期刊文献+

Research of Privacy Preservation Method Based on Data Coloring 被引量:1

Research of Privacy Preservation Method Based on Data Coloring
下载PDF
导出
摘要 In the cloud computing environment, outsourcing service mode of data storage causes the security problem, the reliability of data cannot be guaranteed, and the privacy preservation problem has aroused wide concern. In order to solve the problem of inefficiency and high-complexity caused by traditional privacy preservation methods such as data encryption and access control technology, a privacy preservation method based on data coloring is proposed. The data coloring model is established and the coloring mechanism is adopted to deal with the sensitive data of numerical attributes, and the cloud model similarity measurement based on arithmetic average least-approximability is adopted to authenticate the ownership of privacy data. On the premise of high availability of data, the method strengthens the security of the privacy information. Then, the performance, validity and the parameter errors of the algorithm are quantitatively analyzed by the experiments using the UCI dataset. Under the same conditions of privacy preservation requirements, the proposed method can track privacy leakage efficiently and reduce privacy leakage risks. Compared with the k-anonymity approach, the proposed method enhances the computational time efficiency by 18.5%. In the cloud computing envi- ronment, outsourcing service mode of data storage causes the security problem, the reli- ability of data cannot be guaranteed, and the privacy preservation problem has aroused wide concem. In order to solve the problem of inefficiency and high-complexity caused by traditional privacy preservation methods such as data encryption and access control technol- ogy, a privacy preservation method based on data coloring is proposed. The data coloring model is established and the coloring mecha- nism is adopted to deal with the sensitive data of numerical attributes, and the cloud model similarity measurement based on arithmetic average least-approximability is adopted to authenticate the ownership of privacy data. On the premise of high availability of data, the method strengthens the security of the privacy information. Then, the performance, validity and the parameter errors of the algorithm are quantitatively analyzed by the experiments using the UCI dataset. Under the same condi- tions of privacy preservation requirements, the proposed method can track privacy leakage efficiently and reduce privacy leakage risks. Compared with the k-anonymity approach, the proposed method enhances the computational time efficiency by 18.5%.
出处 《China Communications》 SCIE CSCD 2016年第10期181-197,共17页 中国通信(英文版)
基金 supported by the National Natural Science Foundation of China under Grant No.61272458 Shaanxi Provinces Natural Science Basic Research Planning Project under Grant No.2014JM2-6119 Yu Lin Industry-Academy-Research Cooperation Project under Grant No.2014CXY-12
关键词 data coloring privacy preservation cloud model cloud similarity data coloring privacy preserva-tion cloud model cloud similarity
  • 相关文献

参考文献10

二级参考文献100

  • 1王连强,张剑,吕述望,刘振华.一种基于密码的层次访问控制方案及其分析[J].计算机工程与应用,2005,41(33):7-10. 被引量:2
  • 2张淼,徐国爱,胡正名,杨义先.可信计算环境下基于主机身份的一次性密钥交换协议[J].电子与信息学报,2007,29(6):1348-1351. 被引量:2
  • 3Arrnbrust M, Fox A, Griffith R, et al. Abovc the elouds: A berkeley view of cloud eompuling, UCB/EECS 2009 28 [R]. Berkeley: University of California, EECS Department, 2009.
  • 4Chow R, Golle P, Jakobsson M, et al. Controlling data in the cloud: Outsourcing computation without oulsourcing control [C] //Proc of the 2009 ACM Workshop on Cloud Computing Security. New York: ACM, 2009:85-90.
  • 5Ristenpart T, Tromer E, Shacham H, et al. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds [C] //Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:199-212.
  • 6Amazon Inc. Amazon Web services cuslomer agreement [EB/OL]. [2009-10-01]. http://aws, amazon. corn/agreement/# 7.
  • 7Chen Haibo, Chen Jieyun, Mao Wenbo, et al. Daonity grid security from two levels of virtualization [J]. Information Security Technical Report, 2007, 12(3): 123-138.
  • 8Cben X, Oarfinkel T, Lewis E, et al. Overshadow: A virtualization based approach to retrofitting protection in commodity operating systems [C] //Proc of the lath lnt Conf on Architectural Support for Programming Languages and Operating Systems. New York: ACM, 2008: 2-13.
  • 9Yang J, Shin K. Using hypervisor to provide data secrecy for user applications on a per-page basis [C] //Proc of the 4th ACM SIGPLAN/SIGOPS lnt Conf on Virtual Execution Environments. New York: ACM, 2008:71-80.
  • 10Chen Haibo, Zhang Fengzhe, Chen Cheng, et al. Tamper- resistant execution in an untrusted operating system using a virtual maehine monitor, 2007-08001 [R]. Shanghai: Fudan University, Parallel Processing Institute, 2007.

共引文献519

同被引文献11

引证文献1

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部