Privacy-Aware Adaptive Data Encryption Strategy of Big Data in Cloud Computing

被引:63
作者
Gai, Keke [1 ]
Qiu, Meikang [1 ]
Zhao, Hui [2 ]
Xiong, Jian [3 ]
机构
[1] Pace Univ, Dept Comp Sci, New York, NY 10038 USA
[2] Henan Univ, Software Sch, Kaifeng 475000, Henan, Peoples R China
[3] Shanghai Jiao Tong Univ, IICNE, Shanghai 200030, Peoples R China
来源
2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD) | 2016年
基金
美国国家科学基金会;
关键词
Privacy protection; data encryption; big data; cloud computing; selective encryption strategy; time constraints; ALLOCATION; SYSTEMS;
D O I
10.1109/CSCloud.2016.52
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Privacy issues have become a considerable issue while the applications of big data are growing dramatically fast in cloud computing. The benefits us implementing these emerging technologies have improved or changed service models and improve application performances in various perspectives. However, the remarkably growing volume of data sizes has also resulted in many challenges in practice. The time execution of encrypting data is one of the serious issues during the processes of data processing and transmissions. Many current applications abandon data encryptions in order to reach an adoptive performance level, companions with privacy concerns. In this paper, we concentrate on privacy issue and propose a novel data encryption approach, named as Dynamic Data Encryption Strategy (D2ES). Our proposed approach aims to selectively encrypt data using privacy classification methods under timing constraints. This approach is designed to maximize the privacy protection scope by using a selective encryption strategy within the required execution time requirements. The performance of D2ES has been evaluated in our experiments, which provides the proof of the privacy enhancement.
引用
收藏
页码:273 / 278
页数:6
相关论文
共 25 条
[1]  
[Anonymous], IEEE T COMPUTERS
[2]   A New Professional Science Master Program for Electric Power Systems Engineering [J].
Baran, Mesut E. ;
Carpenter, Pam Page ;
Borbye, Lisbeth ;
Lubkeman, David L. ;
Ligett, Michael ;
Covington, David H. .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2014, 29 (04) :1903-1910
[3]   Adaptive Resource Allocation Optimization in Heterogeneous Mobile Cloud Systems [J].
Chen, Longbin ;
Duan, Yucong ;
Qiu, Meikang ;
Xiong, Jian ;
Gai, Keke .
2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, :19-24
[4]   Efficient Two-Dimensional Data Allocation in IEEE 802.16 OFDMA [J].
Cicconetti, Claudio ;
Lenzini, Luciano ;
Lodi, Andrea ;
Martello, Silvano ;
Mingozzi, Enzo ;
Monaci, Michele .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2014, 22 (05) :1645-1658
[5]  
Gai K., 2015, Security and Communication Networks, P1, DOI DOI 10.1109/CSCLOUD.2015.73
[6]  
Gai K., 2014, Journal of Information System Applied Research, V7, P28
[7]   Security-Aware Efficient Mass Distributed Storage Approach for Cloud Systems in Big Data [J].
Gai, Keke ;
Qiu, Meikang ;
Zhao, Hui .
2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, :140-145
[8]   Efficiency-Aware Workload Optimizations of Heterogeneous Cloud Computing for Capacity Planning in Financial Industry [J].
Gai, Keke ;
Du, Zhihua ;
Qiu, Meikang ;
Zhao, Hui .
2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, :1-6
[9]   Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing [J].
Gai, Keke ;
Qiu, Meikang ;
Zhao, Hui ;
Tao, Lixin ;
Zong, Ziliang .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 59 :46-54
[10]   Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry [J].
Gai, Keke ;
Qiu, Meikang ;
Thuraisingham, Bhavani ;
Tao, Lixin .
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, :1332-1337