High Efficiency Privacy-Preserving Scheme for Data Distribution in Hybrid Cloud

被引:2
作者
Chen, Wei-Hsiu [1 ]
Liu, Chiang-Lung [2 ]
Tung, Der-Kuo [2 ]
Liu, Fong-Hao [3 ]
机构
[1] Natl Def Univ, Sch Def Sci, Taipei, Taiwan
[2] Natl Def Univ, Dept Elect & Elect Engn, Taipei, Taiwan
[3] Natl Def Univ, Dept Informat Management, Taipei, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2015年 / 16卷 / 02期
关键词
Privacy preserving; Hybrid clouds; Value at risk; Anonymity; Selective protection; K-ANONYMITY; SECURITY; MODEL;
D O I
10.6138/JIT.2015.16.2.20140306
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since 2009, the amount of digital data being produced has doubled every year. Cloud computing storage services are an economical approach to dealing with such volumes of data. In cloud storage situations, data encryption and access control are commonly used for the protection of data. Full data encryption is able to ensure privacy; however, this approach makes it difficult to analyze the data in an efficient manner. Data analysis in a cloud environment requires a balance between data security and data analysis capacity. This study proposes a high-efficiency, privacy-preservation scheme for data distribution in hybrid clouds to improve data protection, expand the availability of data, and reduce cloud system resources consumption. Data classification and selective data protection mechanisms are also addressed. Results of functional analysis and comparison revealed that the proposed scheme reduces the time required for encryption and decryption by as much as 82.76% and decreases the number of privacy content by up to 92.5% while allowing data mining without compromising privacy.
引用
收藏
页码:179 / 187
页数:9
相关论文
共 26 条
[1]  
[Anonymous], 2011, Extracting Value from Chaos
[2]  
Bowen J.A., 2011, Computer Internet Lawyer, V28, P1
[3]  
Chaudhuri S., 2012, P 2012 IEEE 28 INT C, DOI [10.1109/1CDE.2012.153, DOI 10.1109/1CDE.2012.153]
[4]   Authentication, Authorization and File Synchronization for Hybrid Cloud -- The Development Centric to Google Apps, Hadoop and Linux Local Hosts [J].
Chiang, Jonannes K. .
JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (07) :1141-1148
[5]  
Ciriani V., 2007, K ANONYMITY, P323
[6]  
Deyan Chen, 2012, Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE 2012), P647, DOI 10.1109/ICCSEE.2012.193
[7]   SMARTS AND SMARTER - IMPROVED SIMPLE METHODS FOR MULTIATTRIBUTE UTILITY MEASUREMENT [J].
EDWARDS, W ;
BARRON, FH .
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1994, 60 (03) :306-325
[8]  
Gartner Inc, 2012, GARTN ID TOP 10 STRA
[9]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178
[10]  
Hu Yuh-Jong, 2013, P 3 INT C WEB INT MI, DOI [10.1145/2479787.2479806, DOI 10.1145/2479787.2479806]