Trust based service optimization selection for cloud computing

被引:1
作者
Li, Xiaohui [1 ,3 ]
He, Jingsha [2 ]
Du, Ying [3 ]
机构
[1] Computer Science and Technology, Beijing University of Technology, Beijing
[2] School of Software Engineering, Beijing University of Technology, Beijing
[3] College of Electrical and Information Engineer, Liaoning University of Technology, Jinzhou, 121001, Liaoning
来源
International Journal of Multimedia and Ubiquitous Engineering | 2015年 / 10卷 / 05期
关键词
Cloud computing; Information entropy; Privacy protection; Trust;
D O I
10.14257/ijmue.2015.10.5.20
中图分类号
学科分类号
摘要
We present an approach for privacy preservation in cloud computing environment in which we propose to use information entropy and rough set theory with the goal of personalized privacy protection in cloud users during service selection based on trust. In the approach, cloud server is as an active service provider to personalize the cloud user privacy, cloud user selects the service which is quantified by trust for multi-tenant personalized privacy protection needs. We descript user privacy information by the service and trust attributes, design a multi-attribute service quantization algorithm using information entropy and rough set theory for the quality of service. The approach can achieve the purpose of quantitative service and dynamically adjust the supply relationship service based on multi-attribute, analysis shows which can effectively protect user privacy and personalization by quantifying the cloud service. © 2015 SERSC.
引用
收藏
页码:221 / 230
页数:9
相关论文
共 20 条
[1]  
Li D., Technology of Cloud Computing Development Report [M], (2013)
[2]  
Liu Q., Wang G., Wu J., An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing, Proceedings of the 2009 International Conference on Computational Science and Engineering, pp. 715-720, (2009)
[3]  
Huang D., Zhang X., Kang M., Luo J., Mobicloud: Building secure cloud framework for mobile computing and communication, Proceedings of 5Th IEEE International Symposium on Service-Oriented System Engineering, (2010)
[4]  
Wei H., Gui X., Cloud environment supports privacy protection computable encryption methods, Journal of Computers, 34, pp. 2391-2402, (2011)
[5]  
Wu E., Madden S., Zhang Y., Jones E., Curino C., Relational Cloud:The Case for a Database Service, (2010)
[6]  
Muntes-Mulero V., Nin J., Privacy and anonymization for very large datasets, In Proceedings of the 18Th ACM Conference on Information and Knowledge Management, pp. 2117-2118, (2009)
[7]  
Feng D., Zhang M., Zhang Y., Xu Z., Cloud computing Safety Research, Journal of Software, (2011)
[8]  
Yang X., Wang Y., Wang B., Data released in the privacy of sensitive attributes for multi-Protection methods, Journal of Computers, 31, 4, pp. 574-587, (2008)
[9]  
Ciriam V., Di Vimercati S.D., Foresti S., Jajodia S., Paraboschi S., Samarati P., Fragmentation and Encryption to Enforce Privacy in Data Storage, ESORICS, 4734, pp. 171-186, (2007)
[10]  
Ciriani V., Capitani Di Vimercati S., Foresti S., Jajodia S., Paraboschi S., Samarati P., Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients, Proceedings of the 23Rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII, pp. 225-239, (2009)