{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:13:03Z","timestamp":1769717583556,"version":"3.49.0"},"reference-count":25,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,7,2]]},"abstract":"<jats:p>Concerns of security as well as privacy are the chief obstacles which have prevented the public cloud\u2019s extensive adoption in Intel IT as well as across the industry. Generally, IT organizations are quite reluctant to store sensitive as well as valuable data in infrastructures which are out of their control. The technique of anonymization is employed by enterprises to raise the security of the public cloud\u2019s data whilst facilitating the data\u2019s analysis as well as application. The procedure of data anonymization will modify how the data is either employed or published in such a way that it will prevent the key information\u2019s identification. The privacy issues are addressed using k-anonymity. However, the issue of selecting the variables for anonymization and suppression of variables without the loss of knowledge is an optimization problem. To address the selection of variables for anonymization and suppression, metaheuristic algorithms are used. Diverse research groups have successfully utilized the River Formation Dynamics (RFD) metaheuristic to handle numerous problems of discrete combinatorial optimization. Even so, this metaheuristic has never been adapted for use in domains of continuous optimization. To mitigate the local minima problem, hybridization of the algorithms is proposed. In this work, a modified K-Anonymity technique\u2019s proposal has been given by using the Modified Hill Climbing (MHC) optimization, the RFD-MHC optimization, the RFD-PSO optimization, the RFD-MHC suppression as well as the RFD-PSO suppression. Furthermore, proposal for a suppression technique has also been given in this work. Experiments demonstrated that the RFD-PSO optimization has higher classification accuracy in the range of 6.73% to 8.55% when compared to manual K-anonymization. The work has also given better trade off for security analysis and data utility effectiveness.<\/jats:p>","DOI":"10.3233\/jifs-223509","type":"journal-article","created":{"date-parts":[[2023,5,19]],"date-time":"2023-05-19T12:23:53Z","timestamp":1684499033000},"page":"1497-1512","source":"Crossref","is-referenced-by-count":5,"title":["An intellectual optimization of k-anonymity model for efficient privacy preservation in cloud platform"],"prefix":"10.1177","volume":"45","author":[{"given":"S.","family":"Sakthivel","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, Sona College of Technology, Salem, India"}]},{"given":"N.","family":"Vinotha","sequence":"additional","affiliation":[{"name":"Information and Communication Engineering, Anna University, Chennai, India"}]}],"member":"179","reference":[{"issue":"1","key":"10.3233\/JIFS-223509_ref1","first-page":"012038","article-title":"Security and privacy issues in cloud computing","volume":"1979","author":"Alenizi","year":"2021","journal-title":"In Journal of Physics: Conference Series"},{"issue":"3","key":"10.3233\/JIFS-223509_ref3","first-page":"211","article-title":"Review of cryptography in cloud computing","volume":"9","author":"Zaineldeen","year":"2020","journal-title":"Int J Comput Sci Mobile Comput"},{"key":"10.3233\/JIFS-223509_ref4","unstructured":"Patil A.R. and Kodmelwar M.K. , Privacy preservation and anonymization of data in cloud computing, International Journal of Innovative Research in Science, Engineering and Technology (An ISO 3297:2007 Certified Organization) Website: www.ijirset.com 6(5) (2017)."},{"key":"10.3233\/JIFS-223509_ref5","unstructured":"Sakhar A. and Ganar S. , Anonymization: A method to protect sensitive data in cloud, International Journal of Scientific & Engineering Research 4(5) (2013)."},{"issue":"6","key":"10.3233\/JIFS-223509_ref6","first-page":"238","article-title":"A review on k-Anonymization techniques","volume":"5","author":"Tiwari","year":"2017","journal-title":"Scholars Journal of Engineering and Technology (SJET)"},{"key":"10.3233\/JIFS-223509_ref7","unstructured":"Kavitha S. , Sivaraman E. and Raja Vadhana P. , A suvery on k-anonymity generalization algorithms, Int J Adv Res Comput Commun Eng 2(11) (2014)."},{"key":"10.3233\/JIFS-223509_ref8","doi-asserted-by":"crossref","first-page":"101753","DOI":"10.1016\/j.cose.2020.101753","article-title":"Optimization-based k-anonymity algorithms","volume":"93","author":"Liang","year":"2020","journal-title":"Computers & Security"},{"key":"10.3233\/JIFS-223509_ref9","unstructured":"Sivadas S. and Sreekala R. , Data anonymization on mapreduce-cloud using optimized TPTDS, IJIRST \u2013International Journal for Innovative Research in Science & Technology 1(11) (2015)."},{"issue":"4","key":"10.3233\/JIFS-223509_ref11","doi-asserted-by":"crossref","first-page":"2425","DOI":"10.1007\/s13369-019-03999-0","article-title":"Adaptive K-anonymity approach for privacy preserving in cloud","volume":"45","author":"Arava","year":"2020","journal-title":"Arabian Journal for Science and Engineering"},{"key":"10.3233\/JIFS-223509_ref12","doi-asserted-by":"crossref","unstructured":"Luo Y. , Yang K. , Tang Q. , Zhang J. , Li P. and Qiu S. , An optimal data service providing framework in cloud radio access network, EURASIP J Wirel Commun Netw 23 (2016).","DOI":"10.1186\/s13638-015-0503-2"},{"issue":"4","key":"10.3233\/JIFS-223509_ref13","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.1109\/TSC.2018.2860022","article-title":"A game-based price bidding algorithm for multi-attribute cloud resource provision","volume":"14","author":"Hu","year":"2021","journal-title":"IEEE Trans Serv Comput"},{"issue":"2","key":"10.3233\/JIFS-223509_ref14","first-page":"393","article-title":"Big data service architecture: A survey","volume":"21","author":"Wang","year":"2020","journal-title":"Journal of Internet Technology"},{"issue":"4","key":"10.3233\/JIFS-223509_ref15","doi-asserted-by":"crossref","first-page":"919","DOI":"10.1109\/TPDS.2016.2603511","article-title":"A parallel random forest algorithm for big data in a spark cloud computing environment","volume":"28","author":"Chen","year":"2017","journal-title":"IEEE Trans Parallel Distributed Syst"},{"issue":"1","key":"10.3233\/JIFS-223509_ref16","first-page":"1","article-title":"Blockchain-based systems and applications: A survey","volume":"21","author":"Zhang","year":"2020","journal-title":"Journal of Internet Technology"},{"issue":"3","key":"10.3233\/JIFS-223509_ref17","doi-asserted-by":"crossref","first-page":"1939","DOI":"10.1109\/TII.2021.3082576","article-title":"Multiple strategies differential privacy on sparse tensor factorization for network traffic analysis in 5G","volume":"18","author":"Wang","year":"2022","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"7","key":"10.3233\/JIFS-223509_ref18","doi-asserted-by":"crossref","first-page":"4075","DOI":"10.1016\/j.jksuci.2021.04.014","article-title":"KAB: A new k-anonymity approach based on black hole algorithm","volume":"34","author":"Kacha","year":"2022","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"10.3233\/JIFS-223509_ref19","doi-asserted-by":"crossref","first-page":"103224","DOI":"10.1016\/j.jisa.2022.103224","article-title":"Fractional salp swarm algorithm: An association rule based privacy-preserving strategy for data sanitization","volume":"68","author":"Suma","year":"2022","journal-title":"Journal of Information Security and Applications"},{"issue":"9","key":"10.3233\/JIFS-223509_ref21","doi-asserted-by":"crossref","first-page":"1551","DOI":"10.3390\/sym12091551","article-title":"A new approach to identifying a multi-criteria decision model based on stochastic optimization techniques","volume":"12","author":"Kizielewicz","year":"2020","journal-title":"Symmetry"},{"key":"10.3233\/JIFS-223509_ref22","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.compgeo.2012.02.001","article-title":"Application of a Hill-Climbing technique to the formulation of a new cyclic nonlinear elastic constitutive model","volume":"43","author":"Taborda","year":"2012","journal-title":"Computers and Geotechnics"},{"issue":"10","key":"10.3233\/JIFS-223509_ref23","first-page":"79","article-title":"Security enhancement of health information exchange based on cloud computing system","volume":"4","author":"Bai","year":"2016","journal-title":"International Journal of Scientific Engineering and Research"},{"key":"10.3233\/JIFS-223509_ref24","first-page":"100614","article-title":"AI based elderly fall prediction system using wearable sensors: A smart home-care technology with IOT","volume":"25","author":"Kulurkar","year":"2023","journal-title":"Measurement: Sensors"},{"key":"10.3233\/JIFS-223509_ref25","doi-asserted-by":"crossref","first-page":"141","DOI":"10.4028\/www.scientific.net\/JERA.23.141","article-title":"A comprehensive review of Particle swarm optimization","volume":"23","author":"Benuwa","year":"2016","journal-title":"International Journal of Engineering Research in Africa"},{"issue":"12","key":"10.3233\/JIFS-223509_ref28","doi-asserted-by":"crossref","first-page":"1719","DOI":"10.1109\/TKDE.2007.190662","article-title":"Preventing location-based identity inference in anonymous spatial queries","volume":"19","author":"Kalnis","year":"2007","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"6","key":"10.3233\/JIFS-223509_ref31","doi-asserted-by":"crossref","first-page":"1755","DOI":"10.1007\/s11036-019-01379-4","article-title":"An attempt to design improved and fool proof safe distribution of personal healthcare records for cloud computing","volume":"24","author":"Preethi","year":"2019","journal-title":"Mobile Networks and Applications"},{"issue":"Preprint","key":"10.3233\/JIFS-223509_ref34","first-page":"1","article-title":"An effective digit recognition model using enhanced convolutional neural network based chaotic grey wolf optimization","author":"Preethi","year":"2021","journal-title":"Journal of Intelligent & Fuzzy Systems"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-223509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T08:19:40Z","timestamp":1769674780000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-223509"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,2]]},"references-count":25,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/jifs-223509","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,2]]}}}