Skip to main content

20.03.2024

Optimal Key Generation for Privacy Preservation in Big Data Applications Based on the Marine Predator Whale Optimization Algorithm

verfasst von: Poonam Samir Jadhav, Gautam M. Borkar

Erschienen in: Annals of Data Science

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the era of big data, preserving data privacy has become paramount due to the sheer volume and sensitivity of the information being processed. This research is dedicated to safeguarding data privacy through a novel data sanitization approach centered on optimal key generation. Due to the size and complexity of the big data applications, managing big data with reduced risk and high privacyposes challenges. Many standard privacy-preserving mechanisms are introduced to maintain the volume and velocity of big data since it consists of massive and complex data. To solve this issue, this research developed a data sanitization technique for optimal key generation to preserve the privacy of the sensitive data. The sensitive data is initially identified by the quasi-identifiers and the identified sensitive data is preserved by generating an optimal key using the proposed marine predator whale optimization (MPWO) algorithm. The proposed algorithm is developed by the hybridization of the characteristics of foraging behaviors of the marine predators and the whales are hybridized to determine the optimal key. The optimal key generated using the MPWO algorithm effectively preserves the privacy of the data. The efficiency of the research is proved by measuring the metrics equivalent class size metric values of 0.03, 185.07, and 0.04 for attribute disclosure attack, identity disclosure attack, and identity disclosure attack. Similarly, the Discernibility metrics value is measured as 0.08, 123.38, 0.09 with attribute disclosure attack, identity disclosure attack, identity disclosure attack, and the Normalized certainty penalty is measured as 0.002, 61.69, 0.001 attribute disclosure attack, identity disclosure attack, identity disclosure attack.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Bertino E, Ferrari E (2017) Big data security and privacy In A comprehensive guide through the Italian database research over the last 25 years). Springer, Cham Bertino E, Ferrari E (2017) Big data security and privacy In A comprehensive guide through the Italian database research over the last 25 years). Springer, Cham
6.
Zurück zum Zitat Tien JM (2017) Internet of things, real-time decision making, and artificial intelligence. Ann Data Sci 4:149–178CrossRef Tien JM (2017) Internet of things, real-time decision making, and artificial intelligence. Ann Data Sci 4:149–178CrossRef
7.
Zurück zum Zitat Olson DL, Shi Y (2007) Introduction to business data mining. McGraw-Hill/Irwin, New York Olson DL, Shi Y (2007) Introduction to business data mining. McGraw-Hill/Irwin, New York
10.
Zurück zum Zitat Shi Y (2022) Advances in big data analytics: theory, algorithms and practices. Springer, BerlinCrossRef Shi Y (2022) Advances in big data analytics: theory, algorithms and practices. Springer, BerlinCrossRef
11.
Zurück zum Zitat Shi Y, Tian Y, Kou G, Peng Y, Li J (2011) Optimization based data mining: theory and applications. Springer, BerlinCrossRef Shi Y, Tian Y, Kou G, Peng Y, Li J (2011) Optimization based data mining: theory and applications. Springer, BerlinCrossRef
23.
Zurück zum Zitat Tumuluru P, Burra LR, BhavaniDasari D, Saibaba CM, Revathi B, Venkateswarlu B (2021). A novel privacy preserving biometric authentication scheme using polynomial time key algorithm in cloud computing. In: 2021 International conference on artificial intelligence and smart systems (ICAIS). IEEE, pp 1330–1335 Tumuluru P, Burra LR, BhavaniDasari D, Saibaba CM, Revathi B, Venkateswarlu B (2021). A novel privacy preserving biometric authentication scheme using polynomial time key algorithm in cloud computing. In: 2021 International conference on artificial intelligence and smart systems (ICAIS). IEEE, pp 1330–1335
Metadaten
Titel
Optimal Key Generation for Privacy Preservation in Big Data Applications Based on the Marine Predator Whale Optimization Algorithm
verfasst von
Poonam Samir Jadhav
Gautam M. Borkar
Publikationsdatum
20.03.2024
Verlag
Springer Berlin Heidelberg
Erschienen in
Annals of Data Science
Print ISSN: 2198-5804
Elektronische ISSN: 2198-5812
DOI
https://doi.org/10.1007/s40745-024-00521-8

Premium Partner