An Association Probability Based Noise Generation Strategy for Privacy Protection in Cloud Computing
نویسندگان
چکیده
Cloud computing allows customers to utilise IT services in a pay-asyou-go fashion to save huge cost on IT infrastructure. In open cloud, ‘malicious’ service providers could record service data from a cloud customer and collectively deduce the customer’s privacy without the customer’s permission. Accordingly, customers need to take certain actions to protect their privacy automatically at client sides, such as noise obfuscation. For instance, it can generate and inject noise service requests into real ones so that service providers are hard to distinguish which ones are real. Existing noise obfuscations focus on concealing occurrence probabilities of service requests. But in reality, association probabilities of service requests can also reveal customer privacy. So, we present a novel association probability based noise generation strategy by concealing these association probabilities. The simulation comparison demonstrates that this strategy can improve the effectiveness of privacy protection significantly from the perspective of association probability.
منابع مشابه
A historical probability based noise generation strategy for privacy protection in cloud computing
Article history: Received 21 August 2010 Received in revised form 20 May 2011 Accepted 8 December 2011 Available online xxxx
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کامل1.A Time-series Pattern based Noise Generation Strategy for Privacy
Cloud computing is an evolutionary domain, which many IT companies prefer to store huge investment of data. It involve a practice of using a network of remote servers hosted on internet to store, manage and process the data rather than a personal computer. One of the serious issue in cloud computing is security. In Cloud Computing, there is a great deal of uncertainty about how security at all ...
متن کاملTask Scheduling Algorithm Using Covariance Matrix Adaptation Evolution Strategy (CMA-ES) in Cloud Computing
The cloud computing is considered as a computational model which provides the uses requests with resources upon any demand and needs.The need for planning the scheduling of the user's jobs has emerged as an important challenge in the field of cloud computing. It is mainly due to several reasons, including ever-increasing advancements of information technology and an increase of applications and...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کامل