A Retrievable Data Perturbation Method Used in Privacy-Preserving in Cloud Computing

被引:16
|
作者
Yang Pan [1 ,2 ]
Gui Xiaolin [1 ,2 ]
An Jian [1 ,2 ]
Yao Jing [1 ,2 ]
Lin Jiancai [1 ,2 ]
Tian Feng [1 ,2 ]
机构
[1] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian 710049, Peoples R China
[2] Xi An Jiao Tong Univ, Shaanxi Prov Key Lab Comp Network, Xian 710049, Peoples R China
基金
高等学校博士学科点专项科研基金;
关键词
privacy-preserving; data perturbation; retrieval; access control; cloud computing; DATA SETS; ANONYMITY; MODEL;
D O I
10.1109/CC.2014.6911090
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the increasing popularity of cloud computing, privacy has become one of the key problem in cloud security. When data is outsourced to the cloud, for data owners, they need to ensure the security of their privacy; for cloud service providers, they need some information of the data to provide high QoS services; and for authorized users, they need to access to the true value of data. The existing privacy-preserving methods can't meet all the needs of the three parties at the same time. To address this issue, we propose a retrievable data perturbation method and use it in the privacy-preserving in data outsourcing in cloud computing. Our scheme comes in four steps. Firstly, an improved random generator is proposed to generate an accurate "noise". Next, a perturbation algorithm is introduced to add noise to the original data. By doing this, the privacy information is hidden, but the mean and covariance of data which the service providers may need remain unchanged. Then, a retrieval algorithm is proposed to get the original data back from the perturbed data. Finally, we combine the retrievable perturbation with the access control process to ensure only the authorized users can retrieve the original data. The experiments show that our scheme perturbs date correctly, efficiently, and securely.
引用
收藏
页码:73 / 84
页数:12
相关论文
共 50 条
  • [31] Privacy-Preserving Pattern Matching over Encrypted Genetic Data in Cloud Computing
    Wang, Bing
    Song, Wei
    Lou, Wenjing
    Hou, Y. Thomas
    IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [32] Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing
    Dong, Xin
    Yu, Jiadi
    Luo, Yuan
    Chen, Yingying
    Xue, Guangtao
    Li, Minglu
    COMPUTERS & SECURITY, 2014, 42 : 151 - 164
  • [33] Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in Cloud Computing
    Li, Qi
    Tian, Youliang
    Zhang, Yinghui
    Shen, Limin
    Guo, Jingjing
    IEEE ACCESS, 2019, 7 : 131534 - 131542
  • [34] A privacy-preserving cross-media retrieval on encrypted data in cloud computing
    Wang, Zhangdong
    Qin, Jiaohua
    Xiang, Xuyu
    Tan, Yun
    Peng, Jia
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 73
  • [35] Privacy-preserving location data stream clustering on mobile edge computing and cloud
    Stephanie, Veronika
    Chamikara, M. A. P.
    Khalil, Ibrahim
    Atiquzzaman, Mohammed
    INFORMATION SYSTEMS, 2022, 107
  • [36] Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing
    Samanthula, Bharath K.
    Jiang, Wei
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 51 - 58
  • [37] A Blockchain-Assisted Privacy-Preserving Cloud Computing Method with Multiple Keys
    Huang, Liangqun
    Xu, Lei
    Zhu, Liehuang
    Gai, Keke
    2021 IEEE 6TH INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2021), 2021, : 19 - 25
  • [38] Privacy-Preserving Protocol for Data Stored in the Cloud
    Hongyi Su Geng Yang Dawei Li (College of Computer Science
    ZTE Communications, 2011, 9 (02) : 36 - 38
  • [39] Privacy-Preserving Access to Big Data in the Cloud
    Li, Peng
    Guo, Song
    Miyazaki, Toshiaki
    Xie, Miao
    Hu, Jiankun
    Zhuang, Weihua
    IEEE CLOUD COMPUTING, 2016, 3 (05): : 34 - 42
  • [40] Cloud Data Security Access with Privacy-Preserving
    Wang, Jingyu
    Gu, Ruichun
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 268 - 271