Privacy-Aware Adaptive Data Encryption Strategy of Big Data in Cloud Computing

被引:63
作者
Gai, Keke [1 ]
Qiu, Meikang [1 ]
Zhao, Hui [2 ]
Xiong, Jian [3 ]
机构
[1] Pace Univ, Dept Comp Sci, New York, NY 10038 USA
[2] Henan Univ, Software Sch, Kaifeng 475000, Henan, Peoples R China
[3] Shanghai Jiao Tong Univ, IICNE, Shanghai 200030, Peoples R China
来源
2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD) | 2016年
基金
美国国家科学基金会;
关键词
Privacy protection; data encryption; big data; cloud computing; selective encryption strategy; time constraints; ALLOCATION; SYSTEMS;
D O I
10.1109/CSCloud.2016.52
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Privacy issues have become a considerable issue while the applications of big data are growing dramatically fast in cloud computing. The benefits us implementing these emerging technologies have improved or changed service models and improve application performances in various perspectives. However, the remarkably growing volume of data sizes has also resulted in many challenges in practice. The time execution of encrypting data is one of the serious issues during the processes of data processing and transmissions. Many current applications abandon data encryptions in order to reach an adoptive performance level, companions with privacy concerns. In this paper, we concentrate on privacy issue and propose a novel data encryption approach, named as Dynamic Data Encryption Strategy (D2ES). Our proposed approach aims to selectively encrypt data using privacy classification methods under timing constraints. This approach is designed to maximize the privacy protection scope by using a selective encryption strategy within the required execution time requirements. The performance of D2ES has been evaluated in our experiments, which provides the proof of the privacy enhancement.
引用
收藏
页码:273 / 278
页数:6
相关论文
共 25 条
[11]   Electronic Health Record Error Prevention Approach Using Ontology in Big Data [J].
Gai, Keke ;
Qiu, Meikang ;
Chen, Li-Chiou ;
Liu, Meiqin .
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, :752-757
[12]   Towards Cloud Computing: A Literature Review on Cloud Computing and its Development Trends [J].
Gai, Keke ;
Li, Saier .
2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, :142-146
[13]   Meta Meta-Analytics for Risk Forecast Using Big Data Meta-Regression in Financial Industry [J].
Jean-Baptiste, Hevel ;
Qiu, Meikang ;
Gai, Keke ;
Tao, Lixin .
2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, :272-277
[14]   Resource allocation robustness in multi-core embedded systems with inaccurate information [J].
Li, Jiayin ;
Ming, Zhong ;
Qiu, Meikang ;
Quan, Gang ;
Qin, Xiao ;
Chen, Tianzhou .
JOURNAL OF SYSTEMS ARCHITECTURE, 2011, 57 (09) :840-849
[15]   Intercrossed Access Controls for Secure Financial Services on Multimedia Big Data in Cloud Systems [J].
Li, Yibin ;
Gai, Keke ;
Ming, Zhong ;
Zhao, Hui ;
Qiu, Meikang .
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2016, 12 (04)
[16]   Internet-Based Anti-Counterfeiting Pattern with Using Big Data in China [J].
Liang, Hongyu ;
Gai, Keke .
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, :1387-1392
[17]   RuleSN: Research and Application of Social Network Access Control Model [J].
Ma, Li ;
Tao, Lixin ;
Zhong, Yong ;
Gai, Keke .
2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, :418-423
[18]   Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability [J].
Niu, Jianwei ;
Gao, Yuhang ;
Qiu, Meikang ;
Ming, Zhong .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2012, 72 (12) :1565-1575
[19]   Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry [J].
Qiu, Meikang ;
Gai, Keke ;
Thuraisingham, Bhavani ;
Tao, Lixin ;
Zhao, Hui .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :421-429
[20]   Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm [J].
Qiu, Meikang ;
Ming, Zhong ;
Li, Jiayin ;
Gai, Keke ;
Zong, Ziliang .
IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (12) :3528-3540