Loading…
An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud
Cloud file access is the most widely used peer-to-peer (P2P) application, in which users share their data and other users can access it via P2P networks. The need for security in the cloud system grows day by day, as organizations collect a massive amount of users' confidential information. Bot...
Saved in:
Published in: | Peer-to-peer networking and applications 2022-07, Vol.15 (4), p.2007-2020 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c319t-c9c0404174fdc23224159c79524ace24a81df46e0d06f330d381d7784effadcd3 |
---|---|
cites | cdi_FETCH-LOGICAL-c319t-c9c0404174fdc23224159c79524ace24a81df46e0d06f330d381d7784effadcd3 |
container_end_page | 2020 |
container_issue | 4 |
container_start_page | 2007 |
container_title | Peer-to-peer networking and applications |
container_volume | 15 |
creator | Anand, K. Vijayaraj, A. Vijay Anand, M. |
description | Cloud file access is the most widely used peer-to-peer (P2P) application, in which users share their data and other users can access it via P2P networks. The need for security in the cloud system grows day by day, as organizations collect a massive amount of users' confidential information. Both the outsourced data and the unprotected user's sensitive data need to be protected under the cloud security claims since the advanced P2P networks are prone to damage. The recurring security breach in the cloud necessitates the establishment of an advanced legal data protection strategy. Various researchers have attempted to develop privacy-preserving cloud computing systems employing Artificial Intelligence (AI) techniques, however, they have not been successful in achieving optimal privacy. AI approaches implemented in the cloud assist applications in efficient data management by analyzing, updating, classifying, and providing users with real-time decision-making support. AI approaches can also detect fraudulent activity by analyzing deviations in normal data patterns entering the system. To handle the security concerns in the cloud, this paper presents a novel cybersecurity architecture using the Chaotic chemotaxis and Gaussian mutation-based Bacterial Foraging Optimization with a genetic crossover operation (CGBFO-GC) algorithm. The CGBF0-GC algorithm cleanses and restores the data using a multiobjective optimal key generation mechanism based on the following constraints: data preservation, modification, and hiding ratio. The simulation results show that the proposed methodology outperforms existing methods in terms of convergence, key sensitivity analysis, and resistance to known and chosen-plaintext attacks. |
doi_str_mv | 10.1007/s12083-022-01322-7 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2683503018</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2683503018</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-c9c0404174fdc23224159c79524ace24a81df46e0d06f330d381d7784effadcd3</originalsourceid><addsrcrecordid>eNp9UMlOwzAQjRBIlMIPcLLEOTBesh2rik2qxAXOlvGSukqcYDuVytfjUAQ3LjOjmffezLwsu8ZwiwGqu4AJ1DQHQnLANMXqJFvghpZ5yQo4_a0ZOc8uQtgBlJgWZJH1K4e02wontULvQkbtreiQGbxorWvRMEbb208R7eCQ6NrB27jt5zkKWk5eIyWiQCHOBI2EU2j0di_kIR-9DtrvZxXrkOyGSV1mZ0Z0QV_95GX29nD_un7KNy-Pz-vVJpcUNzGXjQQGDFfMKEnSOwwXjayagjAhdQo1VoaVGhSUhlJQNDWqqmbaGKGkosvs5qg7-uFj0iHy3TB5l1ZyUta0AAq4TihyREk_hOC14en0XvgDx8BnW_nRVp5s5d-28iqR6JEUEti12v9J_8P6AoyQfDM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2683503018</pqid></control><display><type>article</type><title>An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud</title><source>Springer Nature</source><creator>Anand, K. ; Vijayaraj, A. ; Vijay Anand, M.</creator><creatorcontrib>Anand, K. ; Vijayaraj, A. ; Vijay Anand, M.</creatorcontrib><description>Cloud file access is the most widely used peer-to-peer (P2P) application, in which users share their data and other users can access it via P2P networks. The need for security in the cloud system grows day by day, as organizations collect a massive amount of users' confidential information. Both the outsourced data and the unprotected user's sensitive data need to be protected under the cloud security claims since the advanced P2P networks are prone to damage. The recurring security breach in the cloud necessitates the establishment of an advanced legal data protection strategy. Various researchers have attempted to develop privacy-preserving cloud computing systems employing Artificial Intelligence (AI) techniques, however, they have not been successful in achieving optimal privacy. AI approaches implemented in the cloud assist applications in efficient data management by analyzing, updating, classifying, and providing users with real-time decision-making support. AI approaches can also detect fraudulent activity by analyzing deviations in normal data patterns entering the system. To handle the security concerns in the cloud, this paper presents a novel cybersecurity architecture using the Chaotic chemotaxis and Gaussian mutation-based Bacterial Foraging Optimization with a genetic crossover operation (CGBFO-GC) algorithm. The CGBF0-GC algorithm cleanses and restores the data using a multiobjective optimal key generation mechanism based on the following constraints: data preservation, modification, and hiding ratio. The simulation results show that the proposed methodology outperforms existing methods in terms of convergence, key sensitivity analysis, and resistance to known and chosen-plaintext attacks.</description><identifier>ISSN: 1936-6442</identifier><identifier>EISSN: 1936-6450</identifier><identifier>DOI: 10.1007/s12083-022-01322-7</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Artificial intelligence ; Cloud computing ; Communications Engineering ; Computer Communication Networks ; Cybersecurity ; Data management ; Data storage ; Decision analysis ; Decision making ; Engineering ; Information Systems and Communication Service ; Mutation ; Networks ; Optimization ; Peer to peer computing ; Privacy ; Sensitivity analysis ; Signal,Image and Speech Processing</subject><ispartof>Peer-to-peer networking and applications, 2022-07, Vol.15 (4), p.2007-2020</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-c9c0404174fdc23224159c79524ace24a81df46e0d06f330d381d7784effadcd3</citedby><cites>FETCH-LOGICAL-c319t-c9c0404174fdc23224159c79524ace24a81df46e0d06f330d381d7784effadcd3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Anand, K.</creatorcontrib><creatorcontrib>Vijayaraj, A.</creatorcontrib><creatorcontrib>Vijay Anand, M.</creatorcontrib><title>An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud</title><title>Peer-to-peer networking and applications</title><addtitle>Peer-to-Peer Netw. Appl</addtitle><description>Cloud file access is the most widely used peer-to-peer (P2P) application, in which users share their data and other users can access it via P2P networks. The need for security in the cloud system grows day by day, as organizations collect a massive amount of users' confidential information. Both the outsourced data and the unprotected user's sensitive data need to be protected under the cloud security claims since the advanced P2P networks are prone to damage. The recurring security breach in the cloud necessitates the establishment of an advanced legal data protection strategy. Various researchers have attempted to develop privacy-preserving cloud computing systems employing Artificial Intelligence (AI) techniques, however, they have not been successful in achieving optimal privacy. AI approaches implemented in the cloud assist applications in efficient data management by analyzing, updating, classifying, and providing users with real-time decision-making support. AI approaches can also detect fraudulent activity by analyzing deviations in normal data patterns entering the system. To handle the security concerns in the cloud, this paper presents a novel cybersecurity architecture using the Chaotic chemotaxis and Gaussian mutation-based Bacterial Foraging Optimization with a genetic crossover operation (CGBFO-GC) algorithm. The CGBF0-GC algorithm cleanses and restores the data using a multiobjective optimal key generation mechanism based on the following constraints: data preservation, modification, and hiding ratio. The simulation results show that the proposed methodology outperforms existing methods in terms of convergence, key sensitivity analysis, and resistance to known and chosen-plaintext attacks.</description><subject>Algorithms</subject><subject>Artificial intelligence</subject><subject>Cloud computing</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Cybersecurity</subject><subject>Data management</subject><subject>Data storage</subject><subject>Decision analysis</subject><subject>Decision making</subject><subject>Engineering</subject><subject>Information Systems and Communication Service</subject><subject>Mutation</subject><subject>Networks</subject><subject>Optimization</subject><subject>Peer to peer computing</subject><subject>Privacy</subject><subject>Sensitivity analysis</subject><subject>Signal,Image and Speech Processing</subject><issn>1936-6442</issn><issn>1936-6450</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp9UMlOwzAQjRBIlMIPcLLEOTBesh2rik2qxAXOlvGSukqcYDuVytfjUAQ3LjOjmffezLwsu8ZwiwGqu4AJ1DQHQnLANMXqJFvghpZ5yQo4_a0ZOc8uQtgBlJgWZJH1K4e02wontULvQkbtreiQGbxorWvRMEbb208R7eCQ6NrB27jt5zkKWk5eIyWiQCHOBI2EU2j0di_kIR-9DtrvZxXrkOyGSV1mZ0Z0QV_95GX29nD_un7KNy-Pz-vVJpcUNzGXjQQGDFfMKEnSOwwXjayagjAhdQo1VoaVGhSUhlJQNDWqqmbaGKGkosvs5qg7-uFj0iHy3TB5l1ZyUta0AAq4TihyREk_hOC14en0XvgDx8BnW_nRVp5s5d-28iqR6JEUEti12v9J_8P6AoyQfDM</recordid><startdate>20220701</startdate><enddate>20220701</enddate><creator>Anand, K.</creator><creator>Vijayaraj, A.</creator><creator>Vijay Anand, M.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>88I</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M2O</scope><scope>M2P</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20220701</creationdate><title>An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud</title><author>Anand, K. ; Vijayaraj, A. ; Vijay Anand, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-c9c0404174fdc23224159c79524ace24a81df46e0d06f330d381d7784effadcd3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Artificial intelligence</topic><topic>Cloud computing</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Cybersecurity</topic><topic>Data management</topic><topic>Data storage</topic><topic>Decision analysis</topic><topic>Decision making</topic><topic>Engineering</topic><topic>Information Systems and Communication Service</topic><topic>Mutation</topic><topic>Networks</topic><topic>Optimization</topic><topic>Peer to peer computing</topic><topic>Privacy</topic><topic>Sensitivity analysis</topic><topic>Signal,Image and Speech Processing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Anand, K.</creatorcontrib><creatorcontrib>Vijayaraj, A.</creatorcontrib><creatorcontrib>Vijay Anand, M.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Science Database (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer science database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>ProQuest research library</collection><collection>Science Database</collection><collection>Research Library (Corporate)</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Peer-to-peer networking and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Anand, K.</au><au>Vijayaraj, A.</au><au>Vijay Anand, M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud</atitle><jtitle>Peer-to-peer networking and applications</jtitle><stitle>Peer-to-Peer Netw. Appl</stitle><date>2022-07-01</date><risdate>2022</risdate><volume>15</volume><issue>4</issue><spage>2007</spage><epage>2020</epage><pages>2007-2020</pages><issn>1936-6442</issn><eissn>1936-6450</eissn><abstract>Cloud file access is the most widely used peer-to-peer (P2P) application, in which users share their data and other users can access it via P2P networks. The need for security in the cloud system grows day by day, as organizations collect a massive amount of users' confidential information. Both the outsourced data and the unprotected user's sensitive data need to be protected under the cloud security claims since the advanced P2P networks are prone to damage. The recurring security breach in the cloud necessitates the establishment of an advanced legal data protection strategy. Various researchers have attempted to develop privacy-preserving cloud computing systems employing Artificial Intelligence (AI) techniques, however, they have not been successful in achieving optimal privacy. AI approaches implemented in the cloud assist applications in efficient data management by analyzing, updating, classifying, and providing users with real-time decision-making support. AI approaches can also detect fraudulent activity by analyzing deviations in normal data patterns entering the system. To handle the security concerns in the cloud, this paper presents a novel cybersecurity architecture using the Chaotic chemotaxis and Gaussian mutation-based Bacterial Foraging Optimization with a genetic crossover operation (CGBFO-GC) algorithm. The CGBF0-GC algorithm cleanses and restores the data using a multiobjective optimal key generation mechanism based on the following constraints: data preservation, modification, and hiding ratio. The simulation results show that the proposed methodology outperforms existing methods in terms of convergence, key sensitivity analysis, and resistance to known and chosen-plaintext attacks.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s12083-022-01322-7</doi><tpages>14</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1936-6442 |
ispartof | Peer-to-peer networking and applications, 2022-07, Vol.15 (4), p.2007-2020 |
issn | 1936-6442 1936-6450 |
language | eng |
recordid | cdi_proquest_journals_2683503018 |
source | Springer Nature |
subjects | Algorithms Artificial intelligence Cloud computing Communications Engineering Computer Communication Networks Cybersecurity Data management Data storage Decision analysis Decision making Engineering Information Systems and Communication Service Mutation Networks Optimization Peer to peer computing Privacy Sensitivity analysis Signal,Image and Speech Processing |
title | An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T15%3A41%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20enhanced%20bacterial%20foraging%20optimization%20algorithm%20for%20secure%20data%20storage%20and%20privacy-preserving%20in%20cloud&rft.jtitle=Peer-to-peer%20networking%20and%20applications&rft.au=Anand,%20K.&rft.date=2022-07-01&rft.volume=15&rft.issue=4&rft.spage=2007&rft.epage=2020&rft.pages=2007-2020&rft.issn=1936-6442&rft.eissn=1936-6450&rft_id=info:doi/10.1007/s12083-022-01322-7&rft_dat=%3Cproquest_cross%3E2683503018%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c319t-c9c0404174fdc23224159c79524ace24a81df46e0d06f330d381d7784effadcd3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2683503018&rft_id=info:pmid/&rfr_iscdi=true |