High Efficiency Privacy-Preserving Scheme for Data Distribution in Hybrid Cloud

被引:2
作者
Chen, Wei-Hsiu [1 ]
Liu, Chiang-Lung [2 ]
Tung, Der-Kuo [2 ]
Liu, Fong-Hao [3 ]
机构
[1] Natl Def Univ, Sch Def Sci, Taipei, Taiwan
[2] Natl Def Univ, Dept Elect & Elect Engn, Taipei, Taiwan
[3] Natl Def Univ, Dept Informat Management, Taipei, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2015年 / 16卷 / 02期
关键词
Privacy preserving; Hybrid clouds; Value at risk; Anonymity; Selective protection; K-ANONYMITY; SECURITY; MODEL;
D O I
10.6138/JIT.2015.16.2.20140306
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since 2009, the amount of digital data being produced has doubled every year. Cloud computing storage services are an economical approach to dealing with such volumes of data. In cloud storage situations, data encryption and access control are commonly used for the protection of data. Full data encryption is able to ensure privacy; however, this approach makes it difficult to analyze the data in an efficient manner. Data analysis in a cloud environment requires a balance between data security and data analysis capacity. This study proposes a high-efficiency, privacy-preservation scheme for data distribution in hybrid clouds to improve data protection, expand the availability of data, and reduce cloud system resources consumption. Data classification and selective data protection mechanisms are also addressed. Results of functional analysis and comparison revealed that the proposed scheme reduces the time required for encryption and decryption by as much as 82.76% and decreases the number of privacy content by up to 92.5% while allowing data mining without compromising privacy.
引用
收藏
页码:179 / 187
页数:9
相关论文
共 26 条
[11]  
I-Hsun Chuang, 2011, Proceedings of the 2011 13th International Conference on Advanced Communication Technology (ICACT). Smart Service Innovation through Mobile Interactivity, P260
[12]  
Kulkarni G., 2012, Proceedings of the 2012 IEEE 3rd International Conference on Software Engineering and Service Science (ICSESS), P547, DOI 10.1109/ICSESS.2012.6269525
[13]   Challenges and Opportunities with Big Data [J].
Labrinidis, Alexandros ;
Jagadish, H. V. .
PROCEEDINGS OF THE VLDB ENDOWMENT, 2012, 5 (12) :2032-2033
[14]   RETRACTED: The Application of Fuzzy Markov Chains in the Analysis of Internet Glance behavior (Retracted Article) [J].
Li, Jin ;
He, Ping .
PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 7, 2010, :608-611
[15]  
Liu Chiang-Lung, 2011, APPL MECH MAT, V145, P272
[16]   Comprehensive Security Integrated Model and Ontology within Cloud Computing [J].
Liu, Fong-Hao ;
Lo, Hsiang-Fu ;
Chen, Liang-Chu ;
Lee, Wei-Tsong .
JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (06) :935-945
[17]  
Mohamed M.E., 2012, P 2012 8 INT C INF S, P12
[18]   A combined approach to ensure data security in cloud computing [J].
Sood, Sandeep K. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) :1831-1838
[19]   k-anonymity:: A model for protecting privacy [J].
Sweeney, L .
INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) :557-570
[20]   Achieving k-anonymity privacy protection using generalization and suppression [J].
Sweeney, L .
INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) :571-588