期刊文献+

云环境数据发布服务中隐私保护相关技术研究 被引量:2

A Survey on Privacy Preserving for Micro Data Releasing in Cloud Computing Scenario
下载PDF
导出
摘要 云计算环境下数据库服务应用系统中的隐私保护问题是影响组织是否选择相关服务的重要因素之一,本文界定了云计算数据库服务应用系统架构;分析了基于密码学理论实现访问控制方法的不足,探讨了云计算环境下支持多管理域合成的访问控制模型;研究了云计算环境数据动态变化场景下的用户隐私保护问题;介绍了经典数据发布模型,对比了发布数据效用度量方法。最后指出云计算环境数据发布服务中隐私保护的热点研究方向。 Data releasing service is one of the important issues in cloud computing platform. Privacy preserving on database application and service system is one of upmost factor which results if organization choices related such services in cloud computing environment. Therefore, it has important academic value and application prospect to study privacy preserving in cloud computing environment. Architecture of database application system in cloud scenario was defined; the ineKicient of AC merged with cryptog- raphy was analyzed; access control problem in multi - domain database application systems was discussed; fmthermore individual's privacy preserving issue in dynamic situation was studied; the classical privacy preserving model for data releasing situation was presented; data utility measurement methods for released data set were compared. Finally active research topics of database service in cloud computing environment were presented.
出处 《现代情报》 CSSCI 2012年第12期3-7,共5页 Journal of Modern Information
基金 教育部人文社会科学研究规划基金项目(项目编号:12YJA630136) 安徽省自然科学基金项目(项目编号:11040606M140)
关键词 云计算 数据发布 隐私保护 K-匿名 cloud computing data releasing privacy preserve k- anonymity
  • 相关文献

参考文献30

  • 1Curino C, Jones E, Popa R et al. Relational Cloud: A Database- as - a - Service for the Cloud. 5th Conf. on Innovative Data Systems Research, CIDR 2011, January 9 - 12, 2011 Asilomar, California.
  • 2Choubey R, Dubry R, Bhattacharjee J. A Survey on Cloud Comput-ing Security Challenges and Threats. Int. Journal on Computer Scienceand Engineering, 2011, 3 (3): 1227-1231.
  • 3Dudin E, Smetanin Y. A Review of Cloud Computing [J]. Scientific and Technical Information Processing, 2011, 38 (4): 280-284.
  • 4Zhaag Q, Cheng L, Boutaba R. Cloud Computing: State - of- the Art and Research Challenge. Journal of Intemet Serv Appl, 2010, 1: 7- 18.
  • 5Hamlen K, Kantarcioglu M, Khan Let al. Security Issues for Cloud Computing [J]. Intematioual Journal of Infonnatiou Security and Privacy, 2010, 4 (2): 39-51.
  • 6Ma H, Schewe'K, Thalheim Bet el. A Formal Model for the Intevop- embility of Service Clouds. Service Oriented Computing and Applications, Online First, 18 Jan 2012.
  • 7Amazon Security BuUetias [EB/OL]. http://aws.amazon.com/sccu- rity/securlty bullciins/, 2011.
  • 8Google [EB/OL]. hap://googledocs, blogspot, com/2009/03/just - t o- clarify.htral , 2009.
  • 9Microsoft [ EB/OL]. http://www, microsoft, com/technet/security/, 2010.
  • 10Samarati P, Sweeney L. Generalizing data to provide anonymity when disclosing infonmtion [ C] //Proc of the seventeenth ACM SIGACT- SIGMOD- SIGART symposium on Principles of database systems, Sea.e, 1998: 188.

二级参考文献108

  • 1HUAI Jinpeng HU Chunming LI Jianxin SUN Hailong WO Tianyu.CROWN:A service grid middleware with trust management mechanism[J].Science in China(Series F),2006,49(6):731-758. 被引量:8
  • 2Arrnbrust M, Fox A, Griffith R, et al. Abovc the elouds: A berkeley view of cloud eompuling, UCB/EECS 2009 28 [R]. Berkeley: University of California, EECS Department, 2009.
  • 3Chow R, Golle P, Jakobsson M, et al. Controlling data in the cloud: Outsourcing computation without oulsourcing control [C] //Proc of the 2009 ACM Workshop on Cloud Computing Security. New York: ACM, 2009:85-90.
  • 4Ristenpart T, Tromer E, Shacham H, et al. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds [C] //Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:199-212.
  • 5Amazon Inc. Amazon Web services cuslomer agreement [EB/OL]. [2009-10-01]. http://aws, amazon. corn/agreement/# 7.
  • 6Chen Haibo, Chen Jieyun, Mao Wenbo, et al. Daonity grid security from two levels of virtualization [J]. Information Security Technical Report, 2007, 12(3): 123-138.
  • 7Cben X, Oarfinkel T, Lewis E, et al. Overshadow: A virtualization based approach to retrofitting protection in commodity operating systems [C] //Proc of the lath lnt Conf on Architectural Support for Programming Languages and Operating Systems. New York: ACM, 2008: 2-13.
  • 8Yang J, Shin K. Using hypervisor to provide data secrecy for user applications on a per-page basis [C] //Proc of the 4th ACM SIGPLAN/SIGOPS lnt Conf on Virtual Execution Environments. New York: ACM, 2008:71-80.
  • 9Chen Haibo, Zhang Fengzhe, Chen Cheng, et al. Tamper- resistant execution in an untrusted operating system using a virtual maehine monitor, 2007-08001 [R]. Shanghai: Fudan University, Parallel Processing Institute, 2007.
  • 10Dewan P, Durham D, Khosravi H, et al. A hypervisor based system for protecting software runtime memory and persistent storage [C] //Proe of the 2008 Spring Simulation Multiconference. New York: ACM, 2008:828-835.

共引文献975

同被引文献5

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部