Privacy-Preserving Data Sharing in Cloud Computing

被引:0
|
作者
Hui Wang
机构
[1] Stevens Institute of Technology,Department of Computer Science
[2] Castle Point on Hudson,undefined
来源
Journal of Computer Science and Technology | 2010年 / 25卷
关键词
privacy; data sharing; anonymity; utility; cloud computing;
D O I
暂无
中图分类号
学科分类号
摘要
Storing and sharing databases in the cloud of computers raise serious concern of individual privacy. We consider two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (or not in) the database, and association leakage, by which the attackers can unambiguously associate individuals with sensitive information. However, the existing privacy-preserving data sharing techniques either fail to protect the presence privacy or incur considerable amounts of information loss. In this paper, we propose a novel technique, Ambiguity, to protect both presence privacy and association privacy with low information loss. We formally define the privacy model and quantify the privacy guarantee of Ambiguity against both presence leakage and association leakage. We prove both theoretically and empirically that the information loss of Ambiguity is always less than the classic generalization-based anonymization technique. We further propose an improved scheme, PriView, that can achieve better information loss than Ambiguity. We propose efficient algorithms to construct both Ambiguity and PriView schemes. Extensive experiments demonstrate the effectiveness and efficiency of both Ambiguity and PriView schemes.
引用
收藏
页码:401 / 414
页数:13
相关论文
共 50 条
  • [11] Privacy-preserving multikey computing framework for encrypted data in the cloud
    Zhang, Jun
    Jiang, Zoe L.
    Li, Ping
    Yiu, Siu Ming
    INFORMATION SCIENCES, 2021, 575 : 217 - 230
  • [12] Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication
    Alkhojandi, Naelah
    Miri, Ali
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 35 - 48
  • [13] Review on privacy-preserving data comparison protocols in cloud computing
    Jiang, Leqi
    Xia, Zhihua
    Sun, Xingming
    AI AND CLOUD COMPUTING, 2021, 120 : 81 - 119
  • [14] Privacy-Preserving and Secure Sharing of PHR in the Cloud
    Zhang, Leyou
    Wu, Qing
    Mu, Yi
    Zhang, Jingxia
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (12)
  • [15] Privacy-Preserving and Secure Sharing of PHR in the Cloud
    Leyou Zhang
    Qing Wu
    Yi Mu
    Jingxia Zhang
    Journal of Medical Systems, 2016, 40
  • [16] Privacy-preserving cloud data sharing for healthcare systems with hybrid blockchain
    Raghav
    Andola, Nitish
    Venkatesan, S.
    Verma, Shekhar
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (05) : 2525 - 2547
  • [17] Privacy-preserving data sharing scheme over cloud for social applications
    Lyu, Chen
    Sun, Shi-Feng
    Zhang, Yuanyuan
    Pande, Amit
    Lu, Haining
    Gu, Dawu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 74 : 44 - 55
  • [18] Privacy-preserving cloud data sharing for healthcare systems with hybrid blockchain
    Nitish Raghav
    S Andola
    Shekhar Venkatesan
    Peer-to-Peer Networking and Applications, 2023, 16 (5) : 2525 - 2547
  • [19] Privacy-Preserving Federated Data Sharing
    Fioretto, Ferdinando
    Van Hentenryck, Pascal
    AAMAS '19: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS, 2019, : 638 - 646
  • [20] Privacy-preserving cloud data sharing for healthcare systems with hybrid blockchain
    Raghav, Nitish
    Andola, Nitish
    Venkatesan, S.
    Verma, Shekhar
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023,