Privacy Based Data Publishing Model for Cloud Computing Environment

被引:0
作者
J. V. Bibal Benifa
G. Venifa Mini
机构
[1] Indian Institute of Information Technology,
[2] Noorul Islam Centre for Higher Education,undefined
来源
Wireless Personal Communications | 2020年 / 113卷
关键词
Privacy; Utility; Information loss; Data publishing; Anonymization; GWO algorithm;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud computing is a popular model for providing data storage services from remote computing facilities through internet. Security is known as an element for protecting sensitive information from vulnerable attacks and ensuring information confidentiality, integrity and authenticity. Privacy is the assurance that users could maintain complete control over their sensitive information. Cloud storage-based data publication is significant in medical field where it contains sensitive information such as nature of the disease, patient medical history, and effects of the illness. The publisher should not disclose any of the individual or sensitive information of the individuals with the research board while publishing the reports to the medical data analysts. Deciding on the nature of sensitivity, the user may be allowed to access the information from cloud environment that is a complex process. In order to ensure the complete privacy of individual medical history, the present research work employs k-anonymization to upgrade the privacy policies in the cloud storage. In addition to this, the genetic grey wolf optimization algorithm is employed to decide the data to be published based on the information preserved for privacy purposes. The proposed work is evaluated in a real cloud infrastructure with respect to privacy, utility and information losses. The results show that the proposed method is efficient for privacy-based data publication as it conceals the sensitive information effectively.
引用
收藏
页码:2215 / 2241
页数:26
相关论文
共 107 条
  • [1] Ari AAA(2019)Enabling privacy and security in cloud of things: Architecture, applications, security and privacy challenges Applied Computing and Informatics 8 24-31
  • [2] Takabi H(2010)Security and privacy challenges in cloud computing environments IEEE Security and Privacy 50 102427-172
  • [3] Joshi JBD(2020)Privacy preserving integrity checking of shared dynamic cloud data with user revocation Journal of Information Security and Applications 5 167-1680
  • [4] Ahn G-J(2019)An improved privacy preservation technique in health-cloud ICT Express 9 1667-164
  • [5] Thokchom S(2014)A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing IEEE Transactions on Information Forensics and Security 76 146-110
  • [6] Saikia DK(2018)A hybrid auto-scaler for resource scaling in cloud environment Journal of Parallel and Distributed Computing 34 99-563
  • [7] Kundalwal MK(2015)Security, privacy and trust in Internet of Things: The road ahead Computer Networks 5 551-1191
  • [8] Chatterjee K(2018)Future trends in cloud computing Cloud Computing 24 1182-477
  • [9] Singh A(2018)The necessity of the implementation of privacy by design in sectors where data protection concerns arise Computer Law and Security Review 25 468-2385
  • [10] Liang K(2012)Social cloud computing: A vision for socially motivated resource sharing IEEE Transactions on Services Computing 65 2374-568