A Study on Privacy Preservation Techniques and Scope of Applying Deep Learning Concepts in Security: a Survey
-
https://doi.org/10.14419/ijet.v7i3.27.18502 -
Cipher text Attribute based Encryption (CP-ABE), Ciphertext Policy Attribute set based encryption (CP-ASBE), Deep –learning, Efficient Key policy Attribute based Encryption (EKP-ABE), Hierarchical Attribute set based Encryption, Hierarchical Identity base -
Abstract
The Data privacy and security plays a major scientific role in the research industry with a variety of content and with different datasets of cloud –fog – Internet of things. These three domains have been placed a rapid search content in security as well as networking basics. Here, it is found that different survey methods and search techniques that provides secure privacy data when data gets uploaded to the cloud via fog nodes. Thus, we also check those can be any deep learning techniques that can be applied for the purpose of security in cloud source. Infrastructure as the fog computing is named as edge computing which has a disturbed network, so it can’t be entirely trusted when we upload the data to the cloud and in fact, cloud also has some concerns about security as it is updated and maintained by third party service providers. To precise, we check various methods that can be applied to secure the data, make comparisons and also checking for the crop where can be deep neural learning along with machine learning can be applied for this survey.
Â
Â
-
References
[1] Chen, Y. C., Chang, Y. C., Chen, C. H., Lin, Y. S., Chen, J. L., & Chang, Y. Y. (2017, May). Cloud-fog computing for information-centric Internet-of-Things applications. In Applied System Innovation (ICASI), 2017 International Conference on (pp. 637-640). IEEE.
[2] Alotaibi, Asma, Ahmed Barnawi, and Mohammed Buhari. "Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing." Journal of Information Security 8.03 (2017): 203.
[3] Koo, D., Shin, Y., Yun, J., & Hur, J. (2016, December). A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing. In Cloud Computing Technology and Science (CloudCom), 2016 IEEE International Conference on (pp. 285-293). IEEE.
[4] Su, J., Cao, D., Zhao, B., Wang, X., & You, I. (2014). ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things. Future Generation Computer Systems, 33, 11-18.
[5] Deng, R., Lu, R., Lai, C., Luan, T. H., & Liang, H. (2016). Optimal workload allocation in fog-cloud computing toward balanced delay and power consumption. IEEE Internet of Things Journal, 3(6), 1171-1181.
[6] Liu, Y., Dong, B., Guo, B., Yang, J., & Peng, W. (2015). Combination of cloud computing and internet of things (IOT) in medical monitoring systems. International Journal of Hybrid Information Technology, 8(12), 367-376.
[7] Khairnar, Sonali, and Dhanashree Borkar. "Fog Computing: A New Concept To Minimize The Attacks And To Provide Security In Cloud Computing Environment." IJRET: International Journal of Research in Engineering and Technology 3.06 (2014).
[8] Zouari, Jaweher, Mohamed Hamdi, and Tai-Hoon Kim. "A privacy-preserving homomorphic encryption scheme for the Internet of Things." Wireless Communications and Mobile Computing Conference (IWCMC), 2017 13th International. IEEE, 2017.
[9] Yang, Xue, Fan Yin, and Xiaohu Tang. "A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing-Enhanced Location-Based Service." Sensors 17.7 (2017): 1611.
[10] Yang, Lei, Abdulmalik Humayed, and Fengjun Li. "A multi-cloud based privacy-preserving data publishing scheme for the internet of things." Proceedings of the 32nd Annual Conference on Computer Security Applications. ACM, 2016.
[11] Vishwanath, Akhilesh, Ramya Peruri, and Jing (Selena) He. Security in fog computing through encryption. DigitalCommons@ Kennesaw State University, 2016.
[12] Hu, P., Ning, H., Qiu, T., Song, H., Wang, Y., & Yao, X. (2017). Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet of Things Journal.
[13] Jiang, Y., Susilo, W., Mu, Y., & Guo, F. (2017). Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Generation Computer Systems.
[14] Huang, Qinlong, Licheng Wang, and Yixian Yang. "DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices." World Wide Web (2017): 1-17.
[15] Alrawais, A., Alhothaily, A., Hu, C., Xing, X., & Cheng, X. (2017). An Attribute-Based Encryption Scheme to Secure Fog Communications. IEEE Access.
[16] Huang, Qinlong, Yixian Yang, and Licheng Wang. "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things." IEEE Access 5 (2017): 12941-12950.
[17] Taneja, Mohit, and Alan Davy. "Resource aware placement of IoT application modules in Fog-Cloud Computing Paradigm." Integrated Network and Service Management (IM), 2017 IFIP/IEEE Symposium on. IEEE, 2017.
[18] Lu, R., Heung, K., Lashkari, A. H., & Ghorbani, A. A. (2017). A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT. IEEE Access, 5, 3302-3312.
[19] Luigi Atzori a, Antonio Iera b, Giacomo Morabito c,*"The Internet of Things: A survey"Computer Networks 54 (2010) 2787–2805 Contents lists.
[20] Dan BonehMatthew Frankliny "Identity-Based Encryption from the Weil Pairing" SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003.
[21] Mrinmoy Barua*, Xiaohui Liang, Rongxing Lu and Xuemin Shen"ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing" Int. J. Security and Networks, Vol. 6, Nos. 2/3, 2011.
[22] Qinlong Huanga,b,∗, Yixian Yanga,b, Mansuo Shenc "Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing" 0167-739X/© 2016 Elsevier B.V. All rights reserved.
[23] Nguyen B.Truong, Gyu Myoung Lee, Yacine Ghamri-Doudane "Software Defined Networking-based Vehicular Adhoc Network with Fog Computing" 978-3-901882-76-0 @2015 IFIP
[24] Shucheng Yu∗, Cong Wang†, Kui Ren†, and Wenjing Lou∗ " Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing " 978-1-4244-5837-0/10/$26.00 ©2010 IEEE
[25] Chunming Rong a, Son T. Nguyen a,⇑, Martin Gilje Jaatun b "Beyond lightning: A survey on security challenges in cloud computing" Computers and Electrical Engineering xxx (2012).
[26] Giancarlo Fortino, Antonio Guerrieri, Wilma Russo, Claudio Savaglio "Integration of Agent-based and Cloud Computing for the Smart Objects-oriented IoT" 978-1-4799-3776-9/14/$31.00 ©2014 IEEE.
[27] Flavio Bonomi, Rodolfo Milito, Jiang Zhu, Sateesh Addepalli "Fog Computing and Its Role in the Internet of Things" Copyright 2012 ACM 978-1-4503-1519-7/12/08... $15.00.
[28] Ivan Stojmenovic "Fog computing: A cloud to the ground support for smart things and machine-to-machine networks"978-1-4799-5044-7/14/$31.00 ©2014 IEEE
[29] Bonomi F. "Connected vehicles, the internet of things, and fog computing." The Eighth ACM Int. Workshop on VehiculAr Inter- NETworking VANET, Las Vegas, USA, 2011
[30] Nam Ky Giang, Michael Blackstock, Rodger Lea, Victor C.M. Leung "Developing IoT Applications in the Fog: a Distributed Dataflow Approach" 2015 5th International Conference on the Internet of Things (IoT)
[31] Manogaran, Gunasekaran, R. Varatharajan, Daphne Lopez, Priyan Malarvizhi Kumar, Revathi Sundarasekar, and Chandu Thota. "A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system." Future Generation Computer Systems (2017).
[32] Paradiso, Rita, Giannicola Loriga, and Nicola Taccini. "A wearable health care system based on knitted integrated sensors." IEEE transactions on Information Technology in biomedicine 9, no. 3 (2005): 337-344.
[33] Lorincz, Konrad, David J. Malan, Thaddeus RF Fulford-Jones, Alan Nawoj, Antony Clavel, Victor Shnayder, Geoffrey Mainland, Matt Welsh, and Steve Moulton. "Sensor networks for emergency response: challenges and opportunities." IEEE pervasive Computing 3, no. 4 (2004): 16-23.
[34] Ng, Jason WP, Benny PL Lo, Oliver Wells, Morris Sloman, Nick Peters, Ara Darzi, Chris Toumazou, and Guang-Zhong Yang. "Ubiquitous monitoring environment for wearable and implantable sensors (UbiMon)." In International Conference on Ubiquitous Computing (Ubicomp). 2004.
[35] Sankar, S., and P. Srinivasan. "Internet of Things (Iot): A Survey on Empowering Technologies, Research Opportunities and Applications." International Journal of Pharmacy and Technology 8, no. 4 (2016): 26117-26141.
[36] Luan, Tom H., Longxiang Gao, Zhi Li, Yang Xiang, Guiyi Wei, and Limin Sun. "Fog computing: Focusing on mobile users at the edge." arXiv preprint arXiv:1502.01815 (2015).
[37] Zhu, Jiang, Douglas S. Chan, Mythili Suryanarayana Prabhu, Preethi Natarajan, Hao Hu, and Flavio Bonomi. "Improving web sites performance using edge servers in fog computing architecture." In Service Oriented System Engineering (SOSE), 2013 IEEE 7th International Symposium on, pp. 320-323. IEEE, 2013.
[38] [38] Ghorbani, H. Reza, and M. Hossein Ahmadzadegan. "Security challenges in internet of things: survey." In Wireless Sensors (ICWiSe), 2017 IEEE Conference on, pp. 1-6. IEEE, 2017.
[39] Survey on Multi Authority Attribute Based Encryption for personal Health Record in Cloud Computing. Vahidhunnisha J, Ramasamy S , Balasubramaniam T. 2, s.l. : International Journal of latest trends in engineering and technology, 2013, Vol. 3. 2278-621X.
[40] Ensuring Integrity Proof in Hierarchial Attribute Encryption Scheme Using Cloud Computing. Dr. R Aparna, Pallavi R. 1, s.l. : International Journal of Cognitive Science, Engineering and Technology, 2013, Vol. 1.
[41] A Hierachical Attribute Based Solution For Flexible and Scalable Access Control in Cloud Computing. Zhiguo Wan, Jun'e Liu , Robert H. Deng. 2, s.l. : IEEE, 2012, Vol. 7.
[42] Nimje, Anup R., V. T. Gaikwad, and H. N. Datir. "Attribute-Based Encryption Techniques in Cloud Computing Security: An Overview." International Journal of Computer Trends and Technology (2013).Bonomi, Flavio, Rodolfo Milito, Preethi Natarajan, and Jiang Zhu. "Fog computing: A platform for internet of things and analytics." In Big data and internet of things: A roadmap for smart environments, pp. 169-186. Springer, Cham, 2014.
[43] Fugkeaw, Somchart, and Hiroyuki Sato. "An extended CP-ABE based Access control model for data outsourced in the cloud." In Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th Annual, vol. 3, pp. 73-78. IEEE, 2015.
[44] Yang, Kan, Xiaohua Jia, Kui Ren, Ruitao Xie, and Liusheng Huang. "Enabling efficient access control with dynamic policy updating for big data in the cloud." In INFOCOM, 2014 Proceedings IEEE, pp. 2013-2021. IEEE, 2014.
[45] Sherasiya, T. A. R. I. Q. A. H. M. A. D., Hardik Upadhyay, and Hiren B. Patel. "A survey: Intrusion detection system for internet of things." International Journal of Computer Science and Engineering (IJCSE) 1, no. 5 (2016): 81-90.
[46] Qiu, Meikang, Keke Gai, Bhavani Thuraisingham, Lixin Tao, and Hui Zhao. "Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry." Future Generation Computer Systems 80 (2018): 421-429.
[47] Rahmani, Amir M., Tuan Nguyen Gia, Behailu Negash, Arman Anzanpour, Iman Azimi, Mingzhe Jiang, and Pasi Liljeberg. "Exploiting smart e-health gateways at the edge of healthcare internet-of-things: a fog computing approach." Future Generation Computer Systems 78 (2018): 641-658.
[48] Thirumalai, Chandrasegar, and Himanshu Kar. "Memory Efficient Multi Key (MEMK) generation scheme for secure transportation of sensitive data over Cloud and IoT devices." In Power and Advanced Computing Technologies (i-PACT), 2017 Innovations in, pp. 1-6. IEEE, 2017.
[49] Li, Jin, Yinghui Zhang, Xiaofeng Chen, and Yang Xiang. "Secure attribute-based data sharing for resource-limited users in cloud computing." Computers & Security 72 (2018): 1-12.
[50] Santhi, P., and R. Vaneeshwari. "Privacy Preserving and Consistency Check Of Data Store in Cloud Using Attribute Based Encryption.†International Journal of Engineering Development and Research (IJEDR) ,IJEDR | Volume 5, Issue 1 | ISSN: 2321-9939(2017).
[51] Surya Prabha.U.S1, Marikkannu.P2, Arul Vineeth.A.D3 "Ciphertext policy attribute set based encryption with one fold data access with cloud" 2249-7277 ISSN (online): 2277-7970) Volume-4 Number-1 Issue-14 March-2014
[52] Cong Shi Jian Liu Hongbo Liu Yingying Chen "Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT " Mobihoc ’17, July, 2017, Chennai, India.
[53] Mohammad Saeid Mahdavinejad1, Mohammadreza Rezvan2, Mohammadamin Barekatain3, Peyman Adibi4, Payam Barnaghi5, Amit P. Sheth6 "Machine Learning for Internet of Things Data Analysis: A Survey" Journal of Digital Communications and Networks October 9, 2017
[54] Kai Fan 1,*, Junxiong Wang 1, Xin Wang 1, Hui Li 1 and Yintang Yang 2 "A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing" Sensors 2017, 17, 1695; doi:10.3390/s17071695
[55] Ravula Arun Kumar 1 * Kambalapally Vinuthna 2 * "A Review on various secure data access schemes and techniques in Fog for Internet of Things" International Journal of Computer Sciences and Engineering Vol. 6(1), Jan 2018, E-ISSN: 2347-2693.
-
Downloads
-
How to Cite
Arun Kumar, R., & Vinuthna Kambalapally, D. (2018). A Study on Privacy Preservation Techniques and Scope of Applying Deep Learning Concepts in Security: a Survey. International Journal of Engineering & Technology, 7(3.27), 586-592. https://doi.org/10.14419/ijet.v7i3.27.18502Received date: 2018-08-28
Accepted date: 2018-08-28