An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud

Cloud file access is the most widely used peer-to-peer (P2P) application, in which users share their data and other users can access it via P2P networks. The need for security in the cloud system grows day by day, as organizations collect a massive amount of users' confidential information. Bot...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Peer-to-peer networking and applications 2022-07, Vol.15 (4), p.2007-2020
Hauptverfasser: Anand, K., Vijayaraj, A., Vijay Anand, M.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2020
container_issue 4
container_start_page 2007
container_title Peer-to-peer networking and applications
container_volume 15
creator Anand, K.
Vijayaraj, A.
Vijay Anand, M.
description Cloud file access is the most widely used peer-to-peer (P2P) application, in which users share their data and other users can access it via P2P networks. The need for security in the cloud system grows day by day, as organizations collect a massive amount of users' confidential information. Both the outsourced data and the unprotected user's sensitive data need to be protected under the cloud security claims since the advanced P2P networks are prone to damage. The recurring security breach in the cloud necessitates the establishment of an advanced legal data protection strategy. Various researchers have attempted to develop privacy-preserving cloud computing systems employing Artificial Intelligence (AI) techniques, however, they have not been successful in achieving optimal privacy. AI approaches implemented in the cloud assist applications in efficient data management by analyzing, updating, classifying, and providing users with real-time decision-making support. AI approaches can also detect fraudulent activity by analyzing deviations in normal data patterns entering the system. To handle the security concerns in the cloud, this paper presents a novel cybersecurity architecture using the Chaotic chemotaxis and Gaussian mutation-based Bacterial Foraging Optimization with a genetic crossover operation (CGBFO-GC) algorithm. The CGBF0-GC algorithm cleanses and restores the data using a multiobjective optimal key generation mechanism based on the following constraints: data preservation, modification, and hiding ratio. The simulation results show that the proposed methodology outperforms existing methods in terms of convergence, key sensitivity analysis, and resistance to known and chosen-plaintext attacks.
doi_str_mv 10.1007/s12083-022-01322-7
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2683503018</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2683503018</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-c9c0404174fdc23224159c79524ace24a81df46e0d06f330d381d7784effadcd3</originalsourceid><addsrcrecordid>eNp9UMlOwzAQjRBIlMIPcLLEOTBesh2rik2qxAXOlvGSukqcYDuVytfjUAQ3LjOjmffezLwsu8ZwiwGqu4AJ1DQHQnLANMXqJFvghpZ5yQo4_a0ZOc8uQtgBlJgWZJH1K4e02wontULvQkbtreiQGbxorWvRMEbb208R7eCQ6NrB27jt5zkKWk5eIyWiQCHOBI2EU2j0di_kIR-9DtrvZxXrkOyGSV1mZ0Z0QV_95GX29nD_un7KNy-Pz-vVJpcUNzGXjQQGDFfMKEnSOwwXjayagjAhdQo1VoaVGhSUhlJQNDWqqmbaGKGkosvs5qg7-uFj0iHy3TB5l1ZyUta0AAq4TihyREk_hOC14en0XvgDx8BnW_nRVp5s5d-28iqR6JEUEti12v9J_8P6AoyQfDM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2683503018</pqid></control><display><type>article</type><title>An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud</title><source>Springer journals</source><creator>Anand, K. ; Vijayaraj, A. ; Vijay Anand, M.</creator><creatorcontrib>Anand, K. ; Vijayaraj, A. ; Vijay Anand, M.</creatorcontrib><description>Cloud file access is the most widely used peer-to-peer (P2P) application, in which users share their data and other users can access it via P2P networks. The need for security in the cloud system grows day by day, as organizations collect a massive amount of users' confidential information. Both the outsourced data and the unprotected user's sensitive data need to be protected under the cloud security claims since the advanced P2P networks are prone to damage. The recurring security breach in the cloud necessitates the establishment of an advanced legal data protection strategy. Various researchers have attempted to develop privacy-preserving cloud computing systems employing Artificial Intelligence (AI) techniques, however, they have not been successful in achieving optimal privacy. AI approaches implemented in the cloud assist applications in efficient data management by analyzing, updating, classifying, and providing users with real-time decision-making support. AI approaches can also detect fraudulent activity by analyzing deviations in normal data patterns entering the system. To handle the security concerns in the cloud, this paper presents a novel cybersecurity architecture using the Chaotic chemotaxis and Gaussian mutation-based Bacterial Foraging Optimization with a genetic crossover operation (CGBFO-GC) algorithm. The CGBF0-GC algorithm cleanses and restores the data using a multiobjective optimal key generation mechanism based on the following constraints: data preservation, modification, and hiding ratio. The simulation results show that the proposed methodology outperforms existing methods in terms of convergence, key sensitivity analysis, and resistance to known and chosen-plaintext attacks.</description><identifier>ISSN: 1936-6442</identifier><identifier>EISSN: 1936-6450</identifier><identifier>DOI: 10.1007/s12083-022-01322-7</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Artificial intelligence ; Cloud computing ; Communications Engineering ; Computer Communication Networks ; Cybersecurity ; Data management ; Data storage ; Decision analysis ; Decision making ; Engineering ; Information Systems and Communication Service ; Mutation ; Networks ; Optimization ; Peer to peer computing ; Privacy ; Sensitivity analysis ; Signal,Image and Speech Processing</subject><ispartof>Peer-to-peer networking and applications, 2022-07, Vol.15 (4), p.2007-2020</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-c9c0404174fdc23224159c79524ace24a81df46e0d06f330d381d7784effadcd3</citedby><cites>FETCH-LOGICAL-c319t-c9c0404174fdc23224159c79524ace24a81df46e0d06f330d381d7784effadcd3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12083-022-01322-7$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s12083-022-01322-7$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>315,781,785,27926,27927,41490,42559,51321</link.rule.ids></links><search><creatorcontrib>Anand, K.</creatorcontrib><creatorcontrib>Vijayaraj, A.</creatorcontrib><creatorcontrib>Vijay Anand, M.</creatorcontrib><title>An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud</title><title>Peer-to-peer networking and applications</title><addtitle>Peer-to-Peer Netw. Appl</addtitle><description>Cloud file access is the most widely used peer-to-peer (P2P) application, in which users share their data and other users can access it via P2P networks. The need for security in the cloud system grows day by day, as organizations collect a massive amount of users' confidential information. Both the outsourced data and the unprotected user's sensitive data need to be protected under the cloud security claims since the advanced P2P networks are prone to damage. The recurring security breach in the cloud necessitates the establishment of an advanced legal data protection strategy. Various researchers have attempted to develop privacy-preserving cloud computing systems employing Artificial Intelligence (AI) techniques, however, they have not been successful in achieving optimal privacy. AI approaches implemented in the cloud assist applications in efficient data management by analyzing, updating, classifying, and providing users with real-time decision-making support. AI approaches can also detect fraudulent activity by analyzing deviations in normal data patterns entering the system. To handle the security concerns in the cloud, this paper presents a novel cybersecurity architecture using the Chaotic chemotaxis and Gaussian mutation-based Bacterial Foraging Optimization with a genetic crossover operation (CGBFO-GC) algorithm. The CGBF0-GC algorithm cleanses and restores the data using a multiobjective optimal key generation mechanism based on the following constraints: data preservation, modification, and hiding ratio. The simulation results show that the proposed methodology outperforms existing methods in terms of convergence, key sensitivity analysis, and resistance to known and chosen-plaintext attacks.</description><subject>Algorithms</subject><subject>Artificial intelligence</subject><subject>Cloud computing</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Cybersecurity</subject><subject>Data management</subject><subject>Data storage</subject><subject>Decision analysis</subject><subject>Decision making</subject><subject>Engineering</subject><subject>Information Systems and Communication Service</subject><subject>Mutation</subject><subject>Networks</subject><subject>Optimization</subject><subject>Peer to peer computing</subject><subject>Privacy</subject><subject>Sensitivity analysis</subject><subject>Signal,Image and Speech Processing</subject><issn>1936-6442</issn><issn>1936-6450</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9UMlOwzAQjRBIlMIPcLLEOTBesh2rik2qxAXOlvGSukqcYDuVytfjUAQ3LjOjmffezLwsu8ZwiwGqu4AJ1DQHQnLANMXqJFvghpZ5yQo4_a0ZOc8uQtgBlJgWZJH1K4e02wontULvQkbtreiQGbxorWvRMEbb208R7eCQ6NrB27jt5zkKWk5eIyWiQCHOBI2EU2j0di_kIR-9DtrvZxXrkOyGSV1mZ0Z0QV_95GX29nD_un7KNy-Pz-vVJpcUNzGXjQQGDFfMKEnSOwwXjayagjAhdQo1VoaVGhSUhlJQNDWqqmbaGKGkosvs5qg7-uFj0iHy3TB5l1ZyUta0AAq4TihyREk_hOC14en0XvgDx8BnW_nRVp5s5d-28iqR6JEUEti12v9J_8P6AoyQfDM</recordid><startdate>20220701</startdate><enddate>20220701</enddate><creator>Anand, K.</creator><creator>Vijayaraj, A.</creator><creator>Vijay Anand, M.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>88I</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M2O</scope><scope>M2P</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20220701</creationdate><title>An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud</title><author>Anand, K. ; Vijayaraj, A. ; Vijay Anand, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-c9c0404174fdc23224159c79524ace24a81df46e0d06f330d381d7784effadcd3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Artificial intelligence</topic><topic>Cloud computing</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Cybersecurity</topic><topic>Data management</topic><topic>Data storage</topic><topic>Decision analysis</topic><topic>Decision making</topic><topic>Engineering</topic><topic>Information Systems and Communication Service</topic><topic>Mutation</topic><topic>Networks</topic><topic>Optimization</topic><topic>Peer to peer computing</topic><topic>Privacy</topic><topic>Sensitivity analysis</topic><topic>Signal,Image and Speech Processing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Anand, K.</creatorcontrib><creatorcontrib>Vijayaraj, A.</creatorcontrib><creatorcontrib>Vijay Anand, M.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Science Database (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer science database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>ProQuest research library</collection><collection>ProQuest Science Journals</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Peer-to-peer networking and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Anand, K.</au><au>Vijayaraj, A.</au><au>Vijay Anand, M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud</atitle><jtitle>Peer-to-peer networking and applications</jtitle><stitle>Peer-to-Peer Netw. Appl</stitle><date>2022-07-01</date><risdate>2022</risdate><volume>15</volume><issue>4</issue><spage>2007</spage><epage>2020</epage><pages>2007-2020</pages><issn>1936-6442</issn><eissn>1936-6450</eissn><abstract>Cloud file access is the most widely used peer-to-peer (P2P) application, in which users share their data and other users can access it via P2P networks. The need for security in the cloud system grows day by day, as organizations collect a massive amount of users' confidential information. Both the outsourced data and the unprotected user's sensitive data need to be protected under the cloud security claims since the advanced P2P networks are prone to damage. The recurring security breach in the cloud necessitates the establishment of an advanced legal data protection strategy. Various researchers have attempted to develop privacy-preserving cloud computing systems employing Artificial Intelligence (AI) techniques, however, they have not been successful in achieving optimal privacy. AI approaches implemented in the cloud assist applications in efficient data management by analyzing, updating, classifying, and providing users with real-time decision-making support. AI approaches can also detect fraudulent activity by analyzing deviations in normal data patterns entering the system. To handle the security concerns in the cloud, this paper presents a novel cybersecurity architecture using the Chaotic chemotaxis and Gaussian mutation-based Bacterial Foraging Optimization with a genetic crossover operation (CGBFO-GC) algorithm. The CGBF0-GC algorithm cleanses and restores the data using a multiobjective optimal key generation mechanism based on the following constraints: data preservation, modification, and hiding ratio. The simulation results show that the proposed methodology outperforms existing methods in terms of convergence, key sensitivity analysis, and resistance to known and chosen-plaintext attacks.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s12083-022-01322-7</doi><tpages>14</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1936-6442
ispartof Peer-to-peer networking and applications, 2022-07, Vol.15 (4), p.2007-2020
issn 1936-6442
1936-6450
language eng
recordid cdi_proquest_journals_2683503018
source Springer journals
subjects Algorithms
Artificial intelligence
Cloud computing
Communications Engineering
Computer Communication Networks
Cybersecurity
Data management
Data storage
Decision analysis
Decision making
Engineering
Information Systems and Communication Service
Mutation
Networks
Optimization
Peer to peer computing
Privacy
Sensitivity analysis
Signal,Image and Speech Processing
title An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-17T18%3A29%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20enhanced%20bacterial%20foraging%20optimization%20algorithm%20for%20secure%20data%20storage%20and%20privacy-preserving%20in%20cloud&rft.jtitle=Peer-to-peer%20networking%20and%20applications&rft.au=Anand,%20K.&rft.date=2022-07-01&rft.volume=15&rft.issue=4&rft.spage=2007&rft.epage=2020&rft.pages=2007-2020&rft.issn=1936-6442&rft.eissn=1936-6450&rft_id=info:doi/10.1007/s12083-022-01322-7&rft_dat=%3Cproquest_cross%3E2683503018%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2683503018&rft_id=info:pmid/&rfr_iscdi=true