Tiger Hash Key (THK) Assisted Goat Optimisation Algorithm (GOA) for Intrusion Detection and Privacy Preserving of Electronic Health Records (EHR) in Distributed Cloud Data Environment
Main Article Content
Abstract
The emergence of the cloud environment necessitates privacy preservation and trust assurance that paves the way to embark on new privacy-preserving techniques. Novel and efficient privacy preservation techniques give users confidence in evolving issues relevant to privacy and cyber-related risks. In this research work, trust mode, robustness evaluation for unique key, and Tiger Hash Key (THK) generation mechanism assisted Goat Optimisation Algorithm (GOA). The Cloud Service Provider (CSP) trust is determined by the trust model, which is an essential process in Cloud Computing (CC) and the selection of CSP for further storage as well as the process of Electronic Health Record (EHR) data. The robustness evaluation is accomplished using Shannon entropy, where the cryptographic reliability is evaluated. The hybridized THK-CSP-assisted CC privacy preservation is efficient due to the combination of exploitation and exploration capability. The performance of proposed technique is analysed through simulation to show the efficiency of functionality and the privacy-preserving mechanisms. Comparing to the state-of-art methods, the proposed THK-CSP for CC has highest Intrusion Detection Rate (IDR) of 97.456%. This goes to show that, when it comes to privacy and security, cloud systems are very efficient and come with high potency.