Enhancing Cloud Data Privacy with a Scalable Hybrid Approach: HE-DP-SMC

Main Article Content

Jaibir Singh, A.MallaReddy, Vasavi Bande, A.Lakshmanarao, Goda Srinivasa Rao, K.Samunnisa

Abstract

Cloud computing has become a popular way to store and access data. However, there are concerns about the privacy of data stored in the cloud. This paper proposes a novel privacy-preserving mechanism that uses a combination of homomorphic encryption, differential privacy, and secure multi-party computation. The mechanism allows users to store their data in the cloud while still ensuring the privacy of their data. The mechanism combines three cryptographic techniques: homomorphic encryption(HE), differential privacy(DP), and secure multi-party computation(SMC). Homomorphic encryption enables computations on encrypted data, ensuring that confidentiality is maintained throughout the storage process. Differential privacy(DP) techniques add an additional layer of protection by injecting controlled noise into query responses, preserving the privacy of individual data items. Secure multi-party computation protocols ensure that computations involving multiple cloud servers are performed securely without compromising the confidentiality of data. The mechanism is efficient and scalable. It can be used to protect the privacy of data in a wide range of applications, including healthcare, finance, and government. The quantitative results obtained from the performance evaluation of the proposed privacy-preserving mechanism reveal valuable insights into its efficiency and effectiveness. The mechanism shows promising results for small to medium-sized datasets. As the dataset size increases, the execution time, communication overhead, and storage requirements also increase proportionally. However, the mechanism maintains its scalability and efficiency. In comparison with baseline systems, the proposed mechanism outperforms systems without privacy-preserving mechanisms and only exhibits slightly slower performance than systems with traditional encryption. The proposed mechanism is a promising new approach to privacy-preserving cloud computing. It provides a strong level of protection against a variety of attacks, while still being efficient and scalable. It has the potential to revolutionize the way we store and share sensitive data..

Article Details

Section
Articles
Author Biography

Jaibir Singh, A.MallaReddy, Vasavi Bande, A.Lakshmanarao, Goda Srinivasa Rao, K.Samunnisa

1Dr. Jaibir Singh 2Dr.A.MallaReddy 3*Dr.Vasavi Bande 4 A.Lakshmanarao

5Dr. Goda Srinivasa Rao

6K.Samunnisa

 *3 Corresponding author : Associate professor,  Department of IT, MVSR  Engineering College, Nadergul, Hyderabad, Telangana. Email ID. vasavi.bande@gmail.com  

 1Assistant Professor, Department of Computer Science and Engineering, Lovely Professional University, Phagwara(Punjab), India.Email ID: jaibir729@gmail.com   

2Professor, Department of Information Technology, CVR College of Engineering, Hyderabad, Telangana.Email Id: mallareddyadudhodla@gmail.com  

4 Associate Professor, Department of IT, Aditya Engineering  College,Surampaĺem, India, Email ID: laxman1216@gmail.com

5 Associate Professor, Dept of CSE ,KL University ,Guntur , Andhra Pradesh, India. Email Id: gsraob4u@gmail.com  

6 Assistant Professor of CSE  Department, Ashoka womens Engineering College, Kurnool, Andhra Pradesh, India, Email Id: samunnisa14@gmail.com  

Copyright © JES 2023 on-line : journal.esrgroups.org

References

Bandari, V. (2022). Optimizing IT Modernization through Cloud Migration: Strategies for a Secure, Efficient and Cost-Effective Transition. Applied Research in Artificial Intelligence and Cloud Computing, 5(1), 66-83.

Ravikumar, G. ., Begum, Z. ., Kumar, A. S. ., Kiranmai, V., Bhavsingh, M., & Kumar, O. K. . (2022). Cloud Host Selection using Iterative Particle-Swarm Optimization for Dynamic Container Consolidation. International Journal on Recent and Innovation Trends in Computing and Communication, 10(1s), 247–253.

Mishra, A., Jabar, T. S., Alzoubi, Y. I., & Mishra, K. N. (2023). Enhancing privacy‐preserving mechanisms in Cloud storage: A novel conceptual framework. Concurrency and Computation: Practice and Experience, e7831.

N. Meghasree, U.Veeresh, & Dr.S.Prem Kumar. (2015). Multi Cloud Architecture to Provide Data Privacy and Integrity. International Journal of Computer Engineering in Research Trends, 2(9), 558–564.

Lakshmi, M. S. ., Ramana, K. S. ., Pasha, M. J. ., Lakshmi, K. ., Parashuram, N. ., & Bhavsingh, M. . (2022). Minimizing the Localization Error in Wireless Sensor Networks Using Multi-Objective Optimization Techniques. International Journal on Recent and Innovation Trends in Computing and Communication, 10(2s), 306–312.

V.VIDYA, K.PADMA KIRAN, C.VANI, & K.TARAKESWAR. (2014). Two Layer Encryption be Imminent to Protected Data Sharing in Cloud Computing. International Journal of Computer Engineering in Research Trends, 1(5), 266–270.

Shen, J., Yang, H., Vijayakumar, P., & Kumar, N. (2021). A privacy-preserving and untraceable group data sharing scheme in cloud computing. IEEE Transactions on Dependable and Secure Computing, 19(4), 2198-2210.

Guillermo Ramos-Salazar, Sabrina Rahaman, & Md. Amzad. (2023). A Machine Learning-based Approach for Detecting Malicious Activities in Cloud Computing Environments . International Journal of Computer Engineering in Research Trends, 10(9), 22–28.

Liu, H., Ning, H., Xiong, Q., & Yang, L. T. (2014). Shared authority based privacy-preserving authentication protocol in cloud computing. IEEE Transactions on parallel and distributed systems, 26(1), 241-251.

Kamal, M., Amin, S., Ferooz, F., Awan, M. J., Mohammed, M. A., Al-Boridi, O., & Abdulkareem, K. H. (2022). Privacy-aware genetic algorithm based data security framework for distributed cloud storage. Microprocessors and Microsystems, 94, 104673.

Haque, R. U., Hasan, A. T., Daria, A., Rasool, A., Chen, H., Jiang, Q., & Zhang, Y. (2023). A novel secure and distributed architecture for privacy-preserving healthcare system. Journal of Network and Computer Applications, 103696.

K., V. R. ., Yadav G., H. K. ., Basha P., H. ., Sambasivarao, L. V. ., Rao Y. V., 5Balarama K. ., & Bhavsingh , M. . (2023). Secure and Efficient Energy Trading using Homomorphic Encryption on the Green Trade Platform. International Journal of Intelligent Systems and Applications in Engineering, 12(1s), 345–360. Retrieved from

Deshmukh, J. Y., Yadav, S. K., & Bhandari, G. M. (2023). Attribute-Based encryption mechanism with Privacy-Preserving approach in cloud computing. Materials Today: Proceedings, 80, 1786-1791.

Ganapathy, S. (2019). A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications. Computer Networks, 151, 181-190.

B, G. D., K, S. R., & P, V. K. (2023). SMERAS - State Management with Efficient Resource Allocation and Scheduling in Big Data Stream Processing Systems. International Journal of Computer Engineering in Research Trends, 10(4), 150–154.

Nayomi, B. D. D. ., Mallika, S. S. ., T., S. ., G., J. ., Laxmikanth, P. ., & Bhavsingh, M. . (2023). A Cloud-Assisted Framework Utilizing Blockchain, Machine Learning, and Artificial Intelligence to Countermeasure Phishing Attacks in Smart Cities. International Journal of Intelligent Systems and Applications in Engineering, 12(1s), 313–327

Vengala, D. V. K., Kavitha, D., & Kumar, A. S. (2020). Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC. Cluster Computing, 23, 1683-1696.

Hilal Ahmad Shah, Inzimam Ul Hassan, & Inam Ul Haq. (2023). Future of Communication-LIFI (Light Fidelity): A Review. International Journal of Computer Engineering in Research Trends, 10(2), 54–60.

Samunnisa, K., Kumar, G. S. V., & Madhavi, K. (2023). Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods. Measurement: Sensors, 25, 100612.

Samunnisa, K., Vijaya Kumar, G. S., & Madhavi, K. (2021). Cloud Security Solutions through Machine Learning-Approaches: A Survey. Int. J. of Aquatic Science, 12(2), 1958-1972.

Goud, M., & Malya, P. (2015). Dynamic Group data sharing framework on Cloud Servers,Macaw International Journal of Advanced Research in Computer Science and Engineering, 1(1), 16-20.

Abbas, A., & Khan, S. U. (2014). A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE journal of Biomedical and health informatics, 18(4), 1431-1441.

Gholami, A., & Laure, E. (2016). Security and privacy of sensitive data in cloud computing: a survey of recent developments. arXiv preprint arXiv:1601.01498.

Shuroq Jawad Mahdi. (2016). Preventing From Collusion Data Sharing Mechanism for Dynamic Group in the Cloud. Macaw International Journal of Advanced Research in Computer Science and Engineering, 2(7), 113-118.

Barkley, J. (1997, November). Comparing simple role based access control models and access control lists. In Proceedings of the second ACM workshop on Role-based access control (pp. 127-132).

Kumari, K. A., Sadasivam, G. S., & Rohini, L. (2016). An efficient 3d elliptic curve Diffie–Hellman (ECDH) based two-server password-only authenticated key exchange protocol with provable security. IETE Journal of Research, 62(6), 762-773.

Shuroq Jawad Mahdi. (2016). Cloud based IoT for Agriculture in India, Macaw International Journal of Advanced Research in Computer Science and Engineering, 2(12), 5-10.

Phan, N., Wu, X., Hu, H., & Dou, D. (2017, November). Adaptive laplace mechanism: Differential privacy preservation in deep learning. In 2017 IEEE international conference on data mining (ICDM) (pp. 385-394). IEEE.

N.Swetha, S Ramachandram. (2016). Dynamic Secure Multi-Keyword Ranked Search over Encrypted Cloud Data. Macaw International Journal of Advanced Research in Computer Science and Engineering, 2(3), 1-5.

Bernstein, D. J. (2005, February). The Poly1305-AES message-authentication code. In International workshop on fast software encryption (pp. 32-49). Berlin, Heidelberg: Springer Berlin Heidelberg.

Mallareddy, A., Sridevi, R., & Prasad, C. G. V. N. (2019). Enhanced P-gene based data hiding for data security in cloud. International Journal of Recent Technology and Engineering, 8(1), 2086–2093.

Mahalakshmi, J., Reddy, A. Mallareddy., Sowmya, T., Chowdary, B. V., & Raju, P. R. (2023). Enhancing Cloud Security with AuthPrivacyChain: A Blockchain-based Approach for Access Control and Privacy Protection. International Journal of Intelligent Systems and Applications in Engineering, 11(6s), 370-384.