An innovative privacy preserving technique for incremental datasets on cloud computing

被引:21
作者
Aldeen, Yousra Abdul Alsahib S. [1 ]
Salleh, Mazleena [1 ]
Aljeroudi, Yazan [2 ]
机构
[1] Univ Teknol Malaysia, Fac Comp, Utm Skudai 81310, Johor, Malaysia
[2] Int Islamic Univ Malaysia, Jalan Gombak, Kuala Lumpur, Malaysia
关键词
Cloud computing; Privacy; Incremental datasets;
D O I
10.1016/j.jbi.2016.06.011
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing (CC) is a magnificent service-based delivery with gigantic computer processing power and data storage across connected communications channels. It imparted overwhelming technological impetus in the internet (web) mediated IT industry, where users can easily share private data for further analysis and mining. Furthermore, user affable CC services enable to deploy sundry applications economically. Meanwhile, simple data sharing impelled various phishing attacks and malware assisted security threats. Some privacy sensitive applications like health services on cloud that are built with several economic and operational benefits necessitate enhanced security. Thus, absolute cyberspace security and mitigation against phishing blitz became mandatory to protect overall data privacy. Typically, diverse applications datasets are anonymized with better privacy to owners without providing all secrecy requirements to the newly added records. Some proposed techniques emphasized this issue by reanonymizing the datasets from the scratch. The utmost privacy protection over incremental datasets on CC is far from being achieved. Certainly, the distribution of huge datasets volume across multiple storage nodes limits the privacy preservation. In this view, we propose a new anonymization technique to attain better privacy protection with high data utility over distributed and incremental datasets on CC. The proficiency of data privacy preservation and improved confidentiality requirements is demonstrated through performance evaluation. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:107 / 116
页数:10
相关论文
共 38 条
  • [1] [Anonymous], 2009, Communications of the ACM, DOI DOI 10.1145/1721654.1721672
  • [2] [Anonymous], SECURITY PRIVACY ISS
  • [3] Bache K., 2013, UCI Machine Learning Repository
  • [4] Bhatotia P., 2011, Proceedings of the 2nd ACM Symposium on Cloud Computing - SOCC '11, P1, DOI [10.1145/2038916.2038923, DOI 10.1145/2038916.2038923]
  • [5] Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P48
  • [6] Doka K., 2011, P 5 INT WORK PERS AC
  • [7] Elsalamony H.A., 2014, International Journal of Computer Applications, V85, P12, DOI [10.5120/14852-3218, DOI 10.5120/14852-3218]
  • [8] Security issues in cloud environments: a survey
    Fernandes, Diogo A. B.
    Soares, Liliana F. B.
    Gomes, Joao V.
    Freire, Mario M.
    Inacio, Pedro R. M.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (02) : 113 - 170
  • [9] Fung B.C.M., 2008, P 11 INT C EXT DAT T, P264
  • [10] Privacy-Preserving Data Publishing: A Survey of Recent Developments
    Fung, Benjamin C. M.
    Wang, Ke
    Chen, Rui
    Yu, Philip S.
    [J]. ACM COMPUTING SURVEYS, 2010, 42 (04)