Optimal Key Generation for Data Sanitization and Restoration of Cloud Data: Future of Financial Cyber Security
B. Balashunmugaraja and
T. R. Ganeshbabu
Additional contact information
B. Balashunmugaraja: Computer Science and Engineering, Sri Venkateswara Institute of Science and Technology, Tamil Nadu, India
T. R. Ganeshbabu: Electronics and Communication Engineering, Muthayammal Engineering College, Tamil Nadu, India
International Journal of Information Technology & Decision Making (IJITDM), 2020, vol. 19, issue 04, 987-1013
Abstract:
Cloud security in finance is considered as the key importance, taking account of the aspect of critical data stored over cloud spaces within organizations all around the globe. They are chiefly relying on cloud computing to accelerate their business profitability and scale up their business processes with enhanced productivity coming through flexible work environments offered in cloud-run working systems. Hence, there is a prerequisite to contemplate cloud security in the entire financial service sector. Moreover, the main issue challenged by privacy and security is the presence of diverse chances to attack the sensitive data by cloud operators, which leads to double the user’s anxiety on the stored data. For solving this problem, the main intent of this paper is to develop an intelligent privacy preservation approach for data stored in the cloud sector, mainly the financial data. The proposed privacy preservation model involves two main phases: (a) data sanitization and (b) data restoration. In the sanitization process, the sensitive data is hidden, which prevents sensitive information from leaking on the cloud side. Further, the normal as well as the sensitive data is stored in a cloud environment. For the sanitization process, a key should be generated that depends on the new meta-heuristic algorithm called crossover improved-lion algorithm (CI-LA), which is inspired by the lion’s unique social behavior. During data restoration, the same key should be used for effectively restoring the original data. Here, the optimal key generation is done in such a way that the objective model involves the degree of modification, hiding rate, and information preservation rate, which effectively enhance the cyber security performance in the cloud.
Keywords: Cyber security; financial data; cloud sector; privacy preservation; data sanitization; optimal key generation; crossover improved-lion algorithm; meta-heuristic algorithm; cloud security; data restoration (search for similar items in EconPapers)
Date: 2020
References: Add references at CitEc
Citations: View citations in EconPapers (1)
Downloads: (external link)
http://www.worldscientific.com/doi/abs/10.1142/S0219622020500200
Access to full text is restricted to subscribers
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:wsi:ijitdm:v:19:y:2020:i:04:n:s0219622020500200
Ordering information: This journal article can be ordered from
DOI: 10.1142/S0219622020500200
Access Statistics for this article
International Journal of Information Technology & Decision Making (IJITDM) is currently edited by Yong Shi
More articles in International Journal of Information Technology & Decision Making (IJITDM) from World Scientific Publishing Co. Pte. Ltd.
Bibliographic data for series maintained by Tai Tone Lim ().