An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks

被引:16
作者
Dev, Himel [1 ]
Sen, Tanmoy [1 ]
Basak, Madhusudan [1 ]
Ali, Mohammed Eunus [1 ]
机构
[1] Bangladesh Univ Engn & Technol, Dept Comp Sci & Engn CSE, Dhaka 1000, Bangladesh
来源
2012 SC COMPANION: HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SCC) | 2012年
关键词
clouds; data mining; data privacy; security;
D O I
10.1109/SC.Companion.2012.133
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has revolutionized the way computing and software services are delivered to the clients on demand. It offers users the ability to connect to computing resources and access IT managed services with a previously unknown level of ease. Due to this greater level of flexibility, the cloud has become the breeding ground of a new generation of products and services. However, the flexibility of cloud-based services comes with the risk of the security and privacy of users' data. Thus, security concerns among users of the cloud have become a major barrier to the widespread growth of cloud computing. One of the security concerns of cloud is data mining based privacy attacks that involve analyzing data over a long period to extract valuable information. In particular, in current cloud architecture a client entrusts a single cloud provider with his data. It gives the provider and outside attackers having unauthorized access to cloud, an opportunity of analyzing client data over a long period to extract sensitive information that causes privacy violation of clients. This is a big concern for many clients of cloud. In this paper, we first identify the data mining based privacy risks on cloud data and propose a distributed architecture to eliminate the risks.
引用
收藏
页码:1106 / 1115
页数:10
相关论文
共 28 条
[21]  
Solove D. J., 2007, SOCIAL SCI RES NETWO, V44
[22]   Chord: A scalable peer-to-peer lookup service for Internet applications [J].
Stoica, I ;
Morris, R ;
Karger, D ;
Kaashoek, MF ;
Balakrishnan, H .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2001, 31 (04) :149-160
[23]  
Torgo L., 2010, Data Mining With R: Learning With Case Studies, DOI DOI 10.1201/9780429292859
[24]   Ethical issues in web data mining [J].
Van Wel L. ;
Royakkers L. .
Ethics and Information Technology, 2004, 6 (2) :129-140
[25]  
Weiss Gary M., 2009, Proceedings of the 2009 International Conference on Data Mining. DMIN 2009, P124
[26]  
Wikipedia, 2012, AM EL COMP CLOUD WIK
[27]   10 Challenging problems in data mining research [J].
Yang, Qiang ;
Wu, Xindong .
INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY & DECISION MAKING, 2006, 5 (04) :597-604
[28]  
[No title captured]