A Study on Privacy Preservation Techniques and Scope of Applying Deep Learning Concepts in Security: a Survey

  • Authors

    • Ravula Arun Kumar
    • Dr Vinuthna Kambalapally
    https://doi.org/10.14419/ijet.v7i3.27.18502

    Received date: August 28, 2018

    Accepted date: August 28, 2018

    Published date: April 24, 2026

  • Cipher text Attribute based Encryption (CP-ABE), Ciphertext Policy Attribute set based encryption (CP-ASBE), Deep –learning, Efficient Key policy Attribute based Encryption (EKP-ABE), Hierarchical Attribute set based Encryption, Hierarchical Identity base
  • Abstract

    The Data privacy and security plays a major scientific role in the research industry with a variety of content and with different datasets of cloud –fog – Internet of things. These three domains have been placed a rapid search content in security as well as networking basics. Here, it is found that different survey methods and search techniques that provides secure privacy data when data gets uploaded to the cloud via fog nodes. Thus, we also check those can be any deep learning techniques that can be applied for the purpose of security in cloud source.  Infrastructure as the fog computing is named as edge computing which has a disturbed network, so it can’t be entirely trusted when we upload the data to the cloud and in fact, cloud also has some concerns about security as it is updated and maintained by third party service providers. To precise, we check various methods that can be applied to secure the data, make comparisons and also checking for the crop where can be deep neural learning along with machine learning can be applied for this survey.

  • References

    1. Chen, Y. C., Chang, Y. C., Chen, C. H., Lin, Y. S., Chen, J. L., & Chang, Y. Y. (2017, May). Cloud-fog computing for information-centric Internet-of-Things applications. In Applied System Innova-tion (ICASI), 2017 International Conference on (pp. 637-640). IEEE.
    2. Alotaibi, Asma, Ahmed Barnawi, and Mohammed Buhari. "Attrib-ute-Based Secure Data Sharing with Efficient Revocation in Fog Computing." Journal of Information Security 8.03 (2017): 203.
    3. Koo, D., Shin, Y., Yun, J., & Hur, J. (2016, December). A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing. In Cloud Computing Technology and Science (Cloud-Com), 2016 IEEE International Conference on (pp. 285-293). IEEE.
    4. Su, J., Cao, D., Zhao, B., Wang, X., & You, I. (2014). ePASS: An expressive attribute-based signature scheme with privacy and an un-forgeability guarantee for the Internet of Things. Future Generation Computer Systems, 33, 11-18.
    5. Deng, R., Lu, R., Lai, C., Luan, T. H., & Liang, H. (2016). Optimal workload allocation in fog-cloud computing toward balanced delay and power consumption. IEEE Internet of Things Journal, 3(6), 1171-1181.
    6. Liu, Y., Dong, B., Guo, B., Yang, J., & Peng, W. (2015). Combina-tion of cloud computing and internet of things (IOT) in medical monitoring systems. International Journal of Hybrid Information Technology, 8(12), 367-376.
    7. Khairnar, Sonali, and Dhanashree Borkar. "Fog Computing: A New Concept To Minimize The Attacks And To Provide Security In Cloud Computing Environment." IJRET: International Journal of Research in Engineering and Technology 3.06 (2014).
    8. Zouari, Jaweher, Mohamed Hamdi, and Tai-Hoon Kim. "A privacy-preserving homomorphic encryption scheme for the Internet of Things." Wireless Communications and Mobile Computing Confer-ence (IWCMC), 2017 13th International. IEEE, 2017.
    9. Yang, Xue, Fan Yin, and Xiaohu Tang. "A Fine-Grained and Priva-cy-Preserving Query Scheme for Fog Computing-Enhanced Loca-tion-Based Service." Sensors 17.7 (2017): 1611.
    10. Yang, Lei, Abdulmalik Humayed, and Fengjun Li. "A multi-cloud based privacy-preserving data publishing scheme for the internet of things." Proceedings of the 32nd Annual Conference on Computer Security Applications. ACM, 2016.
    11. Vishwanath, Akhilesh, Ramya Peruri, and Jing (Selena) He. Security in fog computing through encryption. DigitalCom-mons@ Kennesaw State University, 2016.
    12. Hu, P., Ning, H., Qiu, T., Song, H., Wang, Y., & Yao, X. (2017). Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet of Things Journal.
    13. Jiang, Y., Susilo, W., Mu, Y., & Guo, F. (2017). Ciphertext-policy attribute-based encryption against key-delegation abuse in fog com-puting. Future Generation Computer Systems.
    14. Huang, Qinlong, Licheng Wang, and Yixian Yang. "DECENT: Se-cure and fine-grained data access control with policy updating for constrained IoT devices." World Wide Web (2017): 1-17.
    15. Alrawais, A., Alhothaily, A., Hu, C., Xing, X., & Cheng, X. (2017). An Attribute-Based Encryption Scheme to Secure Fog Communica-tions. IEEE Access.
    16. Huang, Qinlong, Yixian Yang, and Licheng Wang. "Secure Data Access Control With Ciphertext Update and Computation Out-sourcing in Fog Computing for Internet of Things." IEEE Access 5 (2017): 12941-12950.
    17. Taneja, Mohit, and Alan Davy. "Resource aware placement of IoT application modules in Fog-Cloud Computing Para-digm." Integrated Network and Service Management (IM), 2017 IFIP/IEEE Symposium on. IEEE, 2017.
    18. Lu, R., Heung, K., Lashkari, A. H., & Ghorbani, A. A. (2017). A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT. IEEE Access, 5, 3302-3312.
    19. Luigi Atzori a, Antonio Iera b, Giacomo Morabito c,*"The Internet of Things: A survey"Computer Networks 54 (2010) 2787–2805 Contents lists.
    20. Dan BonehMatthew Frankliny "Identity-Based Encryption from the Weil Pairing" SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003.
    21. Mrinmoy Barua*, Xiaohui Liang, Rongxing Lu and Xuemin Shen"ESPAC: Enabling Security and Patient-centric Access Con-trol for eHealth in cloud computing" Int. J. Security and Networks, Vol. 6, Nos. 2/3, 2011.
    22. Qinlong Huanga,b,∗, Yixian Yanga,b, Mansuo Shenc "Secure and efficient data collaboration with hierarchical attribute-based encryp-tion in cloud computing" 0167-739X/© 2016 Elsevier B.V. All rights reserved.
    23. Nguyen B.Truong, Gyu Myoung Lee, Yacine Ghamri-Doudane "Software Defined Networking-based Vehicular Adhoc Network with Fog Computing" 978-3-901882-76-0 @2015 IFIP
    24. Shucheng Yu∗, Cong Wang†, Kui Ren† , and Wenjing Lou∗ " Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing " 978-1-4244-5837-0/10/$26.00 ©2010 IEEE
    25. Chunming Rong a, Son T. Nguyen a,⇑, Martin Gilje Jaatun b "Be-yond lightning: A survey on security challenges in cloud compu-ting" Computers and Electrical Engineering xxx (2012).
    26. Giancarlo Fortino, Antonio Guerrieri, Wilma Russo, Claudio Sav-aglio "Integration of Agent-based and Cloud Computing for the Smart Objects-oriented IoT" 978-1-4799-3776-9/14/$31.00 ©2014 IEEE.
    27. Flavio Bonomi, Rodolfo Milito, Jiang Zhu, Sateesh Addepalli "Fog Computing and Its Role in the Internet of Things" Copyright 2012 ACM 978-1-4503-1519-7/12/08... $15.00.
    28. Ivan Stojmenovic "Fog computing: A cloud to the ground support for smart things and machine-to-machine networks"978-1-4799-5044-7/14/$31.00 ©2014 IEEE
    29. Bonomi F. "Connected vehicles, the internet of things, and fog computing." The Eighth ACM Int. Workshop on VehiculAr Inter- NETworking VANET, Las Vegas, USA, 2011
    30. Nam Ky Giang, Michael Blackstock, Rodger Lea, Victor C.M. Leung "Developing IoT Applications in the Fog: a Distributed Da-taflow Approach" 2015 5th International Conference on the Inter-net of Things (IoT)
    31. Manogaran, Gunasekaran, R. Varatharajan, Daphne Lopez, Priyan Malarvizhi Kumar, Revathi Sundarasekar, and Chandu Thota. "A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system." Future Generation Computer Systems (2017).
    32. Paradiso, Rita, Giannicola Loriga, and Nicola Taccini. "A wearable health care system based on knitted integrated sensors." IEEE transactions on Information Technology in biomedicine 9, no. 3 (2005): 337-344.
    33. Lorincz, Konrad, David J. Malan, Thaddeus RF Fulford-Jones, Alan Nawoj, Antony Clavel, Victor Shnayder, Geoffrey Mainland, Matt Welsh, and Steve Moulton. "Sensor networks for emergency response: challenges and opportunities." IEEE pervasive Computing 3, no. 4 (2004): 16-23.
    34. Ng, Jason WP, Benny PL Lo, Oliver Wells, Morris Sloman, Nick Peters, Ara Darzi, Chris Toumazou, and Guang-Zhong Yang. "Ubiquitous monitoring environment for wearable and implantable sensors (UbiMon)." In International Conference on Ubiquitous Computing (Ubicomp). 2004.
    35. Sankar, S., and P. Srinivasan. "Internet of Things (Iot): A Survey on Empowering Technologies, Research Opportunities and Applica-tions." International Journal of Pharmacy and Technology 8, no. 4 (2016): 26117-26141.
    36. Luan, Tom H., Longxiang Gao, Zhi Li, Yang Xiang, Guiyi Wei, and Limin Sun. "Fog computing: Focusing on mobile users at the edge." arXiv preprint arXiv:1502.01815 (2015).
    37. Zhu, Jiang, Douglas S. Chan, Mythili Suryanarayana Prabhu, Preethi Natarajan, Hao Hu, and Flavio Bonomi. "Improving web sites performance using edge servers in fog computing architecture." In Service Oriented System Engineering (SOSE), 2013 IEEE 7th International Symposium on, pp. 320-323. IEEE, 2013.
    38. [38] Ghorbani, H. Reza, and M. Hossein Ahmadzadegan. "Security challenges in internet of things: survey." In Wireless Sensors (IC-WiSe), 2017 IEEE Conference on, pp. 1-6. IEEE, 2017.
    39. Survey on Multi Authority Attribute Based Encryption for personal Health Record in Cloud Computing. Vahidhunnisha J, Ramasamy S , Balasubramaniam T. 2, s.l. : International Journal of latest trends in engineering and technology, 2013, Vol. 3. 2278-621X.
    40. Ensuring Integrity Proof in Hierarchial Attribute Encryption Scheme Using Cloud Computing. Dr. R Aparna, Pallavi R. 1, s.l. : International Journal of Cognitive Science, Engineering and Tech-nology, 2013, Vol. 1.
    41. A Hierachical Attribute Based Solution For Flexible and Scalable Access Control in Cloud Computing. Zhiguo Wan, Jun'e Liu , Rob-ert H. Deng. 2, s.l. : IEEE, 2012, Vol. 7.
    42. Nimje, Anup R., V. T. Gaikwad, and H. N. Datir. "Attribute-Based Encryption Techniques in Cloud Computing Security: An Over-view." International Journal of Computer Trends and Technology (2013).Bonomi, Flavio, Rodolfo Milito, Preethi Natarajan, and Jiang Zhu. "Fog computing: A platform for internet of things and analytics." In Big data and internet of things: A roadmap for smart environments, pp. 169-186. Springer, Cham, 2014.
    43. Fugkeaw, Somchart, and Hiroyuki Sato. "An extended CP-ABE based Access control model for data outsourced in the cloud." In Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th Annual, vol. 3, pp. 73-78. IEEE, 2015.
    44. Yang, Kan, Xiaohua Jia, Kui Ren, Ruitao Xie, and Liusheng Huang. "Enabling efficient access control with dynamic policy updating for big data in the cloud." In INFOCOM, 2014 Proceedings IEEE, pp. 2013-2021. IEEE, 2014.
    45. Sherasiya, T. A. R. I. Q. A. H. M. A. D., Hardik Upadhyay, and Hiren B. Patel. "A survey: Intrusion detection system for internet of things." International Journal of Computer Science and Engineering (IJCSE) 1, no. 5 (2016): 81-90.
    46. Qiu, Meikang, Keke Gai, Bhavani Thuraisingham, Lixin Tao, and Hui Zhao. "Proactive user-centric secure data scheme using attrib-ute-based semantic access controls for mobile clouds in financial in-dustry." Future Generation Computer Systems 80 (2018): 421-429.
    47. Rahmani, Amir M., Tuan Nguyen Gia, Behailu Negash, Arman Anzanpour, Iman Azimi, Mingzhe Jiang, and Pasi Liljeberg. "Ex-ploiting smart e-health gateways at the edge of healthcare internet-of-things: a fog computing approach." Future Generation Computer Systems 78 (2018): 641-658.
    48. Thirumalai, Chandrasegar, and Himanshu Kar. "Memory Efficient Multi Key (MEMK) generation scheme for secure transportation of sensitive data over Cloud and IoT devices." In Power and Ad-vanced Computing Technologies (i-PACT), 2017 Innovations in, pp. 1-6. IEEE, 2017.
    49. Li, Jin, Yinghui Zhang, Xiaofeng Chen, and Yang Xiang. "Secure attribute-based data sharing for resource-limited users in cloud computing." Computers & Security 72 (2018): 1-12.
    50. Santhi, P., and R. Vaneeshwari. "Privacy Preserving and Consisten-cy Check Of Data Store in Cloud Using Attribute Based Encryp-tion.” International Journal of Engineering Development and Re-search (IJEDR) ,IJEDR | Volume 5, Issue 1 | ISSN: 2321-9939(2017).
    51. Surya Prabha.U.S1, Marikkannu.P2, Arul Vineeth.A.D3 "Cipher-text policy attribute set based encryption with one fold data access with cloud" 2249-7277 ISSN (online): 2277-7970) Volume-4 Num-ber-1 Issue-14 March-2014
    52. Cong Shi Jian Liu Hongbo Liu Yingying Chen "Smart User Au-thentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT " Mobihoc ’17, July, 2017, Chennai, India.
    53. Mohammad Saeid Mahdavinejad1, Mohammadreza Rezvan2, Mo-hammadamin Barekatain3, Peyman Adibi4, Payam Barnaghi5, Amit P. Sheth6 "Machine Learning for Internet of Things Data Analysis: A Survey" Journal of Digital Communications and Networks Octo-ber 9, 2017
    54. Kai Fan 1,*, Junxiong Wang 1, Xin Wang 1, Hui Li 1 and Yintang Yang 2 "A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing" Sensors 2017, 17, 1695; doi:10.3390/s17071695
    55. Ravula Arun Kumar 1 * Kambalapally Vinuthna 2 * "A Review on various secure data access schemes and techniques in Fog for Inter-net of Things" International Journal of Computer Sciences and En-gineering Vol. 6(1), Jan 2018, E-ISSN: 2347-2693.
  • Downloads

  • How to Cite

    Arun Kumar, R., & Vinuthna Kambalapally, D. (2026). A Study on Privacy Preservation Techniques and Scope of Applying Deep Learning Concepts in Security: a Survey. International Journal of Engineering and Technology, 7(3.27), 586-592. https://doi.org/10.14419/ijet.v7i3.27.18502