{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:33:36Z","timestamp":1742384016053},"reference-count":32,"publisher":"Oxford University Press (OUP)","issue":"2","license":[{"start":{"date-parts":[[2019,11,17]],"date-time":"2019-11-17T00:00:00Z","timestamp":1573948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,2,19]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>This paper proposes a retrievable data perturbation model for overcoming the challenges in cloud computing. Initially, genetic whale optimization algorithm (genetic WOA) is developed by integrating genetic algorithm (GA) and WOA for generating the optimized secret key. Then, the input data and the optimized secret key are given to the Tracy\u2013Singh product-based model for transforming the original database into perturbed database. Finally, the perturbed database can be retrieved by the client, if and only if the client knows the secret key. The performance of the proposed model is analyzed using three databases, namely, chess, T10I4D100K and retail databases from the FIMI data set based on the performance metrics, privacy and utility. Also, the proposed model is compared with the existing methods, such as Retrievable General Additive Data Perturbation, GA and WOA, for the key values 128 and 256. For the key value 128, the proposed model has the better privacy and utility of 0.18 and 0.83 while using the chess database. For the key value 256, the proposed model has the better privacy and utility of 0.18 and 0.85, using retail database. From the analysis, it can be shown that the proposed model has better privacy and utility values than the existing models.<\/jats:p>","DOI":"10.1093\/comjnl\/bxz101","type":"journal-article","created":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T11:19:25Z","timestamp":1565954365000},"page":"239-253","source":"Crossref","is-referenced-by-count":4,"title":["Tracy\u2013Singh Product and Genetic Whale Optimization Algorithm for Retrievable Data Perturbation for Privacy Preserved Data Publishing in Cloud Computing"],"prefix":"10.1093","volume":"63","author":[{"given":"Thanga","family":"Revathi S","sequence":"first","affiliation":[{"name":"Assistant Professor, Department of Information Technology Rajalakshmi Engineering College Thandalam, Chennai, Tamil Nadu, India"}]},{"given":"N","family":"Ramaraj","sequence":"first","affiliation":[{"name":"Professor Electrical and Electronics Engineering Vignan University, Guntur Andhra Pradesh, India"}]},{"given":"S","family":"Chithra","sequence":"first","affiliation":[{"name":"Associate Professor Department of Information Technology SSN College of Engineering Kelambakkam, Chennai, India"}]}],"member":"286","published-online":{"date-parts":[[2019,11,17]]},"reference":[{"key":"2020021904592964900_ref1","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/S1005-8885(13)60113-2","article-title":"Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing","volume":"20","author":"Qin-long","year":"2013","journal-title":"J. China Univ. Posts Telecommunications"},{"key":"2020021904592964900_ref2","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.jpdc.2016.05.017","article-title":"A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications","volume":"99","author":"Song","year":"2016","journal-title":"J. Parallel Distrib. Comput."},{"key":"2020021904592964900_ref3","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TPDS.2013.45","article-title":"Privacy-preserving multi-keyword ranked search over encrypted cloud data","volume":"25","author":"Cao","year":"2014","journal-title":"IEEE Trans. Parallel. Distrib. Syst."},{"key":"2020021904592964900_ref4","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/CC.2014.6911090","article-title":"A retrievable data perturbation method used in privacy-preserving in cloud computing","volume":"11","author":"Pan","year":"2014","journal-title":"China Commun."},{"key":"2020021904592964900_ref5","first-page":"130","volume-title":"Proc. IEEE 8th Int. Conf. on Cloud Computing","author":"Palanisamy","year":"2015"},{"key":"2020021904592964900_ref6","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"k-anonymity: A model for protecting privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int. J. Uncertain. Fuzziness Knowledge-Based Systems"},{"key":"2020021904592964900_ref7","first-page":"595","volume-title":"Proc. IEEE\/ACM 8th Int. Conf. on Utility and Cloud Computing","author":"Komninos","year":"2015"},{"key":"2020021904592964900_ref8","first-page":"836","volume-title":"Proc. IEEE 10th Int. Conf. on P2P, Parallel, Grid, Cloud, and Internet Computing","author":"Jiang","year":"2015"},{"key":"2020021904592964900_ref9","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1631\/jzus.C1200240","article-title":"Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage","volume":"14","author":"Cheng","year":"2013","journal-title":"J. Zhejiang Univ. Sci. C"},{"key":"2020021904592964900_ref10","first-page":"79","volume-title":"Proc. 13th ACM Conf. on Computer and Communications Security (CCS '06)","author":"Curtmola","year":"2006"},{"key":"2020021904592964900_ref11","first-page":"28","volume-title":"Proc. IEEE Fourth Int. Conf. on Networked Computing and Advanced Information Management","author":"Lee","year":"2008"},{"key":"2020021904592964900_ref12","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.ins.2016.09.020","article-title":"Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms","volume":"387","author":"Yang","year":"2017","journal-title":"Inform. Sci."},{"key":"2020021904592964900_ref13","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1016\/j.future.2014.03.002","article-title":"PPFSCADA: Privacy preserving framework for SCADA data publishing","volume":"37","author":"Fahad","year":"2014","journal-title":"Future Gener. Comput. Syst."},{"key":"2020021904592964900_ref14","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/s11390-010-9333-1","article-title":"Privacy-preserving data sharing in cloud computing","volume":"25","author":"Wang","year":"2010","journal-title":"J. Comput. Sci. Technol."},{"key":"2020021904592964900_ref15","first-page":"152","volume-title":"Proc. IEEE Int. Conf. on Intelligent Data and Security (IDS)","author":"Hong","year":"2016"},{"key":"2020021904592964900_ref16","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/s10619-013-7122-x","article-title":"METAP: Revisiting privacy-preserving data publishing using secure devices","volume":"32","author":"Allard","year":"2014","journal-title":"Distrib. Parallel Databases"},{"key":"2020021904592964900_ref17","first-page":"1","article-title":"Intelligent information retrieval in data mining","volume":"3","author":"Singh","year":"2012","journal-title":"Int. J. Sci. Eng. Res."},{"key":"2020021904592964900_ref18","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1007\/s10115-010-0362-4","article-title":"Geometric data perturbation for privacy preserving outsourced data mining","volume":"29","author":"Chen","year":"2011","journal-title":"Knowl. Inf. Syst."},{"key":"2020021904592964900_ref19","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","article-title":"The whale optimization algorithm","volume":"95","author":"Mirjalili","year":"2016","journal-title":"Adv. Eng. Softw."},{"key":"2020021904592964900_ref20","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1007\/s40846-015-0088-6","article-title":"Data perturbation method based on contrast mapping for reversible privacy-preserving data mining","volume":"35","author":"Kao","year":"2015","journal-title":"J. Med. Biol. Eng."},{"key":"2020021904592964900_ref21","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1109\/TKDE.2012.251","article-title":"Building confidential and efficient query services in the cloud with RASP data perturbation","volume":"26","author":"Xu","year":"2014","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"2020021904592964900_ref22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/e20050373","article-title":"An efficient big data anonymization algorithm based on chaos and perturbation techniques","volume":"20","author":"Eyupoglu","year":"2018","journal-title":"Entropy"},{"key":"2020021904592964900_ref23","first-page":"834","article-title":"Implementation challenges involved in big data analytics","volume":"5","author":"Sangtani","year":"2016","journal-title":"Int. J. Eng. Sci. Res. Technol."},{"key":"2020021904592964900_ref24","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/j.future.2016.10.022","article-title":"Privacy and utility preserving data clustering for data anonymization and distribution on Hadoop","volume":"74","author":"Nayahi","year":"2017","journal-title":"Future Gener. Comput. Syst."},{"key":"2020021904592964900_ref25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jss.2016.07.006","article-title":"An improved genetic algorithm for task scheduling in the cloud environments using the priority queues: Formal verification, simulation, and statistical testing","volume":"124","author":"Keshanchia","year":"2017","journal-title":"J. Syst. Softw."},{"key":"2020021904592964900_ref26","first-page":"139","volume-title":"Proc. the Int. Conf. on Computing, Communication and Automation (ICCCA2017), Greater Noida, India","author":"Goswami","year":"2017"},{"key":"2020021904592964900_ref27","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/S0024-3795(98)10209-4","article-title":"Matrix results on the Khatri\u2013Rao and Tracy\u2013Singh products","volume":"289","author":"Liu","year":"1999","journal-title":"Linear Algebra Appl."},{"key":"2020021904592964900_ref28","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/j.cam.2003.10.010","article-title":"The Kronecker product and stochastic automata networks","volume":"167","author":"Langville","year":"2004","journal-title":"J. Comput. Appl. Math."},{"key":"2020021904592964900_ref29","volume-title":"Int. Conf. on Intelligent Systems and Knowledge Engineering (ISKE)","author":"Liu","year":"2016"},{"key":"2020021904592964900_ref30","volume-title":"8th Int. Conf. on Modelling, Identification and Control, Algiers, Algeria","author":"Bentouati","year":"2016"},{"key":"2020021904592964900_ref31","doi-asserted-by":"crossref","first-page":"3528","DOI":"10.1109\/TC.2015.2409857","article-title":"Phase-change memory optimization for green cloud with genetic algorithm","volume":"64","author":"Qiu","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"2020021904592964900_ref32","author":"Frequent Itemset Mining Dataset Repository"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/63\/2\/239\/32519419\/bxz101.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/63\/2\/239\/32519419\/bxz101.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,19]],"date-time":"2020-02-19T10:00:00Z","timestamp":1582106400000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/63\/2\/239\/5618959"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,17]]},"references-count":32,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2019,11,17]]},"published-print":{"date-parts":[[2020,2,19]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxz101","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2020,2]]},"published":{"date-parts":[[2019,11,17]]}}}