An Association Probability Based Noise Generation Strategy for Privacy Protection in Cloud Computing
详细信息    查看全文
  • 作者:Gaofeng Zhang (20)
    Xuyun Zhang (21)
    Yun Yang (20) (22)
    Chang Liu (21)
    Jinjun Chen (21)
  • 关键词:Cloud service ; Privacy protection ; Noise generation ; Association probability
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2012
  • 出版时间:2012
  • 年:2012
  • 卷:7636
  • 期:1
  • 页码:648-655
  • 全文大小:370KB
  • 参考文献:1. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. Future Generation Computer Systems?25(6), 599-16 (2009) CrossRef
    2. Ryan, M.D.: Cloud Computing Privacy Concerns on Our Doorstep. Communications of the ACM?54(1), 36-8 (2011) CrossRef
    3. Ren, K., Liu, X., Chen, J., Xiao, N., Song, J., Zhang, W.: A QSQL-based Efficient Planning Algorithm for Fully-automated Service Composition in Dynamic Service Environments. In: 2008 IEEE International Conference on Service Computing (SCC 2008), pp. 301-08. IEEE Press (2008)
    4. Evfimievski, A., Gehrke, J., Srikant, R.: Limiting Privacy Breaches in Privacy Preserving Data Mining. In: 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS 2003), pp. 211-22. ACM, Madison (2003) CrossRef
    5. Bu, Y., Fu, A., Wong, R., Chen, L., Li, J.: Privacy Preserving Serial Data Publishing by Role Composition. In: 34th Internationasl Conference on Very Large Data Bases (VLDB 2008), pp. 845-56 (2008)
    6. Zhang, G., Yang, Y., Chen, J.: A Histrotical Probability based Noise Generation Strategy for Privacy Protection in Cloud Computing. Journal of Computer and System Sciences?78(5), 1374-381 (2012) CrossRef
    7. Zhang, G., Yang, Y., Liu, X., Chen, J.: A Time-Series Pattern based Noise Generation Strategy for Privacy Protection in Cloud Computing. In: 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2012), pp. 458-65. IEEE Press, New York (2012) CrossRef
    8. Ye, S., Wu, F., Pandey, R., Chen, H.: Noise Injection for Search Privacy Protection. In: 2009 International Conference on Computational Science and Engineering (CSE 2009), pp. 1-. IEEE Press, New York (2009) CrossRef
    9. Babcock, B., Babu, S., Datar, M., Motwani, R., Widom, J.: Models and Issues in Data Stream Systems. In: 21st ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS 2002), pp. 1-6. ACM, Madison (2002) CrossRef
    10. Liu, K., Jin, H., Chen, J., Liu, X., Yuan, D., Yang, Y.: A Compromised-time-cost Scheduling Algorithm in SwinDeW-C for Instance-intensive Cost-constrained Workflows on a Cloud Computing Platform. International Journal of High Performance Computing Applications?24(4), 445-56 (2010) CrossRef
  • 作者单位:Gaofeng Zhang (20)
    Xuyun Zhang (21)
    Yun Yang (20) (22)
    Chang Liu (21)
    Jinjun Chen (21)

    20. Faculty of Information and Communication Technologies, Swinburne University of Technology, Hawthorn, Melbourne, Australia, 3122
    21. Faculty of Engineering and Information Technology, University of Technology, Sydney, Broadway, NSW, Australia, 2007
    22. School of Computer Science and Technology, Anhui University, Hefei, 230039, China
  • ISSN:1611-3349
文摘
Cloud computing allows customers to utilise IT services in a pay-as-you-go fashion to save huge cost on IT infrastructure. In open cloud, ‘malicious-service providers could record service data from a cloud customer and collectively deduce the customer’s privacy without the customer’s permission. Accordingly, customers need to take certain actions to protect their privacy automatically at client sides, such as noise obfuscation. For instance, it can generate and inject noise service requests into real ones so that service providers are hard to distinguish which ones are real. Existing noise obfuscations focus on concealing occurrence probabilities of service requests. But in reality, association probabilities of service requests can also reveal customer privacy. So, we present a novel association probability based noise generation strategy by concealing these association probabilities. The simulation comparison demonstrates that this strategy can improve the effectiveness of privacy protection significantly from the perspective of association probability.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700