An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks

被引:16
作者
Dev, Himel [1 ]
Sen, Tanmoy [1 ]
Basak, Madhusudan [1 ]
Ali, Mohammed Eunus [1 ]
机构
[1] Bangladesh Univ Engn & Technol, Dept Comp Sci & Engn CSE, Dhaka 1000, Bangladesh
来源
2012 SC COMPANION: HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SCC) | 2012年
关键词
clouds; data mining; data privacy; security;
D O I
10.1109/SC.Companion.2012.133
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has revolutionized the way computing and software services are delivered to the clients on demand. It offers users the ability to connect to computing resources and access IT managed services with a previously unknown level of ease. Due to this greater level of flexibility, the cloud has become the breeding ground of a new generation of products and services. However, the flexibility of cloud-based services comes with the risk of the security and privacy of users' data. Thus, security concerns among users of the cloud have become a major barrier to the widespread growth of cloud computing. One of the security concerns of cloud is data mining based privacy attacks that involve analyzing data over a long period to extract valuable information. In particular, in current cloud architecture a client entrusts a single cloud provider with his data. It gives the provider and outside attackers having unauthorized access to cloud, an opportunity of analyzing client data over a long period to extract sensitive information that causes privacy violation of clients. This is a big concern for many clients of cloud. In this paper, we first identify the data mining based privacy risks on cloud data and propose a distributed architecture to eliminate the risks.
引用
收藏
页码:1106 / 1115
页数:10
相关论文
共 28 条
  • [1] Aggarwal G., 2005, 2 BIENNIAL C INNOVAT
  • [2] Amazon Web Services, 2011, OV SEC PROC
  • [3] [Anonymous], 2010, Proceedings of the 1st ACM symposium on Cloud computing
  • [4] [Anonymous], 2010, NSDI
  • [5] [Anonymous], 2009, INTR CLOUD COMP ARCH
  • [6] [Anonymous], 2009, TECHNICAL REPORT
  • [7] [Anonymous], 2003, P 19 ACM S OP SYST P, DOI [10.1145/1165389.945450, DOI 10.1145/1165389.945450]
  • [8] [Anonymous], 2007, Principles of Data Mining: Undergraduate Topics in Computer Science
  • [9] Asst P., 2011, WORLD COMPUTER SCI I, V1, P283
  • [10] Brown S.H., 2009, ALABAMA J MATH