• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    High Security for De-Duplicated Big Data Using Optimal SIMON Cipher

    2021-12-16 07:50:20MuthumariBanumathiRajasekaranVijayakarthikShankarIrinaPustokhinaandDenisPustokhin
    Computers Materials&Continua 2021年5期

    A.Muthumari,J.Banumathi,S.Rajasekaran,P.Vijayakarthik,K.Shankar,Irina V.Pustokhinaand Denis A.Pustokhin

    1Department of Computer Science and Engineering,University College of Engineering,Ramanathapuram,623513,India

    2Department of Information Technology,University College of Engineering,Nagercoil,629004,India

    3Department of EEE,PSN College of Engineering(Anna University),Tirunelveli,627152,India

    4Department of Information Science and Engineering,Sir M.Visvesvaraya Institute of Technology,Bangalore,56215,India

    5Department of Computer Applications,Alagappa University,Karaikudi,63003,India

    6Department of Entrepreneurship and Logistics,Plekhanov Russian University of Economics,Moscow,117997,Russia

    7Department of Logistics,State University of Management,Moscow,109542,Russia

    Abstract:Cloud computing offers internet location-based affordable,scalable,and independent services.Cloud computing is a promising and a cost-effective approach that supports big data analytics and advanced applications in the event of forced business continuity events,for instance,pandemic situations.To handle massive information,clusters of servers are required to assist the equipment which enables streamlining the widespread quantity of data,with elevated velocity and modified configurations.Data deduplication model enables cloud users to efficiently manage their cloud storage space by getting rid of redundant data stored in the server.Data deduplication also saves network bandwidth.In this paper,a new cloud-based big data security technique utilizing dual encryption is proposed.The clustering model is utilized to analyze the Deduplication process hash function.Multi kernel Fuzzy C means (MKFCM) was used which helps cluster the data stored in cloud,on the basis of confidence data encryption procedure.The confidence finest data is implemented in homomorphic encryption data wherein the Optimal SIMON Cipher(OSC)technique is used.This security process involving dual encryption with the optimization model develops the productivity mechanism.In this paper,the excellence of the technique was confirmed by comparing the proposed technique with other encryption and clustering techniques.The results proved that the proposed technique achieved maximum accuracy and minimum encryption time.

    Keywords:Cloud security;deduplication;clustering;optimization;big data;dual encryption

    1 Introduction

    Cloud computing has become a challenging platform nowadays which raises a considerable impact on the Information Technology (IT) industry and community activities [1].Cloud computing applications provide services in addition to internet,and enable programming datacenters to render those services [2].Moreover,cloud computing is a colossal system of computers combined together as a single computer.The size of cloud computing is developing and increasing in a consistent manner over the years.In any case,cloud computing possesses several advantages such as cost savings,economically efficient operations,improved collaboration,increase in scale and readiness by empowering worldwide computing representation and internet infrastructure [3].There are different kinds of cloud storages based on accessibility,funds,scalability,and so on.Global nations have begun transitioning important information to cloud storage space owing to their improved security.With increasing patterns observed in data age rates,it is a monotonous errand that is intended for the storage of cloud suppliers to provide well-organized capacity [4].Cloud computing is a promising and a cost-effective approach that supports big data analytics and advanced applications in the event of forced business continuity events,for instance,pandemic situations.To handle massive information,clusters of servers are required to assist the equipment which enables streamlining the widespread quantity of data,with elevated velocity and modified configurations.Security is the major challenge in the concept of cloud-based big data analytics [5].

    Cloud data safety should be guaranteed and the readiness of servers to get upgraded for huge storage zones in an organization is important,especially using data encryption techniques.However,a major problem is that servers cannot store important information in reduplication technique when there is excess of encrypted data [6].In this regard,the use of Deduplication process securely completes data encryption in cloud.This is a benchmark task to be accomplished in cloud.Data deduplication technique is modernized as a straightforward storage optimization technique in secondary servers [7].Google Drive,Amazon S3 and Dropbox,are different storage suppliers who utilize data deduplication process.To accomplish upgradability,encryption is performed to save general information towards secure deduplication [8].Advanced capacity and guaranteed security are the requirements of encryption and deduplication techniques [9,10].

    In this paper,cloud big data security is proposed using dual encryption technique.The study uses clustering model to analyze the deduplication process hash function.Multi kernel Fuzzy C Means (MKFCM) helps cluster data,which is then stored in cloud on the basis of confidence data encryption procedure.Then,the confidence finest data is implemented in homomorphic encryption data by following SIMON Cipher (OSC) technique.This secure dual encryption technique combining the optimization model enhances the presentation.Finally,the findings of the work are compared with other encryption and clustering techniques.

    2 Literature Review

    Venila et al.[11]studied Map-Reduce structure for safeguarding big data security in cloud.Some methods utilize restricted footage anonymization to support privacy.Information is processed in alignment with examination,sharing,and mining.The review article focused on global footage anonymization to secure data privacy over Big Data using Map Reduce under cloud.This strategy replaced the individual detectors of composed data sensor,by confusing the values prior to saving it as a recognized storage.

    Celcia et al.[12]analyzed multiple intermediate datasets which are utilized to capture the engendering of private and delicate data among other data sets.Privacy leakage of these intermediate data sets was measured.By considering the importance of data holder’s privacy,the upper bound constraint of the privacy leakage was determined.This research work handled big datasets.The authors encrypted the data as the study exposed the cost of safeguarding privacy in cloud,if privacy is severely breached.

    Sookhak et al.[13]examined Remote Data Auditing (RDA) techniques.The local data storage capacity reduced and the data was stored in cloud servers.For cloud storage mechanism,an efficient RDA method is required as per algebraic properties with communication and low computational costs.Furthermore,Divide-and-Conquer Table (DCT) can hold dynamic data processes including deletion,alterations,embedding and addition of the data.The scale data storage expense connects the proposed data structure with low computational cost.

    Miao et al.[14]proposed the most proficient method to outline Deduplication mechanism that opposes savage power assault.The method minimized ‘put stock’in supposition of Key Server(KS),a multiple-key server mechanism.This mechanism was introduced according to the basic principles of sightless signature threshold.The study conducted upon security demonstrated that the proposed scheme was secure with respect to future safety display as the scheme was able to oppose the beast force attack,regardless of the possibility that a set key server’s quantity may get tainted.On the off chance,a secret input could be spilled upon stipulation which results in the corruption of all K-CSPs.Along these lines,the system is able to give an additional grounded security and it can efficiently oppose a disconnected animal force assault.

    A message-locked encryption model,termed as block-level message-locked encryption,was proposed by few researchers.The excess of metadata storage space is block-labeled from encapsulated block keys.For block label comparison,a huge computation was performed on the overhead by BL-MLE [15].The content-characterized chunking and bloom filter technologies incorporate a secure,comparability-based data deduplication method.This method was able to reduce computation overhead.In the presence of comparative documents,deduplication operations were performed that can minimize the computation overhead.While establishing comparative computation overhead,coveted security objectives were accomplished by the model with excellent performance assessments.

    Cloud-of-Clouds is a deduplication-assisted essential storage model [16].Deletion code and replication schemes were combined to form multiple cloud storage suppliers in DAC and the data blocks were stored.Both deletion and replication code mechanisms exhibited more benefits and reference characteristics with novelty.The data block was stored using eradication code mechanism with highly referenced data blocks.Performance enhanced via DAC whereas lightweight model execution of DAC was demonstrated and compared with current schemes to achieve low cost.

    Pietro et al.[17]proposed a model to overcome data security issues and deduplication.The authors introduced a narrative Ownership (POW) system proof using all the highlights in cuttingedge arrangement with just a fraction of its overhead.The scheme demonstrated the proposed security method on the basis of hypothetical data,as opposed to suspicious computation.Further,feasible optimization methods were also suggested to enhance the performance.At last,the superiority of the proposed method was established using broad benchmarking.

    3 Problem Identification

    ? Cloud Service Provider (CSP) gives service storage and it cannot be relied upon completely as the substance of accumulated information is of interest for many.At the same time,it needs to perform genuinely on data storage in a sequential manner and increase business benefits.

    ? Incompetence and poor scalability result from conventional privacy storage with huge data sets.

    ? Conventional privacy protection schemes could not tackle everything rather than focus on a single issue only;especially when it comes to security and privacy aspects,the schemes were unrealistic.Custom-made privacy safeguarding schemes are cost-incurring and are difficult to actualize.

    ? Reducing the computational load in the set of directors and achieving frivolous authenticator cohort serves are major problems.

    ? The research works conducted earlier carried out M-clustering process manually which also had mismatch of information.Simultaneously,both privacy of information and security are compromised in conventional methods.

    4 Proposed Work

    The main aim of the proposed model is to store big datasets in cloud under high security.In this work,various approaches are utilized by producing Deduplication dataset with data encryption and decryption processes.In the beginning,the dataset is encrypted using a mapper to make a key.Then the mapper forms the dataset as groups,which feeds the data into duplication form according to matching score value.The process of deduplication restricts multiple entries or repetitive data.Deduplication stages are completed according to the amount of issue.Subsequently,these datasets are subjected to clustering.In this process,MFCM is utilized to cluster the data which allows a data to be robust via double or more groups.These clustered data are then encrypted through dual encryption,i.e.,homomorphic and SIMON Cipher (OSC).For data decryption,the encrypted data is securely accessed since the approved information holders can get the data with the help of symmetric keys.To enhance the presentation of SIMON cipher,Modified Krill Herd Optimization (KHO) method is utilized.The Modified KHO method builds the encrypted key and provides the most significant privacy-preserved information.Again,when a value is equivalent to or more prominent by threshold value,the production is encouraged in the direction of minimizer.The information is then stored in cloud server using a reducer.The proposed technique is shown in Fig.1.The proposed model provides high security and is wellorganized.The security aspects of the model are appropriate for vast data Deduplication.The proposed big data security is described in-depth in the following sections.

    4.1 Map-Reduce(MR)Framework

    Map-Reduce system is utilized for big data analytics across different servers.Map-Reduce algorithm includes two significant responsibilities which are mentioned herewith.

    Map phase:In this segment,soil data is obtained as input and divided into every map task and M Map task executes the comparable data.

    Reduced phase:In this segment,soil data is clustered and separated from preceding segment using Standard Component Analysis (SCA).Secondly,the final aim obtains the output alike input map and unites those data tuples into light group of tuples.Fig.2 shows the general model of map-reduce structure.Data reduction process consists of four elements,which include:

    Input:Database involved

    Map:Data sorting and filtering

    Reduction:Similarity and missing values are redistributed to the mapped data.

    Output:Information reduction

    For most of the part,catalog is the outcome desired by Map-Reduce clients to acquire.Map and functions’reduction are specified by clients,based on particular applications.

    Figure 1:The block diagram for proposed high-security data in cloud

    4.2 Data Deduplication Model

    Data de-duplication is an optimization process which is used to eliminate specific excess data.In this process,every data proprietor is chosen and similar data is transferred.Then,a particular copy of duplicate data is shared,whereas the duplicate copies in the storage are expelled.Data deduplication basically refers to the storage of present data on the disk by a marvel that supersedes indistinct data in a record or identical locales of the document (comparable data).This cloud data deduplication process is performed using a hash function.In this process,the initial document is used first after which the pre-processed data is utilized to create the confirmed data.Data duplication occurs when the data carrier saves similar data which is already saved on CSP as shown in Fig.3.

    Hash-based data de-duplication strategies utilize a hashing algorithm to distinguish ‘large piece’of information.Deduplication process evacuates not-so-special blocks.The actual process of data deduplication can be executed in a number of distinctive ways.Duplicate data is basically disposed by comparing two documents and finalizing on one established dataset,so that the other dataset,which is of no use further,is erased.Either variable or fixed length hash-based de-duplication breaks’data gives the ‘chunks [18]’in which the hashing algorithm with ‘chunk’procedure creates the hash.On the off chance,in new hash,the data is considered duplicate and does not get saved.The hash never lives at that point,whereas the stored data and hash list are refreshed by means of a novel hash.

    Figure 2:The flow diagram for map reduce framework

    Figure 3:Data deduplication model

    4.3 Multi Kernel Clustering Model for De-Duplicated Data

    Clustering systems are one of the element invalid systems which are processed in forward direction.Clustering systems are main element in invalid systems that can be operated to position the feature in resemblance beam,among the data substance personalities.The presentation in verification procedure is developed and this clustering procedure is based on the aspect of stoppage.

    Standard FCM Model

    Hard C-means algorithm provides object classification and image area clustering by fuzzy C-means clustering algorithm.The minimization of criterion function is the fundamental element in fuzzy C-means clustering alike hard K-means algorithm.The following equation explains the transformation of goal task.

    where,the real numbermis higher than one.At clusterxi,the degree of membership is.The d-dimension-measured information isj.

    Steps for FCM

    1) Initialize the duplicated data cluster centers.

    2) Determine D-distance among cluster centers and data using the equation given below:

    3) Compute the function of fuzzy membershipuijusing the equation given below:

    4) Based on membership function,calculate fuzzy centers or centroid as:

    Using FCM algorithm,the number of completed iterations is determined to understand the degree of membership correctness.

    4.3.1 Multi Kernel FCM(MKFCM)Model

    In the proposed duplicated data clustering process,multiple kernels are considered,i.e.,Gaussian model-based Kernels such as K1 and K2.The projected multiple kernel fuzzy c-means(MKFCM) algorithm simultaneously finds the best degree of participation and ideal kernel weights for no-negative combination of kernels’arrangement.The objective function of MKFCM is shown in the condition given herewith.

    Kernel Functions ?

    In the above equation,xi→Mean value of Neighbor duplicated data andσ→Variance of total duplicated data and finally the centroid equation as follows:

    By replacing the Euclidean distance,diverse kernels can be chosen in support of various situations.For clustering,appropriate Gaussian kernel is essential whereas the cloud stores the clustered data towards privacy or security procedures.

    4.4 Dual Encryption Representation for Big Data Privacy

    For process improvements,dual encryption is considered in the procedure involving big data security.Private information is decided in the direction of second-hand certification procedure in the result to encrypt the information.At present,homomorphic encryption strategy is initialized;however the same strategy is misused after second stage procedure.However,the encrypted information is present in excess effort to OSC process.

    4.4.1 Homomorphic Encryption(HE)

    Without knowing the private key,the encrypted data operation is executed by utilizing Homomorphic Encryption framework.Here,the secret key holder is a client [19].The calculation for encrypted information is performed with Homomorphic Encryption model,due to data shortage.When a client decrypts the process given below,it explains the layout of encryption.

    Steps for HE

    Four functions are present in Homomorphic Encryption procedures.

    H={Decryption,Encryption,Evaluation,Key Generation}

    Step 1:Key Generation:KeyGen(i,j)

    Step 2:Select double huge prime numbersiandjrandomly and computek=ij.Step 3:Encryption:Enc(u,Pk)

    Step 4:Compute ciphertextc=iu·rkmodk2∴c∈Zk2.

    Step 5:Decryption:Enc(c,Sk)

    Step 6:Assumecis a cipher text towards decrypt wherec∈.

    This technique yields similar outcomes after calculation,which it would have acquired,if the technique worked directly on crude information.These encryptions enable complex processes to execute on encrypted information,without compromising the encryption.

    4.4.2 SIMON Ciphers

    When the hardware is connected,lightweight block cipher is executed according to effective hash work.Varying structures of cipher family consist of low functions with various key sizes and block sizes.According to image pixels,every block and its key differ with the estimation of 16 block events that vary in the range of 32 to 128 bits.The cipher content blocks are brought to execute an event on plain text with fixed block size.

    Characteristics of SIMON Cipher

    ? Because of security examinations,SIMON cipher comprises of nonlinear attributes which get directed in block data and size.One can think about a tree in which the differences can be utilized in fixed input.Few conceivable output differences are produced at each round with distinction.

    ? A solid structure of round capacity is exploited by one,thereby considering the basic attributes that are prolonged with more rounds on the rotten possibility.

    ? The key scheduled properties are killed with SIMON key calendars by employing round consistency and pixel quantity with regards to images.

    ? Based on lightweight block cipher,single key differential and singular key differential trademarks were found to be 15-round SIMON48.

    The block cipher qualities are intended to be excellent.A minimum number of active Sboxes are ensured with quality,since the number finalizes the optimizer which in turn yields the optimum solution.

    4.5 Designing Model

    In wireless networks,cipher model is executed as DI security.There are some conditions associated with the model,such as decryption,encryption models,round and bit.The size {16 to 64} is represented using 2n-bit blocks with SIMON cipher.The following equation explains the same in detail.

    ‘Round functions’are the functions of ciphers,≤i≤qand round keys are respective keys.The cipher is selected as the modified iterated block cipher to check,whether the functions are identical.

    Round configuration:The round function utilizes 128-bit of plaintext as inputs in SIMON block cipher.In 68 rounds,the 128-bit cipher messages are produced with 128-bit key.The following steps explain the SIMON encryption operations.

    ? Two arbitrary bits of n-bit words perform the Bitwise AND activity.

    ? The bitwise AND task performs the activity of Bitwise XOR.One arbitrary is XOR-ed with the final value.

    ? Where,rotation count is y by means ofSy(x)in bitwise revolution ROL.

    The following equation explains SIMON round capacity for encryption.

    Eq.(11) describes the image information with the help of inverse function.

    From Eq.(11),the left-most word iswl,i.e.,given block.The correct round key iskroundand the right-most word iswr.

    4.5.1 Key Generation

    Each round key produces a key expansion of SIMON cipher from the master.From initial 128-bit master key,a total of 44 32-bit sized round keys is generated by the selected SIMON64/128 configuration.The previously savednround of keys consolidate the given round,i.The activities are accompanied via key expansion.

    To signifya⊕bas bitwise XOR.

    where c is the rotation count which denotess?c(a),as of right bitwise rotation ROR.

    Eq.(12) explains the function of key expansion.

    4.5.2 Key Optimization Model

    The key optimization process in SIMON utilizes Krill Herd Optimization (KHO) method [20].For example,two principle objectives are present in KHO process such as reaching sustenance and increasing krill thickness.The identification of nourishment and thickness expansion are conducted via crowding.The other mutation process,crossover,random diffusion,foraging activity and krill individual altogether induce the movement as the elements of KHO.

    i.Objective function for OSC

    During decryption process with key K,minimum number data is retrieved as the fitness function.Multiple key sets in TDES process generate the initial solution and the condition is satisfied using an optimal key.

    ii.New keys updating process

    The discretionary dimensionality enables search by realizing an optimization algorithm.The n-dimensional decision space is used to sum-up the Lagrangian method.

    Hence,the ith krill individuals are with physical diffusion,Pi.Krill individuals induce the motion,Miand foraging motion,Ai.

    i.Movement induced by other krill individuals

    The local impact or area swarm thickness settles the course of movement of a krill individual in the advancement.The unpleasant swarm thickness and the objective swarm thickness are explained below:

    The representation ofImaxclarifies the documentations in above conditions as the huge rate.The movement,instigated by idleness weightωn,tends to be [0,1].

    ii.Foraging motion

    Two effective parameters are used to figure out a similar scavenging development.The past experience is secondary one,while the initial sentence is the third.Atith krill individual,this development is communicated.

    where,the scavenging velocity is denoted byFmand the searching movement of dormancy weight isωmwhich tends to be [0,1].The best fitness of krill impact isand also the nourishment appealing is.The searching rate calculation is deliberated to 0.02 (ms-1).

    iii.Physical diffusion

    Physical spread,with krill persons,is believed to be a sporadic procedure.This establishment expresses the degree so as to be a majority disgraceful scattering speed along with an uneven directional vector.

    Here,the maximum diffusion speed isDmax.D is the random vector to random values[?1,1].

    iv.Crossover and mutation

    For overall enhancement,the part of GA utilizes the crossover administrator as a suitable procedure.The mutation likelihood (Mr) manages the mutation.

    For global best,the mutation probability which utilizes new mutation probability is equivalent to zero.When the fitness value decreases,the global best increases.

    Optimal keys are known to be 64 bits long,which are recognized in support of their compatibility whereas the adaptability is transferred in support of SIMON cipher.The anticipated technique encrypts the information to store in the cloud.

    4.6 Cloud Storage Process

    In view of the above dual encryption,the input duplicated information is encrypted.After encryption,the document is stored in the cloud which gains a structure with genuine client.Due to the secure double encryption mechanism,the confidentiality of information cannot be inferred directly.The legitimate message authentication or substantial signature is never produced with the advantage of proposed strategy.

    5 Result

    The proposed work with clustering model and double encryption was implemented using Java with JDK 1.7.0.The operation framework stage consisted of 1.6 GHz,4 GB RAM with Intel(R) Core i5 processor configuration in Windows 10 operating system.The datasets,with different medical information,were used via Map-Reduce structure in cloud condition.The following section explains the database and comparative investigation.

    5.1 Database Description

    From UCI machine learning repository,the big data security procedure was validated by checking the medical database.In total,the maximum size of databases was 1,000,000 including breast cancer and Switzerland databases.Tab.1 provides the details of the dataset employed.

    Switzerland database:There were 76 traits present in the database and 14 subsets were utilized by means of distributed assessment.Particularly,ML researchers utilized a special case of database.The presence of coronary heart disease is referred to ‘objective’field alludes.

    Breast cancer database:Dr.Wolberg reported that the sampled clinical cases turned up periodically.The chronological information was gathered according to the database.

    Table 1:Combined database

    5.2 Proposed Technique(MKFCM-OSC)for Time And Memory Analysis

    Tabs.2 and 3 show time and memory analyses for the applied Switzerland and breast cancer databases and a combination of both,using the proposed method.The time and memory analysis,displayed in Tab.1,used a combination of databases to support dissimilar file size in terms of MegaBytes (MB).The table clearly shows the time taken for data execution and the time taken to decrypt and encrypt the known information in a secure manner.Moreover,the decrypted data got stored in the cloud through memory allocation,with regards to file size.When a file was considered weighing 5 MB,the execution,encryption and decryption times were 621028,18256 and 16235 ms respectively.Further,the memory allocation for 5 MB file size was 1768525 bits.Similarly,time and memory analyses of Switzerland database and breast cancer database are demonstrated in Tabs.2 and 3.

    Table 2:Switzerland database

    Table 3:Breast cancer database.

    Fig.4 explains the proposed and existing techniques with respect to encryption time analysis.Encryption time analysis,with number of mappers,segregates the big data.The proposed MKFCM approaches yielded better results than previous Fuzzy C means (FCM) techniques.The encryption time was analyzed corresponding to various amount of mappers such as 5,10,15,20 and 25.For the mapper 15,the encryption time for FCM was 12000 ms and for MKFCM,it was 12500 ms.Compared to existing techniques,the time used for data encryption was high in MKFCM technique.

    Figure 4:Encryption time analysis

    5.3 Duplicated Data Analysis

    Tab.4 shows the duplicated data for Switzerland data and Breast cancer data.The proposed Hash function-based framework accepted ‘contribution’as a document and transferred the data in an encrypted shape.After this,the proposed framework checked the data for duplication in whole big data.The table demonstrates the percentage investigation of duplicated data for both Hash function and Authorized Party-based approach.When Switzerland data was utilized,the proposed Hash function achieved 44.65% duplicated data,a value low than the current approved collection strategy.In breast cancer database,the proposed technique accomplished 44.74% duplicated data from 1MB document measure.Further,the percentage of duplicated data was investigated for 2,3,4 and 5 MB data as well.

    Table 4:Percentage of duplicated data for the proposed technique

    5.4 Analysis of Clustering Techniques

    The accuracy analysis of clustering techniques such as FCM and MKFCM for Switzerland database is shown in Fig.5.The graph clearly depicts the accuracy of clustering approaches for different file sizes such as 1,2,3,4 and 5 MB.For 1 MB file size,the proposed MKFCM achieved 84.76% accuracy,while the existing FCM accomplished 82.72% accuracy.For 2 MB file size,the proposed MKFCM achieved 85.56% accuracy,while FCM accomplished 83.62% accuracy.Similarly,the accuracy was analyzed for the file sizes such as 3,4,and 5 MB.The graphical representation reveals that the proposed technique achieved maximum accuracy compared to existing clustering techniques.

    Figure 5:Comparative analysis of Switzerland database

    Fig.6 compares the analysis of clustering techniques such as FCM and MKFCM in which the breast cancer database was used.The graph clearly depicts the accuracy of clustering approaches for different file sizes such as 1,2,3,4 and 5 MB.For 1 MB file size,the proposed MKFCM achieved 84.06% accuracy,while the existing FCM accomplished 82.98% accuracy.For 2MB file size,the proposed MKFCM achieved 85.36% accuracy and the FCM accomplished 84.22% accuracy.Similarly,the accuracy was analyzed for file sizes such as 3,4,and 5 MB.From the graphical representation,it can be concluded that the proposed technique accomplished maximum accuracy in breast cancer database compared to existing clustering techniques.

    5.5 Comparison of Encryption Techniques

    Fig.7 demonstrates the comparative examination of various encryption techniques such as Triple Data Encryption Standard (TDES),Advanced Encryption Standard (AES),Data Encryption Standard (DES),Homomorphic Encryption (HE) and OSC.For security reasons,double encrypted big data was considered in association with the optimization model.Further,the selfassurance optimized data executed the Homomorphic Encryption technique to encrypt data by OSC and stored the encrypted data in cloud.A graph was plotted based on time taken for encrypting the data vs.diverse record measures.For 1 MB record measure,AES took 8000 ms for encrypting the data.Similarly,DES took 7500 ms,TDES took 7600 ms,HE consumed 8200 ms and the proposed OTDES took 7200 ms to encrypt the data.To conclude,the proposed OSC accomplished the least time for encrypting big data compared to other encryption processes.

    Figure 6:Comparative analysis of breast cancer database

    Figure 7:Comparative analysis of different encryption techniques

    6 Conclusion

    The proposed de-duplication method on encrypted big data in cloud computing was analyzed by optimal double encryption approach.The framework reduced the measure of capacity required by the cloud service providers.Notwithstanding the double encryption technique,de-duplication process was proposed in which the hash function was used to transfer the data in an encrypted format.After this,data duplication was checked and other functions such as modification,deletion,and de-duplication of the data were performed.De-duplication process expelled the repetitive blocks.Here,MKFCM clustering model was used to analyze the de-duplication process.MKFCM algorithm identified the best degree of participation and ideal kernel weights for non-negative combination of arrangement of bits.The key optimization process was accomplished by OSC during when the KHO technique was used.In view of the above processes,the proposed technique encrypted the data and stored the data on cloud.The findings of the study infer that the proposed double encryption scheme ensured enhanced the authentication accuracy and security compared to other techniques.However,the authors recommend future researchers to improve the performance of the proposed model using lightweight cryptographic techniques.

    Funding Statement:The author(s) received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflict of interest to report regarding the present study.

    欧美一区二区精品小视频在线| 成人国产一区最新在线观看| 天堂影院成人在线观看| 视频区欧美日本亚洲| 免费看a级黄色片| 欧美一区二区精品小视频在线| 亚洲色图av天堂| 国产探花在线观看一区二区| 亚洲五月婷婷丁香| 母亲3免费完整高清在线观看| 麻豆国产97在线/欧美| 村上凉子中文字幕在线| 欧美日韩精品网址| 91老司机精品| 国产成人一区二区三区免费视频网站| 亚洲av免费在线观看| 男人舔奶头视频| 成人高潮视频无遮挡免费网站| 亚洲在线自拍视频| 在线看三级毛片| 黄片大片在线免费观看| 一夜夜www| 久久这里只有精品中国| 成人国产一区最新在线观看| 国产精品98久久久久久宅男小说| 欧美最黄视频在线播放免费| 美女高潮的动态| 毛片女人毛片| 真人一进一出gif抽搐免费| 中国美女看黄片| 夜夜爽天天搞| 国产精品精品国产色婷婷| 亚洲熟妇熟女久久| 久久天堂一区二区三区四区| 国产一区二区三区视频了| 岛国在线观看网站| 国产成+人综合+亚洲专区| 亚洲avbb在线观看| 男女视频在线观看网站免费| 国产高清激情床上av| 国产三级中文精品| 国产高潮美女av| 亚洲中文字幕一区二区三区有码在线看 | 19禁男女啪啪无遮挡网站| 国产又色又爽无遮挡免费看| 巨乳人妻的诱惑在线观看| 亚洲自拍偷在线| 嫩草影视91久久| 99久久久亚洲精品蜜臀av| 精品福利观看| 搞女人的毛片| 国产精品一区二区三区四区免费观看 | 无限看片的www在线观看| 亚洲人成电影免费在线| 99在线人妻在线中文字幕| 免费一级毛片在线播放高清视频| bbb黄色大片| 亚洲黑人精品在线| 久久人人精品亚洲av| 精品欧美国产一区二区三| 久久九九热精品免费| 欧美日韩一级在线毛片| 成年人黄色毛片网站| 精品一区二区三区视频在线 | 久久精品影院6| 老汉色av国产亚洲站长工具| 国产亚洲欧美在线一区二区| 哪里可以看免费的av片| 亚洲av日韩精品久久久久久密| 国产午夜精品久久久久久| 麻豆国产97在线/欧美| 嫩草影院精品99| 91av网站免费观看| 日韩高清综合在线| 亚洲人成电影免费在线| 欧美3d第一页| 成年女人毛片免费观看观看9| 桃色一区二区三区在线观看| 日本撒尿小便嘘嘘汇集6| 色综合欧美亚洲国产小说| 熟女少妇亚洲综合色aaa.| 一本一本综合久久| 国产精品女同一区二区软件 | 国产综合懂色| 国产精品久久久久久精品电影| 日韩精品青青久久久久久| 最好的美女福利视频网| 午夜福利在线在线| 天天躁狠狠躁夜夜躁狠狠躁| 久久人人精品亚洲av| 他把我摸到了高潮在线观看| 免费高清视频大片| 国产一区二区在线av高清观看| 视频区欧美日本亚洲| 中亚洲国语对白在线视频| 国产真实乱freesex| 无人区码免费观看不卡| 久久性视频一级片| 99在线视频只有这里精品首页| 国产成人一区二区三区免费视频网站| avwww免费| 五月玫瑰六月丁香| 美女黄网站色视频| 久久香蕉国产精品| 精品国产乱码久久久久久男人| 亚洲精品美女久久av网站| 免费观看人在逋| 国产午夜精品久久久久久| 97超视频在线观看视频| 女人高潮潮喷娇喘18禁视频| 嫩草影视91久久| 亚洲乱码一区二区免费版| 国产极品精品免费视频能看的| 国产亚洲精品一区二区www| 中文字幕av在线有码专区| 九色国产91popny在线| 国产成人精品久久二区二区91| 九九热线精品视视频播放| 99视频精品全部免费 在线 | 特大巨黑吊av在线直播| 嫁个100分男人电影在线观看| 欧美日韩乱码在线| АⅤ资源中文在线天堂| 亚洲国产欧美人成| 久久99热这里只有精品18| 国产av在哪里看| 亚洲午夜精品一区,二区,三区| 变态另类成人亚洲欧美熟女| 搡老熟女国产l中国老女人| 久久久久精品国产欧美久久久| 亚洲欧美激情综合另类| 三级毛片av免费| e午夜精品久久久久久久| 看免费av毛片| 毛片女人毛片| 精品久久久久久久久久免费视频| 曰老女人黄片| 国产一区在线观看成人免费| 精品久久久久久久末码| 成人三级做爰电影| 亚洲国产精品合色在线| 99精品欧美一区二区三区四区| 亚洲精品中文字幕一二三四区| 国产成人啪精品午夜网站| 亚洲av片天天在线观看| 国内少妇人妻偷人精品xxx网站 | 日韩欧美国产在线观看| 超碰成人久久| 国产三级在线视频| 成在线人永久免费视频| 久久伊人香网站| 色老头精品视频在线观看| 久久精品人妻少妇| 夜夜爽天天搞| 精品日产1卡2卡| 国产精品1区2区在线观看.| 少妇丰满av| 性色av乱码一区二区三区2| 精品久久久久久久久久久久久| 亚洲午夜精品一区,二区,三区| 少妇人妻一区二区三区视频| 免费看十八禁软件| 国产在线精品亚洲第一网站| 日韩中文字幕欧美一区二区| 黄频高清免费视频| 夜夜夜夜夜久久久久| 免费在线观看视频国产中文字幕亚洲| av国产免费在线观看| 亚洲av日韩精品久久久久久密| 国产v大片淫在线免费观看| 9191精品国产免费久久| 精品一区二区三区视频在线观看免费| 亚洲九九香蕉| 欧美成人免费av一区二区三区| 熟女电影av网| 亚洲18禁久久av| 久久久久国内视频| 亚洲中文日韩欧美视频| 99视频精品全部免费 在线 | www日本在线高清视频| 九九久久精品国产亚洲av麻豆 | 亚洲天堂国产精品一区在线| 亚洲成人精品中文字幕电影| 国产精品av久久久久免费| 欧美丝袜亚洲另类 | 在线看三级毛片| 亚洲av成人一区二区三| 波多野结衣高清无吗| 久久精品影院6| 久久午夜亚洲精品久久| 看黄色毛片网站| 亚洲片人在线观看| 后天国语完整版免费观看| 韩国av一区二区三区四区| 久久久国产欧美日韩av| 老鸭窝网址在线观看| 看免费av毛片| 国产三级中文精品| 最近最新免费中文字幕在线| 九色国产91popny在线| 国产精品99久久99久久久不卡| 19禁男女啪啪无遮挡网站| 无人区码免费观看不卡| 午夜福利在线观看免费完整高清在 | 亚洲中文av在线| 欧美日韩福利视频一区二区| 欧美一级a爱片免费观看看| 亚洲成人精品中文字幕电影| 黄频高清免费视频| 天堂av国产一区二区熟女人妻| 人人妻,人人澡人人爽秒播| 国产一区二区激情短视频| 精品久久久久久成人av| 熟女电影av网| 久久久久久久精品吃奶| 级片在线观看| 亚洲国产日韩欧美精品在线观看 | 他把我摸到了高潮在线观看| 18禁裸乳无遮挡免费网站照片| 人人妻人人看人人澡| 日本免费一区二区三区高清不卡| 国产成人影院久久av| 久久热在线av| 每晚都被弄得嗷嗷叫到高潮| 中亚洲国语对白在线视频| 日韩欧美国产在线观看| 久久人人精品亚洲av| 亚洲欧美一区二区三区黑人| 成熟少妇高潮喷水视频| 精品不卡国产一区二区三区| 色噜噜av男人的天堂激情| 久9热在线精品视频| 国产激情欧美一区二区| 午夜a级毛片| 性色avwww在线观看| 久久人妻av系列| 村上凉子中文字幕在线| 一边摸一边抽搐一进一小说| 成人永久免费在线观看视频| 欧美午夜高清在线| 日本撒尿小便嘘嘘汇集6| 亚洲自偷自拍图片 自拍| 日韩欧美精品v在线| 这个男人来自地球电影免费观看| 最新美女视频免费是黄的| 在线十欧美十亚洲十日本专区| 国产伦精品一区二区三区视频9 | 黄频高清免费视频| 99精品在免费线老司机午夜| 人人妻,人人澡人人爽秒播| 亚洲性夜色夜夜综合| 久久人妻av系列| 成人av一区二区三区在线看| 51午夜福利影视在线观看| 欧洲精品卡2卡3卡4卡5卡区| 99久久久亚洲精品蜜臀av| 狠狠狠狠99中文字幕| 成人18禁在线播放| 亚洲成人中文字幕在线播放| 欧美乱妇无乱码| 亚洲av片天天在线观看| 欧美在线黄色| 香蕉国产在线看| 岛国在线观看网站| 免费高清视频大片| 免费在线观看亚洲国产| 成年女人看的毛片在线观看| 国产精品精品国产色婷婷| 色综合欧美亚洲国产小说| 免费在线观看影片大全网站| 免费大片18禁| 亚洲中文日韩欧美视频| 亚洲美女视频黄频| av女优亚洲男人天堂 | 久久中文看片网| 免费看日本二区| 曰老女人黄片| 国产三级黄色录像| 日韩欧美国产在线观看| 久久久久久人人人人人| 精品免费久久久久久久清纯| 国产在线精品亚洲第一网站| 日韩欧美一区二区三区在线观看| 日韩有码中文字幕| 看免费av毛片| www日本黄色视频网| 麻豆av在线久日| 特级一级黄色大片| 日本精品一区二区三区蜜桃| 少妇的丰满在线观看| 男人舔女人的私密视频| 99国产精品一区二区蜜桃av| 精品一区二区三区四区五区乱码| 一区二区三区激情视频| 亚洲精品国产精品久久久不卡| 欧美日韩一级在线毛片| 亚洲欧美精品综合一区二区三区| 国产三级黄色录像| 精品国产乱子伦一区二区三区| 国产三级中文精品| 国产精品一区二区三区四区久久| 黄色丝袜av网址大全| 色哟哟哟哟哟哟| 十八禁网站免费在线| 成人鲁丝片一二三区免费| 小说图片视频综合网站| a级毛片在线看网站| 精品久久久久久成人av| 伊人久久大香线蕉亚洲五| 亚洲九九香蕉| 一本精品99久久精品77| 午夜福利高清视频| 啪啪无遮挡十八禁网站| 国产伦一二天堂av在线观看| 日韩欧美三级三区| 精品一区二区三区四区五区乱码| 久久欧美精品欧美久久欧美| 性色avwww在线观看| 国语自产精品视频在线第100页| 五月玫瑰六月丁香| 欧美成人免费av一区二区三区| 男人舔女人的私密视频| 成人无遮挡网站| 成人国产综合亚洲| 欧美一区二区国产精品久久精品| 最新在线观看一区二区三区| 小说图片视频综合网站| 精品久久久久久久毛片微露脸| 可以在线观看毛片的网站| 村上凉子中文字幕在线| 久久亚洲真实| 香蕉久久夜色| 99热只有精品国产| 国产真实乱freesex| 亚洲自偷自拍图片 自拍| 日韩欧美三级三区| 国产aⅴ精品一区二区三区波| 精品电影一区二区在线| 欧美成人性av电影在线观看| 色老头精品视频在线观看| АⅤ资源中文在线天堂| 精品国内亚洲2022精品成人| 午夜福利欧美成人| 国产亚洲av嫩草精品影院| 老熟妇乱子伦视频在线观看| 噜噜噜噜噜久久久久久91| 亚洲 欧美一区二区三区| 美女免费视频网站| 亚洲国产色片| 99久久久亚洲精品蜜臀av| 最近最新中文字幕大全免费视频| 国产亚洲精品一区二区www| 亚洲,欧美精品.| 国产日本99.免费观看| 神马国产精品三级电影在线观看| 久久天躁狠狠躁夜夜2o2o| 国产精品亚洲美女久久久| 十八禁网站免费在线| 色综合欧美亚洲国产小说| 麻豆久久精品国产亚洲av| 国产精品,欧美在线| 在线播放国产精品三级| 男女午夜视频在线观看| 日本撒尿小便嘘嘘汇集6| 国产视频一区二区在线看| 久久久精品欧美日韩精品| 看片在线看免费视频| 国产主播在线观看一区二区| x7x7x7水蜜桃| 午夜影院日韩av| 香蕉国产在线看| 国产99白浆流出| 岛国在线免费视频观看| 成人18禁在线播放| 亚洲av免费在线观看| 欧美3d第一页| 午夜福利欧美成人| e午夜精品久久久久久久| 国产野战对白在线观看| 精品熟女少妇八av免费久了| 999久久久国产精品视频| 午夜福利在线观看吧| 国产伦精品一区二区三区四那| 亚洲国产欧美人成| 99热这里只有是精品50| 岛国视频午夜一区免费看| 精品午夜福利视频在线观看一区| 久久久久久九九精品二区国产| 午夜精品在线福利| 国产视频一区二区在线看| 桃红色精品国产亚洲av| 免费无遮挡裸体视频| 国产精品 国内视频| 中文资源天堂在线| 在线免费观看的www视频| 亚洲在线观看片| 国产不卡一卡二| 欧美另类亚洲清纯唯美| 无遮挡黄片免费观看| 日本黄色片子视频| 午夜视频精品福利| 男插女下体视频免费在线播放| 欧美日韩精品网址| 搡老妇女老女人老熟妇| 手机成人av网站| 热99在线观看视频| 性色av乱码一区二区三区2| 少妇的丰满在线观看| 999久久久国产精品视频| 国产精品 国内视频| 久久香蕉精品热| 亚洲七黄色美女视频| 免费无遮挡裸体视频| 偷拍熟女少妇极品色| 99国产精品一区二区三区| 国产黄a三级三级三级人| 亚洲av电影不卡..在线观看| 国产精品一及| 国产精品久久电影中文字幕| 男女做爰动态图高潮gif福利片| 亚洲成a人片在线一区二区| 欧美+亚洲+日韩+国产| 久久午夜亚洲精品久久| 小蜜桃在线观看免费完整版高清| 少妇裸体淫交视频免费看高清| 丁香六月欧美| 国产精品精品国产色婷婷| 亚洲在线观看片| 久久精品国产清高在天天线| 成人av在线播放网站| 久久草成人影院| 欧美一区二区精品小视频在线| 99riav亚洲国产免费| 免费在线观看影片大全网站| 午夜福利视频1000在线观看| 国产精品综合久久久久久久免费| 黄片大片在线免费观看| 婷婷亚洲欧美| 一边摸一边抽搐一进一小说| 夜夜夜夜夜久久久久| 悠悠久久av| 亚洲欧美激情综合另类| 国产一级毛片七仙女欲春2| 亚洲av第一区精品v没综合| 一个人看的www免费观看视频| 99国产综合亚洲精品| 欧洲精品卡2卡3卡4卡5卡区| 丁香欧美五月| 亚洲av第一区精品v没综合| 国产精品1区2区在线观看.| 亚洲av第一区精品v没综合| 在线观看66精品国产| 一夜夜www| 看免费av毛片| 免费高清视频大片| 国产激情久久老熟女| 国产精品免费一区二区三区在线| 一卡2卡三卡四卡精品乱码亚洲| 宅男免费午夜| 欧美另类亚洲清纯唯美| 一区二区三区高清视频在线| 国产美女午夜福利| 久久精品91蜜桃| 三级毛片av免费| 黄色 视频免费看| 久久这里只有精品19| 午夜视频精品福利| 国产成人影院久久av| 日韩免费av在线播放| 亚洲色图 男人天堂 中文字幕| 国产精品影院久久| 99在线视频只有这里精品首页| 女人高潮潮喷娇喘18禁视频| 国产麻豆成人av免费视频| 变态另类成人亚洲欧美熟女| 麻豆成人午夜福利视频| 国产午夜福利久久久久久| 美女 人体艺术 gogo| 久久久久久人人人人人| 性欧美人与动物交配| 国产男靠女视频免费网站| 亚洲国产中文字幕在线视频| 日韩成人在线观看一区二区三区| 欧洲精品卡2卡3卡4卡5卡区| 亚洲国产看品久久| 美女高潮的动态| 色综合亚洲欧美另类图片| 国产v大片淫在线免费观看| 黄片小视频在线播放| 亚洲欧洲精品一区二区精品久久久| 亚洲熟妇熟女久久| 真实男女啪啪啪动态图| 欧美一区二区国产精品久久精品| 成人一区二区视频在线观看| 九九久久精品国产亚洲av麻豆 | 国产毛片a区久久久久| 国产黄色小视频在线观看| 白带黄色成豆腐渣| 51午夜福利影视在线观看| 亚洲色图av天堂| а√天堂www在线а√下载| 国产精品久久久久久久电影 | 免费看美女性在线毛片视频| 怎么达到女性高潮| 丁香欧美五月| 亚洲七黄色美女视频| 小说图片视频综合网站| 嫩草影院入口| 国内少妇人妻偷人精品xxx网站 | 可以在线观看毛片的网站| 99久久精品热视频| 国产aⅴ精品一区二区三区波| a级毛片a级免费在线| 精品国产乱子伦一区二区三区| 香蕉丝袜av| 小蜜桃在线观看免费完整版高清| 丁香欧美五月| 亚洲av电影不卡..在线观看| 亚洲乱码一区二区免费版| 婷婷丁香在线五月| 婷婷六月久久综合丁香| 国产激情偷乱视频一区二区| 国产亚洲欧美在线一区二区| 欧美精品啪啪一区二区三区| 岛国在线免费视频观看| 免费一级毛片在线播放高清视频| 99国产精品一区二区蜜桃av| 亚洲va日本ⅴa欧美va伊人久久| 男人的好看免费观看在线视频| 麻豆成人av在线观看| 精品一区二区三区四区五区乱码| 99国产极品粉嫩在线观看| 亚洲精品乱码久久久v下载方式 | 搡老岳熟女国产| tocl精华| 此物有八面人人有两片| 无人区码免费观看不卡| 久久婷婷人人爽人人干人人爱| 高清在线国产一区| 国产又色又爽无遮挡免费看| 老司机福利观看| 精品久久久久久,| 精品一区二区三区av网在线观看| 午夜免费观看网址| 国产熟女xx| or卡值多少钱| 国产精品亚洲一级av第二区| 亚洲国产欧美一区二区综合| 国产三级中文精品| 国产日本99.免费观看| 精品国产三级普通话版| 欧美一级毛片孕妇| 搡老岳熟女国产| 成熟少妇高潮喷水视频| 国产精品av视频在线免费观看| 国产成人精品久久二区二区免费| 极品教师在线免费播放| 久久香蕉精品热| 日本一二三区视频观看| 色在线成人网| 蜜桃久久精品国产亚洲av| 90打野战视频偷拍视频| 欧美日韩国产亚洲二区| 欧美乱妇无乱码| 久久久久久人人人人人| 国内久久婷婷六月综合欲色啪| 国产免费av片在线观看野外av| 中文字幕久久专区| 天堂√8在线中文| 成人精品一区二区免费| 久久中文字幕人妻熟女| 欧美乱码精品一区二区三区| 69av精品久久久久久| 欧美日韩瑟瑟在线播放| 国产美女午夜福利| 12—13女人毛片做爰片一| 成人亚洲精品av一区二区| av欧美777| 亚洲成av人片在线播放无| 欧美性猛交╳xxx乱大交人| 999久久久精品免费观看国产| 一本一本综合久久| 亚洲片人在线观看| 欧美极品一区二区三区四区| 国产av不卡久久| av黄色大香蕉| 精品久久久久久久毛片微露脸| 亚洲av中文字字幕乱码综合| 99国产综合亚洲精品| 国产亚洲精品久久久久久毛片| 久久久国产成人免费| 国产成人系列免费观看| 级片在线观看| а√天堂www在线а√下载| 欧美不卡视频在线免费观看| 黄色片一级片一级黄色片| 午夜福利18| 人妻丰满熟妇av一区二区三区| 久久久久久久午夜电影| 一级黄色大片毛片| 成年人黄色毛片网站| 中文字幕人成人乱码亚洲影| 人妻久久中文字幕网| 亚洲av电影在线进入| 色综合婷婷激情| 欧美乱妇无乱码| 国产爱豆传媒在线观看| 国产aⅴ精品一区二区三区波| 午夜免费观看网址| 国产v大片淫在线免费观看| 久久99热这里只有精品18| 国产伦精品一区二区三区四那| 中文字幕熟女人妻在线| 精品国产超薄肉色丝袜足j| 热99re8久久精品国产|