Enhancing cloud network security with a trust-based service mechanism using k-anonymity and statistical machine learning approach

IF 3.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Peer-To-Peer Networking and Applications Pub Date : 2024-09-16 DOI:10.1007/s12083-024-01759-y
Himani Saini, Gopal Singh, Sandeep Dalal, Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal
{"title":"Enhancing cloud network security with a trust-based service mechanism using k-anonymity and statistical machine learning approach","authors":"Himani Saini, Gopal Singh, Sandeep Dalal, Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal","doi":"10.1007/s12083-024-01759-y","DOIUrl":null,"url":null,"abstract":"<p>This Research work addresses the pressing need within cloud computing for a trust-based service mechanism that effectively manages the burgeoning volume and variety of data while mitigating privacy concerns. The primary aim is to address pressing security challenges within cloud networks through a novel approach tailored to enhance privacy preservation mechanisms. Experiments were done on a variety of datasets using a hybrid privacy-preserving strategy to assess the efficacy of the suggested solution. The datasets were divided into both testing and training sets for the experimental design, using a 70% validation ratio for training. The method's performance was compared with that of existing strategies, including caching and spatial K-anonymity (CSKA) and privacy-preserving incentive and rewarding (PPIR), using precision, recall, and F-measure analysis. The findings show that the suggested strategy performs better than the baseline approaches in a number of assessment measures, indicating its greater capacity to protect privacy in cloud environments. Specifically, the approach achieved an average precision of 0.85, significantly surpassing the precision values of existing techniques by 8-10%. Moreover, the method exhibited an average recall of 0.84, indicating its robustness in recalling values across all test samples. Across various experiments, our method consistently achieved impressive F1 scores ranging from 0.80 to 0.85, underscoring its robustness in maintaining a balance between precision and recall. Furthermore, with an accuracy hovering around 0.85, our approach demonstrated remarkable proficiency in accurately classifying instances while preserving privacy in cloud environments. These promising results underscore the efficacy of the proposed approach in enhancing privacy preservation mechanisms within cloud networks, paving the way for more secure and reliable cloud computing infrastructures. By leveraging a hybrid privacy-preserving method, the paper offers a holistic approach to address the complex problems faced by cloud networks in safeguarding sensitive information. The experimental evaluation demonstrates the efficacy of the proposed approach, highlighting its superior performance compared to existing techniques.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"2 1","pages":""},"PeriodicalIF":3.3000,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Peer-To-Peer Networking and Applications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s12083-024-01759-y","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

This Research work addresses the pressing need within cloud computing for a trust-based service mechanism that effectively manages the burgeoning volume and variety of data while mitigating privacy concerns. The primary aim is to address pressing security challenges within cloud networks through a novel approach tailored to enhance privacy preservation mechanisms. Experiments were done on a variety of datasets using a hybrid privacy-preserving strategy to assess the efficacy of the suggested solution. The datasets were divided into both testing and training sets for the experimental design, using a 70% validation ratio for training. The method's performance was compared with that of existing strategies, including caching and spatial K-anonymity (CSKA) and privacy-preserving incentive and rewarding (PPIR), using precision, recall, and F-measure analysis. The findings show that the suggested strategy performs better than the baseline approaches in a number of assessment measures, indicating its greater capacity to protect privacy in cloud environments. Specifically, the approach achieved an average precision of 0.85, significantly surpassing the precision values of existing techniques by 8-10%. Moreover, the method exhibited an average recall of 0.84, indicating its robustness in recalling values across all test samples. Across various experiments, our method consistently achieved impressive F1 scores ranging from 0.80 to 0.85, underscoring its robustness in maintaining a balance between precision and recall. Furthermore, with an accuracy hovering around 0.85, our approach demonstrated remarkable proficiency in accurately classifying instances while preserving privacy in cloud environments. These promising results underscore the efficacy of the proposed approach in enhancing privacy preservation mechanisms within cloud networks, paving the way for more secure and reliable cloud computing infrastructures. By leveraging a hybrid privacy-preserving method, the paper offers a holistic approach to address the complex problems faced by cloud networks in safeguarding sensitive information. The experimental evaluation demonstrates the efficacy of the proposed approach, highlighting its superior performance compared to existing techniques.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用 K-anonymity 和统计机器学习方法,通过基于信任的服务机制增强云网络安全
这项研究工作旨在解决云计算领域对基于信任的服务机制的迫切需求,这种机制既能有效管理不断增长的数据量和数据种类,又能减轻对隐私的担忧。其主要目的是通过一种为加强隐私保护机制而量身定制的新方法来应对云网络中紧迫的安全挑战。我们使用混合隐私保护策略在各种数据集上进行了实验,以评估所建议解决方案的功效。在实验设计中,数据集被分为测试集和训练集,训练集的验证率为 70%。利用精确度、召回率和 F-measure 分析,将该方法的性能与现有策略(包括缓存和空间 K-anonymity (CSKA) 以及隐私保护激励和奖励 (PPIR))的性能进行了比较。研究结果表明,建议的策略在多项评估指标上都优于基线方法,这表明它在云环境中保护隐私的能力更强。具体来说,该方法的平均精确度达到了 0.85,比现有技术的精确度值高出 8-10%。此外,该方法的平均召回率为 0.84,表明其在所有测试样本中都能稳健地召回数值。在各种实验中,我们的方法始终能获得令人印象深刻的 F1 分数,范围在 0.80 到 0.85 之间,这突出表明了该方法在保持精确度和召回率之间平衡方面的稳健性。此外,我们的方法准确率徘徊在 0.85 左右,在准确分类实例的同时还能保护云环境中的隐私,表现出了非凡的能力。这些令人鼓舞的结果凸显了所提出的方法在增强云网络中隐私保护机制方面的功效,为建立更加安全可靠的云计算基础设施铺平了道路。通过利用混合隐私保护方法,本文提供了一种整体方法来解决云网络在保护敏感信息方面所面临的复杂问题。实验评估证明了所提方法的有效性,与现有技术相比,它的性能更加优越。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Peer-To-Peer Networking and Applications
Peer-To-Peer Networking and Applications COMPUTER SCIENCE, INFORMATION SYSTEMS-TELECOMMUNICATIONS
CiteScore
8.00
自引率
7.10%
发文量
145
审稿时长
12 months
期刊介绍: The aim of the Peer-to-Peer Networking and Applications journal is to disseminate state-of-the-art research and development results in this rapidly growing research area, to facilitate the deployment of P2P networking and applications, and to bring together the academic and industry communities, with the goal of fostering interaction to promote further research interests and activities, thus enabling new P2P applications and services. The journal not only addresses research topics related to networking and communications theory, but also considers the standardization, economic, and engineering aspects of P2P technologies, and their impacts on software engineering, computer engineering, networked communication, and security. The journal serves as a forum for tackling the technical problems arising from both file sharing and media streaming applications. It also includes state-of-the-art technologies in the P2P security domain. Peer-to-Peer Networking and Applications publishes regular papers, tutorials and review papers, case studies, and correspondence from the research, development, and standardization communities. Papers addressing system, application, and service issues are encouraged.
期刊最新文献
Are neck pain, disability, and deep neck flexor performance the same for the different types of temporomandibular disorders? Enhancing cloud network security with a trust-based service mechanism using k-anonymity and statistical machine learning approach Towards real-time non-preemptive multicast scheduling in reconfigurable data center networks Homomorphic multi-party computation for Internet of Medical Things BPPKS: A blockchain-based privacy preserving and keyword-searchable scheme for medical data sharing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1