Privacy-Preserving Data Sharing in Cloud Computing

被引:0
作者
Hui Wang
机构
[1] Stevens Institute of Technology,Department of Computer Science
[2] Castle Point on Hudson,undefined
来源
Journal of Computer Science and Technology | 2010年 / 25卷
关键词
privacy; data sharing; anonymity; utility; cloud computing;
D O I
暂无
中图分类号
学科分类号
摘要
Storing and sharing databases in the cloud of computers raise serious concern of individual privacy. We consider two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (or not in) the database, and association leakage, by which the attackers can unambiguously associate individuals with sensitive information. However, the existing privacy-preserving data sharing techniques either fail to protect the presence privacy or incur considerable amounts of information loss. In this paper, we propose a novel technique, Ambiguity, to protect both presence privacy and association privacy with low information loss. We formally define the privacy model and quantify the privacy guarantee of Ambiguity against both presence leakage and association leakage. We prove both theoretically and empirically that the information loss of Ambiguity is always less than the classic generalization-based anonymization technique. We further propose an improved scheme, PriView, that can achieve better information loss than Ambiguity. We propose efficient algorithms to construct both Ambiguity and PriView schemes. Extensive experiments demonstrate the effectiveness and efficiency of both Ambiguity and PriView schemes.
引用
收藏
页码:401 / 414
页数:13
相关论文
共 50 条
[31]   Privacy-Preserving Contact Query Processing Over Trajectory Data in Mobile Cloud Computing [J].
Lu, Qu ;
Dai, Hua ;
Li, Pengyue ;
Wan, Shuyan ;
Yang, Geng ;
Xiang, Yang ;
Xiao, Fu .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2025, 24 (03) :1818-1832
[32]   Scalable and Privacy-Preserving Data Sharing Based on Blockchain [J].
Zheng, Bao-Kun ;
Zhu, Lie-Huang ;
Shen, Meng ;
Gao, Feng ;
Zhang, Chuan ;
Li, Yan-Dong ;
Yang, Jing .
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2018, 33 (03) :557-567
[33]   Scalable and Privacy-Preserving Data Sharing Based on Blockchain [J].
Bao-Kun Zheng ;
Lie-Huang Zhu ;
Meng Shen ;
Feng Gao ;
Chuan Zhang ;
Yan-Dong Li ;
Jing Yang .
Journal of Computer Science and Technology, 2018, 33 :557-567
[34]   Privacy Passport: Privacy-Preserving Cross-Domain Data Sharing [J].
Chen, Xue ;
Wang, Cheng ;
Yang, Qing ;
Teng, Hu ;
Jiang, Changjun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 :636-650
[35]   Privacy-preserving logistic regression outsourcing in cloud computing [J].
Zhu, Xu Dong ;
Li, Hui ;
Li, Feng Hua .
INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) :144-150
[36]   Privacy-preserving Association Rule Mining Algorithm for Encrypted Data in Cloud Computing [J].
Kim, Hyeong-Jin ;
Shin, Jae-Hwan ;
Song, Young-ho ;
Chang, Jae-Woo .
2019 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (IEEE CLOUD 2019), 2019, :487-489
[37]   An efficient privacy-preserving rank query over encrypted data in cloud computing [J].
Cheng, Fang-Quan ;
Peng, Zhi-Yong ;
Song, Wei ;
Wang, Shu-Lin ;
Cui, Yi-Hui .
Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (11) :2215-2227
[38]   Privacy-Preserving Data Sharing for Medical Research [J].
Fischer, Michael J. ;
Hochman, Jonathan E. ;
Boffa, Daniel .
STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, SSS 2021, 2021, 13046 :78-89
[39]   A privacy-preserving cross-media retrieval on encrypted data in cloud computing [J].
Wang, Zhangdong ;
Qin, Jiaohua ;
Xiang, Xuyu ;
Tan, Yun ;
Peng, Jia .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 73
[40]   Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing [J].
Samanthula, Bharath K. ;
Jiang, Wei .
2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, :51-58