Discrete Particle Swarm Optimization based Data Encryption and Distribution to Mass Cloud Storage system

Authors

  • Sasidhar Attuluri Data Protection Officer, Savin Technologies Inc., Suite # 2070, 9901 East Valley Ranch Parkway, Irving, TX 75063
  • Mona Ramesh Research Scholar, School of Computer Science and Technology, Karunya Institute of Technology and Sciences, Karunya Nagar, Coimbatore, India - 641114

Keywords:

Data encryption, parallel distribution of data, Discrete Particle Swarm Optimization, cloud storage

Abstract

During the last several decades, the amount of data created and the number of digital records that exist has grown exponentially due to the widespread use of data-driven applications and unified systems. The need for fast and effective data storage and retrieval is becoming more important as the data volumes handled applications continue to expand exponentially. One of the most effective ways to deal with ever-increasing data loads is to make advantage of cloud storage. Yet, maintaining data privacy while storing information outside on the cloud is a significant difficulty when using this strategy. When it comes to large data, where safeguarding data in a fast and correct way is a hard effort, data confidentiality is one of the main issues connected with cloud storage, which has contributed heavily as an impediment for cloud computing adoption throughout the globe. Our research intends to aid in the fight against cybercrime by ensuring the privacy of crucial agricultural data. We provide an architecture for protecting privacy while sharing data over the cloud, one that can scale with your data in both time and space. Combining the Particle Swarm Optimization (PSO) algorithm with parallel data dissemination and selective encryption to protect user privacy is fundamental to our architecture. Experiments and analysis of competing frameworks show that our suggested one is superior in terms of execution time and memory footprint.

Downloads

Download data is not yet available.

References

Walker, SH; Duncan, DB (1967). "Estimation of the probability of an event as a function of several independent variables". Biometrika. 54 (1/2): 167–178

Y. Li, K. Gai, L. Qiu, M. Qiu, H. Zhao, Intelligent cryptography approach for secure distributed big data storage in cloud computing, Inform. Sci. 387 (2017) 103–115

N. Cao, C. Wang, M. Li, K. Ren, W. Lou, Privacy-preserving multi-keyword ranked search over encrypted cloud data, IEEE Trans. Parallel Distrib. Syst. 25 (1) (2013) 222–233.

Y. Li, K. Gai, L. Qiu, M. Qiu, H. Zhao, Intelligent cryptography approach for secure distributed big data storage in cloud computing, Inform. Sci. 387 (2017) 103–115.

Kamal, Maryam, Shahzad Amin, Faria Ferooz, Mazhar Javed Awan, Mazin Abed Mohammed, Omar Al-Boridi, and Karrar Hameed Abdulkareem. "Privacy-aware genetic algorithm based data security framework for distributed cloud storage." Microprocessors and Microsystems 94 (2022): 104673.

A. Mehmood, I. Natgunanathan, Y. Xiang, G. Hua, S. Guo, Protection of big data privacy, IEEE Access 4 (2016) 1821–1834.

S. Han, K. Han, S. Zhang, A data sharing protocol to minimize security and privacy risks of cloud storage in big data era, IEEE Access 7 (2019) 60290–60298.

S.M. Idrees, M.A. Alam, P. Agarwal, A study of big data and its challenges, Int. J Inform. Technol. 11 (4) (2019) 841–846.

M. Strohbach, J. Daubert, H. Ravkin, M. Lischka, Big data storage. In New horizons for a data-driven economy (pp. 119-141). Springer, Cham.Author 1, A.; Author 2, B. Title of the chapter. Book Title, 2nd ed., Publisher, Publisher Location, Country, 2016, pp. 154–196. Editor 1, A., Editor 2, B., Eds.2007; Volume 3.

S. Wang, Y. Zhang, Y. Zhang, A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems, IEEE Access 6 (2018) 38437–38450

S. Singh, J. Sidhu, Compliance-based multi-dimensional trust evaluation system for determining trustworthiness of cloud service providers, Fut.Gener. Comput. Syst. 67 (2017) 109–132

R. Nachiappan, B. Javadi, R.N. Calheiros, K.M. Matawie, Cloud storage reliability for big data applications: A state of the art survey, J. Netw. Comput. Appl. 97 (2017) 35–47.

G. Baranwal, D.P. Vidyarthi, A framework for selection of best cloud service provider using ranked voting method, in: 2014 IEEE international advance computing conference (IACC), IEEE, 2014, pp. 831–837.

L. Zhang, H. Xiong, Q. Huang, J. Li, K.K.R. Choo, L.I. Jiangtao, Cryptographic solutions for cloud storage: Challenges and research opportunities, IEEE Trans. Serv. Comput. (2019).

R. Fardel, M. Nagel, F. Nüesch, T. Lippert, A. Wokaun, Fabrication of organic lightemitting diode pixels by laser-assisted forward transfer. Appl. Phys. Lett. 91 (6) (2007), 061103.

S. Balasubramaniam, V. Kavitha, A survey on data encryption tecniques in cloud computing, Asian J. Inform. Technol. 13 (9) (2014) 494–505.

P Velmurugadass, S Dhanasekaran, SS Anand, V. Vasudevan, Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm, Mater. Today: Proc. 37 (2021 Jan 1) 2653–2659, https://doi.org/10.1016/j.matpr.2020.08.519.

F. Thabit, A.P.S. Alhomdy, A.H. Al-Ahdal, S. Jagtap, A new lightweight cryptographic algorithm for enhancing data security in cloud computing, in: Global Transitions Proceedings, 2021, https://doi.org/10.1016/j.gltp.2021.01.013.

K. Samriya, N. Kumar, A novel intrusion detection system using hybrid clustering-optimization approach in cloud computing, Mater. Today: Proc. (2020), https://doi.org/10.1016/j.matpr.2020.09.614.

A. Ullah, S.M. Siddiquee, M.A. Hossain, S.K. Ray, An ethereum blockchain-based prototype for data security of regulated electricity market, Inventions 5 (4) (2020) 58.

R. Ngnie Sighom, P. Zhang, L You, Security enhancement for data migration in the cloud, Future Internet 9 (3) (2017) 23.

X. Zhang, C. Liu, S. Poslad, K.K. Chai, A provable semi-outsourcing privacy preserving scheme for data transmission from IoT devices, IEEE Access 7 (2019) 87169–87177.

Q. Xu, C. Tan, Z. Fan, W. Zhu, Y. Xiao, F. Cheng, Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption, IEEE Access 6 (2018) 34051–34074.

J.K. Liu, K. Liang, W. Susilo, J. Liu, Y. Xiang, Two-factor data security protection mechanism for cloud storage system, IEEE Trans. Comput. 65 (6) (2015) 1992–2004.

Thirugnanasambandam, K.; Ramalingam, R.; Mohan, D.; Rashid, M.; Juneja, K.; Alshamrani, S.S. Patron–Prophet Artificial Bee Colony Approach for Solving Numerical Continuous Optimization Problems. Axioms 2022, 11, 523. https://doi.org/10.3390/axioms11100523

Thirugnanasambandam, K., Rajeswari, M., Bhattacharyya, D. et al. Directed Artificial Bee Colony algorithm with revamped search strategy to solve global numerical optimization problems. Autom Softw Eng 29, 13 (2022). https://doi.org/10.1007/s10515-021-00306-w

Raghav RS, Thirugnanasambandam K, Varadarajan V, Vairavasundaram S, Ravi L. Artificial Bee Colony Reinforced Extended Kalman Filter Localization Algorithm in Internet of Things with Big Data Blending Technique for Finding the Accurate Position of Reference Nodes. Big Data. 2021 Nov 5. doi: 10.1089/big.2020.0203. Epub ahead of print. PMID: 34747652

Thirugnanasambandam, K., Raghav, R.S., Anguraj, D.K. et al. Multi-objective Binary Reinforced Cuckoo Search Algorithm for Solving Connected Coverage target based WSN with Critical Targets. Wireless Pers Commun (2021). https://doi.org/10.1007/s11277-021-08824-2

Thirugnansambandam, K., Bhattacharyya, D., Frnda, J., Anguraj, D. K., Nedoma, J. (2021). Augmented Node Placement Model in t-WSN Through Multiobjective Approach. CMC-Computers, Materials & Continua, 69(3), 3629–3644

Thirugnanasambandam, K., Anitha, R., Enireddy, V. et al. Pattern mining technique derived ant colony optimization for document information retrieval. J Ambient Intell Human Comput (2021). tps://doi.org/10.1007/s12652-020-02760-y

Downloads

Published

24.11.2023

How to Cite

Attuluri, S. ., & Ramesh, M. . (2023). Discrete Particle Swarm Optimization based Data Encryption and Distribution to Mass Cloud Storage system. International Journal of Intelligent Systems and Applications in Engineering, 12(5s), 17–25. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3816

Issue

Section

Research Article