensitive data need to be protected under the cloud security claims since the advanced P2P networks are prone to damage. The recurring security breach in the cloud necessitates the establishment of an advanced legal data protection strategy. Various researchers have attempted to develop privacy-preserving cloud computing systems employing Artificial Intelligence (AI) techniques, however, they have not been successful in achieving optimal privacy. AI approaches implemented in the cloud assist applications in efficient data management by analyzing, updating, classifying, and providing users with real-time decision-making support. AI approaches can also detect fraudulent activity by analyzing deviations in normal data patterns entering the system. To handle the security concerns in the cloud, this paper presents a novel cybersecurity architecture using the Chaotic chemotaxis and Gaussian mutation-based Bacterial Foraging Optimization with a genetic crossover operation (CGBFO-GC) algorithm. The CGBF0-GC algorithm cleanses and restores the data using a multiobjective optimal key generation mechanism based on the following constraints: data preservation, modification, and hiding ratio. The simulation results show that the proposed methodology outperforms existing methods in terms of convergence, key sensitivity analysis, and resistance to known and chosen-plaintext attacks.</description><identifier>ISSN: 1936-6442</identifier><identifier>EISSN: 1936-6450</identifier><identifier>DOI: 10.1007/s12083-022-01322-7</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Artificial intelligence ; Cloud computing ; Communications Engineering ; Computer Communication Networks ; Cybersecurity ; Data management ; Data storage ; Decision analysis ; Decision making ; Engineering ; Information Systems and Communication Service ; Mutation ; Networks ; Optimization ; Peer to peer computing ; Privacy ; Sensitivity analysis ; Signal,Image and Speech Processing</subject><ispartof>Peer-to-peer networking and applications, 2022-07, Vol.15 (4), p.2007-2020</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-c9c0404174fdc23224159c79524ace24a81df46e0d06f330d381d7784effadcd3</citedby><cites>FETCH-LOGICAL-c319t-c9c0404174fdc23224159c79524ace24a81df46e0d06f330d381d7784effadcd3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Anand, K.</creatorcontrib><creatorcontrib>Vijayaraj, A.</creatorcontrib><creatorcontrib>Vijay Anand, M.</creatorcontrib><title>An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud</title><title>Peer-to-peer networking and applications</title><addtitle>Peer-to-Peer Netw. Appl</addtitle><description>Cloud file access is the most widely used peer-to-peer (P2P) application, in which users share their data and other users can access it via P2P networks. The need for security in the cloud system grows day by day, as organizations collect a massive amount of users' confidential information. Both the outsourced data and the unprotected user's sensitive data need to be protected under the cloud security claims since the advanced P2P networks are prone to damage. The recurring security breach in the cloud necessitates the establishment of an advanced legal data protection strategy. Various researchers have attempted to develop privacy-preserving cloud computing systems employing Artificial Intelligence (AI) techniques, however, they have not been successful in achieving optimal privacy. AI approaches implemented in the cloud assist applications in efficient data management by analyzing, updating, classifying, and providing users with real-time decision-making support. AI approaches can also detect fraudulent activity by analyzing deviations in normal data patterns entering the system. To handle the security concerns in the cloud, this paper presents a novel cybersecurity architecture using the Chaotic chemotaxis and Gaussian mutation-based Bacterial Foraging Optimization with a genetic crossover operation (CGBFO-GC) algorithm. The CGBF0-GC algorithm cleanses and restores the data using a multiobjective optimal key generation mechanism based on the following constraints: data preservation, modification, and hiding ratio. The simulation results show that the proposed methodology outperforms existing methods in terms of convergence, key sensitivity analysis, and resistance to known and chosen-plaintext attacks.</description><subject>Algorithms</subject><subject>Artificial intelligence</subject><subject>Cloud computing</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Cybersecurity</subject><subject>Data management</subject><subject>Data storage</subject><subject>Decision analysis</subject><subject>Decision making</subject><subject>Engineering</subject><subject>Information Systems and Communication Service</subject><subject>Mutation</subject><subject>Networks</subject><subject>Optimization</subject><subject>Peer to peer computing</subject><subject>Privacy</subject><subject>Sensitivity analysis</subject><subject>Signal,Image and Speech Processing</subject><issn>1936-6442</issn><issn>1936-6450</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp9UMlOwzAQjRBIlMIPcLLEOTBesh2rik2qxAXOlvGSukqcYDuVytfjUAQ3LjOjmffezLwsu8ZwiwGqu4AJ1DQHQnLANMXqJFvghpZ5yQo4_a0ZOc8uQtgBlJgWZJH1K4e02wontULvQkbtreiQGbxorWvRMEbb208R7eCQ6NrB27jt5zkKWk5eIyWiQCHOBI2EU2j0di_kIR-9DtrvZxXrkOyGSV1mZ0Z0QV_95GX29nD_un7KNy-Pz-vVJpcUNzGXjQQGDFfMKEnSOwwXjayagjAhdQo1VoaVGhSUhlJQNDWqqmbaGKGkosvs5qg7-uFj0iHy3TB5l1ZyUta0AAq4TihyREk_hOC14en0XvgDx8BnW_nRVp5s5d-28iqR6JEUEti12v9J_8P6AoyQfDM</recordid><startdate>20220701</startdate><enddate>20220701</enddate><creator>Anand, K.</creator><creator>Vijayaraj, A.</creator><creator>Vijay Anand, M.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>88I</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M2O</scope><scope>M2P</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20220701</creationdate><title>An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud</title><author>Anand, K. ; Vijayaraj, A. ; Vijay Anand, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-c9c0404174fdc23224159c79524ace24a81df46e0d06f330d381d7784effadcd3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Artificial intelligence</topic><topic>Cloud computing</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Cybersecurity</topic><topic>Data management</topic><topic>Data storage</topic><topic>Decision analysis</topic><topic>Decision making</topic><topic>Engineering</topic><topic>Information Systems and Communication Service</topic><topic>Mutation</topic><topic>Networks</topic><topic>Optimization</topic><topic>Peer to peer computing</topic><topic>Privacy</topic><topic>Sensitivity analysis</topic><topic>Signal,Image and Speech Processing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Anand, K.</creatorcontrib><creatorcontrib>Vijayaraj, A.</creatorcontrib><creatorcontrib>Vijay Anand, M.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Science Database (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer science database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>ProQuest research library</collection><collection>Science Database</collection><collection>Research Library (Corporate)</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Peer-to-peer networking and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Anand, K.</au><au>Vijayaraj, A.</au><au>Vijay Anand, M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud</atitle><jtitle>Peer-to-peer networking and applications</jtitle><stitle>Peer-to-Peer Netw. Appl</stitle><date>2022-07-01</date><risdate>2022</risdate><volume>15</volume><issue>4</issue><spage>2007</spage><epage>2020</epage><pages>2007-2020</pages><issn>1936-6442</issn><eissn>1936-6450</eissn><abstract>Cloud file access is the most widely used peer-to-peer (P2P) application, in which users share their data and other users can access it via P2P networks. The need for security in the cloud system grows day by day, as organizations collect a massive amount of users' confidential information. Both the outsourced data and the unprotected user's sensitive data need to be protected under the cloud security claims since the advanced P2P networks are prone to damage. The recurring security breach in the cloud necessitates the establishment of an advanced legal data protection strategy. Various researchers have attempted to develop privacy-preserving cloud computing systems employing Artificial Intelligence (AI) techniques, however, they have not been successful in achieving optimal privacy. AI approaches implemented in the cloud assist applications in efficient data management by analyzing, updating, classifying, and providing users with real-time decision-making support. AI approaches can also detect fraudulent activity by analyzing deviations in normal data patterns entering the system. To handle the security concerns in the cloud, this paper presents a novel cybersecurity architecture using the Chaotic chemotaxis and Gaussian mutation-based Bacterial Foraging Optimization with a genetic crossover operation (CGBFO-GC) algorithm. The CGBF0-GC algorithm cleanses and restores the data using a multiobjective optimal key generation mechanism based on the following constraints: data preservation, modification, and hiding ratio. The simulation results show that the proposed methodology outperforms existing methods in terms of convergence, key sensitivity analysis, and resistance to known and chosen-plaintext attacks.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s12083-022-01322-7</doi><tpages>14</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1936-6442
ispartof Peer-to-peer networking and applications, 2022-07, Vol.15 (4), p.2007-2020
issn 1936-6442
1936-6450
language eng
recordid cdi_proquest_journals_2683503018
source Springer Nature
subjects Algorithms
Artificial intelligence
Cloud computing
Communications Engineering
Computer Communication Networks
Cybersecurity
Data management
Data storage
Decision analysis
Decision making
Engineering
Information Systems and Communication Service
Mutation
Networks
Optimization
Peer to peer computing
Privacy
Sensitivity analysis
Signal,Image and Speech Processing
title An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T15%3A41%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20enhanced%20bacterial%20foraging%20optimization%20algorithm%20for%20secure%20data%20storage%20and%20privacy-preserving%20in%20cloud&rft.jtitle=Peer-to-peer%20networking%20and%20applications&rft.au=Anand,%20K.&rft.date=2022-07-01&rft.volume=15&rft.issue=4&rft.spage=2007&rft.epage=2020&rft.pages=2007-2020&rft.issn=1936-6442&rft.eissn=1936-6450&rft_id=info:doi/10.1007/s12083-022-01322-7&rft_dat=%3Cproquest_cross%3E2683503018%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c319t-c9c0404174fdc23224159c79524ace24a81df46e0d06f330d381d7784effadcd3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2683503018&rft_id=info:pmid/&rfr_iscdi=true