Sharma Smita, Tyagi Sanjay
Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, India.
Network. 2024 Jul 26:1-36. doi: 10.1080/0954898X.2024.2378836.
Numerous studies have been conducted in an attempt to preserve cloud privacy, yet the majority of cutting-edge solutions fall short when it comes to handling sensitive data. This research proposes a "privacy preservation model in the cloud environment". The four stages of recommended security preservation methodology are "identification of sensitive data, generation of an optimal tuned key, suggested data sanitization, and data restoration". Initially, owner's data enters the Sensitive data identification process. The sensitive information in the input (owner's data) is identified via Augmented Dynamic Itemset Counting (ADIC) based Associative Rule Mining Model. Subsequently, the identified sensitive data are sanitized via the newly created tuned key. The generated tuned key is formulated with new fourfold objective-hybrid optimization approach-based deep learning approach. The optimally tuned key is generated with LSTM on the basis of fourfold objectives and the new hybrid MUAOA. The created keys, as well as generated sensitive rules, are fed into the deep learning model. The MUAOA technique is a conceptual blend of standard AOA and CMBO, respectively. As a result, unauthorized people will be unable to access information. Finally, comparative evaluation is undergone and proposed LSTM+MUAOA has achieved higher values on privacy about 5.21 compared to other existing models.
为保护云隐私,人们进行了大量研究,但大多数前沿解决方案在处理敏感数据方面仍存在不足。本研究提出了一种“云环境下的隐私保护模型”。推荐的安全保护方法的四个阶段是“敏感数据识别、最优调谐密钥生成、建议的数据净化和数据恢复”。首先,所有者的数据进入敏感数据识别过程。通过基于增强动态项集计数(ADIC)的关联规则挖掘模型识别输入(所有者的数据)中的敏感信息。随后,通过新创建的调谐密钥对识别出的敏感数据进行净化。生成的调谐密钥采用基于新的四重目标混合优化方法的深度学习方法制定。基于四重目标和新的混合MUAOA,使用长短期记忆网络(LSTM)生成最优调谐密钥。创建的密钥以及生成的敏感规则被输入到深度学习模型中。MUAOA技术分别是标准AOA和CMBO的概念融合。因此,未经授权的人将无法访问信息。最后,进行了比较评估,结果表明,与其他现有模型相比,所提出的LSTM+MUAOA在隐私方面实现了更高的值,约为5.21。