DS Journal of Multidisciplinary (DSM)

Research Article | Open Access | Download Full Text

Volume 1 | Issue 1 | Year 2024 | Article Id: DSM-V1I1P104 DOI: https://doi.org/10.59232/DSM-V1I1P104

IoT-Centric Data Protection Using Deep Learning Technique for Preserving Security and Privacy in Cloud

J. Abitha, R. Sadhana

ReceivedRevisedAcceptedPublished
21 Oct 202320 Nov 202313 Dec 202322 Jan 2024

Citation

J. Abitha, R. Sadhana. “IoT-Centric Data Protection Using Deep Learning Technique for Preserving Security and Privacy in Cloud.” DS Journal of Multidisciplinary, vol. 1, no. 1, pp. 23-30, 2024.

Abstract

A system of interconnected, the Internet of Things (IoT) is a term that refers to physical objects that may be connected online. Concerns over user privacy on the Internet of Things are growing as a result of the large amounts of personal data being gathered and exchanged there. IoT devices may increase productivity, accuracy, and financial gain in addition to reducing human intrusion, giving Internet of Things applications the most flexibility and convenience. Overhead of communications, security, and privacy, IoT is experiencing issues as well. As a result, protecting data has grown to be a difficult undertaking that must be handled carefully. This study offers a secure data security solution for preserving privacy in the cloud environment to address this crucial and difficult topic. It does this by efficiently separating the data by separating sensitive data from non-sensitive data with an SVM classifier and then using the data to partially decrypt and analyze, which increases the effectiveness of the model while ensuring security. The sensitive data was protected using Okamato Uchiyama encryption. The model safely stores, analyzes, and shares data to ensure the system’s safety and privacy. The novel method was compared to existing methodologies regarding particular parameters like precision, accuracy, F1 score, and recall.

Keywords

Cloud computing, Internet of Things, Support Vector Machine, Okamato Uchiyama.

References

[1] Ashutosh Kumar Singh, and Ishu Gupta, “Online Information Leaker Identification Scheme for Secure Data Sharing,” Multimedia Tools and Applications, vol. 79, pp. 31165–31182, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[2] Ishu Gupta et al., “Secure Data Storage and Sharing Techniques for Data Protection in Cloud Environments: A Systematic Review, Analysis, and Future Directions,” IEEE Access, vol. 10, pp. 71247–71277, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[3] Deepika Saxena et al., “A Fault Tolerant Elastic Resource Management Framework toward High Availability of Cloud Services,” IEEE Transactions on Network and Service Management, vol. 19, no. 3, pp. 3048–3061, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[4] Rishabh Gupta et al., “Quantum Machine Learning Driven Malicious User Prediction for Cloud Network Communications,” IEEE Networking Letters, vol. 4, no. 4, pp. 174-178, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[5] Ishu Gupta, and Ashutosh Kumar Singh, “SELI: Statistical Evaluation Based Leaker Identification Stochastic Scheme for Secure Data Sharing,” IET Communications, vol. 14, no. 20, pp. 3607–3618, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[6] IBM Ponemon, Cost of a Data Breach Study, 2022. [Online] Available: https://www.ibm.com/security/data-breach

[7] Ishu Gupta, and Ashutosh Kumar Singh, “Dynamic Threshold Based Information Leaker Identification Scheme,” Information Processing Letters, vol. 147, pp. 69–73, 2019.

[CrossRef] [Google Scholar] [Publisher Link]

[8] Xindi Ma et al., “PDLM: Privacy-Preserving Deep Learning Model on Cloud with Multiple Keys,” IEEE Transactions on Services Computing, vol. 14, no. 4, pp. 1251–1263, 2021.

[CrossRef] [Google Scholar] [Publisher Link]

[9] Ping Li et al., “Privacy-Preserving Outsourced Classification in Cloud Computing,” Cluster Computing, vol. 21, no. 1, pp. 277–286, 2018.

[CrossRef] [Google Scholar] [Publisher Link]

[10] Maoguo Gong, Jialun Feng, and Yu Xie, “Privacy-Enhanced Multi-Party Deep Learning,” Neural Networks, vol. 121, pp. 484–496, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[11] Rishabh Gupta et al., “Differential and Triphase Adaptive Learning-Based Privacy-Preserving Model for Medical Data in Cloud Environment,” IEEE Networking Letters, vol. 4, no. 4, pp. 217-221, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[12] Ping Li et al., “Privacy-Preserving Machine Learning with Multiple Data Providers,” Future Generation Computer Systems, vol. 87, pp. 341–350, 2018.

[CrossRef] [Google Scholar] [Publisher Link]

[13] Rishabh Gupta et al., “A Differential Approach and Deep Neural Network Based Data Privacy-Preserving Model in Cloud Environment,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, pp. 4659-4674, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[14] Ishu Gupta et al., “MLPAM: A Machine Learning and Probabilistic Analysis Based Model for Preserving Security and Privacy in Cloud Environment,” IEEE Systems Journal, vol. 15, no. 3, pp. 4248–4259, 2021.

[CrossRef] [Google Scholar] [Publisher Link]

[15] Shulan Wang et al., “An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 6, pp. 1265–1277, 2016.

[CrossRef] [Google Scholar] [Publisher Link]

[16] Hai Liu et al., “A Fair Data Access Control Towards Rational Users in Cloud Storage,” Information Sciences, vol. 418, pp. 258–271, 2017.

[CrossRef] [Google Scholar] [Publisher Link]

[17] Zechao Liu et al., “Practical Attribute-Based Encryption: Outsourcing Decryption, Attribute Revocation and Policy Updating,” Journal of Network and Computer Applications, vol. 108, pp. 112–123, 2018.

[CrossRef] [Google Scholar] [Publisher Link]

[18] Hong Zhong et al., “Multi-Authority Attribute-Based Encryption Access Control Scheme with Policy Hidden for Cloud Storage,” Soft Computing, vol. 22, no. 1, pp. 243–251, 2018.

[CrossRef] [Google Scholar] [Publisher Link]

[19] Leyou Zhang, Yilei Cui, and Yi Mu, “Improving Security and Privacy Attribute-Based Data Sharing in Cloud Computing,” IEEE Systems Journal, vol. 14, no. 1, pp. 387–397, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[20] Jianqiang Li et al., “An Efficient Attribute-Based Encryption Scheme with Policy Update and File Update in Cloud Computing,” IEEE Transactions on Industrial Informatics, vol. 15, no. 12, pp. 6500–6509, 2019.

[CrossRef] [Google Scholar] [Publisher Link]

IoT-Centric Data Protection Using Deep Learning Technique for Preserving Security and Privacy in Cloud