A Possible Solution For Privacy-Preserving Cloud Data Storage

被引:6
作者
Paul, Mithun [1 ]
Collberg, Christian [1 ]
Bambauer, Derek [2 ]
机构
[1] Univ Arizona, Dept Comp Sci, Tucson, AZ 85721 USA
[2] Univ Arizona, James E Rogers Coll Law, Tucson, AZ USA
来源
2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2015) | 2015年
关键词
Data Privacy; Cloud; Obfuscation;
D O I
10.1109/IC2E.2015.103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite the economic advantages of cloud data storage, many corporations have not yet migrated to this technology. While corporations in the financial sector cite data security as a reason, corporations in other sectors cite privacy concerns for this reluctance. In this paper, we propose a possible solution for this problem inspired by the HIPAA safe harbor methodology for data anonymization. The proposed technique involves using a hash function that uniquely identifies the data and then splitting data across multiple cloud providers. We propose that such a "Good Enough" approach to privacy-preserving cloud data storage is both technologically feasible and financially advantageous. Following this approach addresses concerns about privacy harms resulting from accidental or deliberate data spills from cloud providers. The "Good Enough" method will enable firms to move their data into the cloud without incurring privacy risks, enabling them to realize the economic advantages provided by the pay-per-use model of cloud data storage.
引用
收藏
页码:397 / 403
页数:7
相关论文
共 44 条
[1]  
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[2]  
[Anonymous], HARDER YOU THINK CAS
[3]  
[Anonymous], 1978, LOGIC DATA BASES
[4]   Data obfuscation: Anonymity and desensitization of usable data sets [J].
Bakken, DE ;
Parameswaran, R ;
Blough, DM ;
Franz, AA ;
Palmer, TJ .
IEEE SECURITY & PRIVACY, 2004, 2 (06) :34-41
[5]  
Bao J, 2007, PROCEEDINGS OF THE IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, P791, DOI 10.1109/WI.2007.83
[6]  
Barth-Jones Daniel C., 2012, REIDENTIFICATION GOV
[7]  
Bertossi L, 2006, SIGMOD REC, V35, P68, DOI 10.1145/1147376.1147391
[8]  
Brankovic L., 1999, Australian Institute of Computer Ethics Conference (AICEC99), Melbourne, P89
[9]  
Byun J.-W., 2006, SDM
[10]  
Citron DK, 2010, CALIF LAW REV, V98, P1805