A Retrievable Data Perturbation Method Used in Privacy-Preserving in Cloud Computing

被引:16
|
作者
Yang Pan [1 ,2 ]
Gui Xiaolin [1 ,2 ]
An Jian [1 ,2 ]
Yao Jing [1 ,2 ]
Lin Jiancai [1 ,2 ]
Tian Feng [1 ,2 ]
机构
[1] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian 710049, Peoples R China
[2] Xi An Jiao Tong Univ, Shaanxi Prov Key Lab Comp Network, Xian 710049, Peoples R China
基金
高等学校博士学科点专项科研基金;
关键词
privacy-preserving; data perturbation; retrieval; access control; cloud computing; DATA SETS; ANONYMITY; MODEL;
D O I
10.1109/CC.2014.6911090
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the increasing popularity of cloud computing, privacy has become one of the key problem in cloud security. When data is outsourced to the cloud, for data owners, they need to ensure the security of their privacy; for cloud service providers, they need some information of the data to provide high QoS services; and for authorized users, they need to access to the true value of data. The existing privacy-preserving methods can't meet all the needs of the three parties at the same time. To address this issue, we propose a retrievable data perturbation method and use it in the privacy-preserving in data outsourcing in cloud computing. Our scheme comes in four steps. Firstly, an improved random generator is proposed to generate an accurate "noise". Next, a perturbation algorithm is introduced to add noise to the original data. By doing this, the privacy information is hidden, but the mean and covariance of data which the service providers may need remain unchanged. Then, a retrieval algorithm is proposed to get the original data back from the perturbed data. Finally, we combine the retrievable perturbation with the access control process to ensure only the authorized users can retrieve the original data. The experiments show that our scheme perturbs date correctly, efficiently, and securely.
引用
收藏
页码:73 / 84
页数:12
相关论文
共 50 条
  • [1] Privacy-Preserving Data Sharing in Cloud Computing
    王慧
    JournalofComputerScience&Technology, 2010, 25 (03) : 401 - 414
  • [2] Privacy-Preserving Data Sharing in Cloud Computing
    Wang, Hui
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (03) : 401 - 414
  • [3] Privacy-Preserving Data Sharing in Cloud Computing
    Hui Wang
    Journal of Computer Science and Technology, 2010, 25 : 401 - 414
  • [4] A Proposal of Privacy-Preserving Data Aggregation on the Cloud Computing
    Ushida, Mebae
    Itoh, Kouichi
    Katayama, Yoshinori
    Kozakura, Fumihiko
    Tsuda, Hiroshi
    2013 16TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2013), 2013, : 141 - 148
  • [5] Hybrid Solution for Privacy-Preserving Data Mining on the Cloud Computing
    Osman, Huda
    Maarof, Mohd Aizaini
    Siraj, Maheyzah Md
    EMERGING TRENDS IN INTELLIGENT COMPUTING AND INFORMATICS: DATA SCIENCE, INTELLIGENT INFORMATION SYSTEMS AND SMART COMPUTING, 2020, 1073 : 748 - 758
  • [6] Efficient Privacy-Preserving Spatial Data Query in Cloud Computing
    Miao, Yinbin
    Yang, Yutao
    Li, Xinghua
    Wei, Linfeng
    Liu, Zhiquan
    Deng, Robert H.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (01) : 122 - 136
  • [7] Privacy-preserving multikey computing framework for encrypted data in the cloud
    Zhang, Jun
    Jiang, Zoe L.
    Li, Ping
    Yiu, Siu Ming
    INFORMATION SCIENCES, 2021, 575 : 217 - 230
  • [8] Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication
    Alkhojandi, Naelah
    Miri, Ali
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 35 - 48
  • [9] Review on privacy-preserving data comparison protocols in cloud computing
    Jiang, Leqi
    Xia, Zhihua
    Sun, Xingming
    AI AND CLOUD COMPUTING, 2021, 120 : 81 - 119
  • [10] Privacy-Preserving Recommendation Based on Kernel Method in Cloud Computing
    Li, Tao
    Qian, Qi
    Ren, Yongjun
    Ren, Yongzhen
    Xia, Jinyue
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 66 (01): : 779 - 791