Preserving Privacy in Cloud Computing Environment Using Map Reduce Technique
نویسنده
چکیده
Most of the cloud services require users to share personal data like electronic medical record for data analysis and data mining, bringing privacy concerns. The data sets can be anonymized by using generalization method to attain such privacy requirement. At present the proportion of data in several cloud application growing greatly in congruence with the bid data trend, therefore it is a challenge for currently used software tools to capture , maintain and process such large-scale data within a suffient time. Consequently , it is difficult for achieving privacy due to their inefficiency in handling large scale data sets. In this paper, we propose a scalable two phase top down specialization(TDS) approach to anonymize large-scale data sets using map reduce technique on cloud computing. To achieve the specialization computation in a highly scalable way, we draft a group of creative map reduce jobs in both the phases of our approach. As a result, the experimental evaluation shows that the scalability and efficiency of TDS can be significantly enriched over existing approaches.
منابع مشابه
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملPRISM — Privacy-Preserving Search in MapReduce
We present PRISM, a privacy-preserving scheme for word search in cloud computing. Assuming a curious cloud provider, privacy of data stored in the cloud becomes an issue. The main challenge in the context of cloud computing is to design a scheme that achieves privacy while preserving the efficiency of cloud computing. Main approaches like simple encryption, Private Information Retrieval (PIR) a...
متن کاملVM Consolidation by using Selection and Placement of VMs in Cloud Datacenters
The Cloud Computing model leverages virtualization of computing resources allowing customers to provision resources on-demand on a pay-as-you-go basis. During recent years, the power consumption of datacenters in cloud environment attracted researchers. Optimization of energy consumption can be performed by different methods including virtual machine (VM) consolidation. This technique can reduc...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کامل