An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud

被引:48
作者
Zhang, Xuyun [1 ]
Liu, Chang [1 ]
Nepal, Surya [2 ]
Chen, Jinjun [1 ]
机构
[1] Univ Technol Sydney, Fac Engn & Informat Technol, Broadway, NSW 2007, Australia
[2] CSIRO, Ctr Informat & Commun Technol, N Ryde, NSW 2122, Australia
关键词
Cloud computing; Privacy preservation; Incremental data set; Anonymization; Quasi-identifier index; FULLY HOMOMORPHIC ENCRYPTION; MAPREDUCE; SEARCH;
D O I
10.1016/j.jcss.2012.11.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing provides massive computation power and storage capacity which enable users to deploy applications without infrastructure investment. Many privacy-sensitive applications like health services are built on cloud for economic benefits and operational convenience. Usually, data sets in these applications are anonymized to ensure data owners' privacy, but the privacy requirements can be potentially violated when new data join over time. Most existing approaches address this problem via re-anonymizing all data sets from scratch after update or via anonymizing the new data incrementally according to the already anonymized data sets. However, privacy preservation over incremental data sets is still challenging in the context of cloud because most data sets are of huge volume and distributed across multiple storage nodes. Existing approaches suffer from poor scalability and inefficiency because they are centralized and access all data frequently when update occurs. In this paper, we propose an efficient quasi-identifier index based approach to ensure privacy preservation and achieve high data utility over incremental and distributed data sets on cloud. Quasi-identifiers, which represent the groups of anonymized data, are indexed for efficiency. An algorithm is designed to fulfil our approach accordingly. Evaluation results demonstrate that with our approach, the efficiency of privacy preservation on large-volume incremental data sets can be improved significantly over existing approaches. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:542 / 555
页数:14
相关论文
共 43 条
[32]   A MATHEMATICAL THEORY OF COMMUNICATION [J].
SHANNON, CE .
BELL SYSTEM TECHNICAL JOURNAL, 1948, 27 (04) :623-656
[33]   Security and Privacy Challenges in Cloud Computing Environments [J].
Takabi, Hassan ;
Joshi, James B. D. ;
Ahn, Gail-Joon .
IEEE SECURITY & PRIVACY, 2010, 8 (06) :24-31
[34]  
Truta TM, 2007, APPLIED COMPUTING 2007, VOL 1 AND 2, P380, DOI 10.1145/1244002.1244093
[35]  
van Dijk M, 2010, LECT NOTES COMPUT SC, V6110, P24
[36]   In Cloud, Can Scientific Communities Benefit from the Economies of Scale? [J].
Wang, Lei ;
Zhan, Jianfeng ;
Shi, Weisong ;
Liang, Yi .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (02) :296-303
[37]   Cloud Computing: a Perspective Study [J].
Wang, Lizhe ;
von Laszewski, Gregor ;
Younge, Andrew ;
He, Xi ;
Kunze, Marcel ;
Tao, Jie ;
Fu, Cheng .
NEW GENERATION COMPUTING, 2010, 28 (02) :137-146
[38]  
Xiao X., 2006, P ACM SIGMOD INT C M, P229
[39]  
Xiao X., 2007, P 2007 ACM SIGMOD IN, P689, DOI DOI 10.1145/1247480.1247556
[40]  
Xu W., 2006, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, P785