An Incremental Clustering Technique to Privacy Preservation Over Incremental Cloud Data


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


A massive computation power and storage capacity is offered by the cloud computing to the users to use the applications without infrastructure investment. For operational convenience and for economic advantages, a lot of privacy sensitive applications like health services are built on cloud. Typically, the data sets in these applications are anonymized to assert the privacy of data owners but the privacy requirements can be violated when new data join over time. In this paper, a set of records are given as input and some attributes are chosen as quasi-identifiers for data anonymization and the set of records are clustered based on k-means clustering technique. The k-anonymity constraint and information loss is checked for each cluster and the cluster is modified based on the k-anonymity constraint. Thereafter, new records are added after choosing the quasi-identifiers and after anonymize it. The new records get group with any cluster based on the k-anonymity constraint.
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


Anonymization; Quasi-Identifier; Cloud Computing; Incremental Clustering; Information Loss

Full Text:

PDF


References


Siani, P., S. Yun and M. Miranda, “A privacy manager for cloud computing,” Cloud Computing, vol.5931, pp. 90-106, 2009.

Jian, W., Z. Yan, J. Shuo and L. Jiajin ,”Providing privacy preserving in cloud computing,” International Conference on Test and Measurement, 5-6 Dec., Coll. of Inf. Sci. and Technol., Donghua Univ., Shanghai, China, vol.2,pp. 213-216,2009.

Jian, W., L. Yongcheng, J. Shuo and L. Jiajin, ”A survey on anonymity-based privacy preserving,” International Conference on E-Business and Information System Security, 23-24 May, Coll. of Inf. Sci. Technol., Donghua Univ., Shanghai, pp: 1-4,2009.

M. Srivatsa and L. Liu. Secure event dissemination in publish-subscribe networks. Proc.of IEEE ICDCS, 2007.

K. Minami, A. J. Lee, M. Winslett, and N. Borisov, ”Secure aggregation in a publish-subscribe system,” Proc. of the 7th ACM WPES, pp. 95–104, 2008.

M Nabeel, N Shang, E Bertino, ”Privacy-Preserving Filtering and Covering in Content Based Publish Subscribe System,” https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/2009-15-report.pdf

Blog service hosted by google crashes review.http://hostwisely.com/blog/blog-service-hosted-by-google-crashes/.

”Microsoft cloud data breach heralds things to come,” http://www.techworld.com.au/article/372111/.

“Summary of the amazon ec2 and amazon rds service disruption in the us east region,” http://aws.amazon.com/message/65648/.

Zack Whittaker, “Amazon web services suffers partial outage,” http://www.zdnet.com/blog/btl/amazon-web-services-suffers-partial-outage/79981.

Mathew J. Schwartz. 6 worst data breaches of 2011, 2011. http://www.informationweek.com/news/security/attacks/232301079.

Aaron Souppouris. Linkedin investigating reports that 6.46 million hashed passwords have leaked online, 2012.

Darlene Storm. Epsilon breach: hack of the century? 2011.

A. Weiss, “Computing in the Clouds,” Networker, vol.1, no.4, pp.16-25, Dec. 2007.

Michael Armbrust, Armando Fox, and et al., ”Above the clouds: A Berkeley view of cloud computing,” Technical Report UCB-EECS-2009-28, University of California, Berkeley.

M. Armbrust et al., Above the Clouds: A Berkeley View of Cloud Computing, Berkeley, California, USA, 2010, http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html, accessed on January 21, 2011.

S. Pearson, Y. Shen, M. Mowbray, ”A privacy manager for cloud computing,” in: Proceedings of The 1st International Conference on Cloud Computing, Beijing, China, December 1–4, pp. 90–106,2009.

S. Pearson, “Taking account of privacy when designing cloud computing services,” in: Proceedings of the 2009 ICSE (International Conference on Software Engineering) Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, Canada, May 23, pp. 44–52,2009.

Meena Dilip Singh,P. Radha Krishna,Ashutosh Saxena, "A Cryptography Based Privacy Preserving Solution to Mine Cloud Data," Proceedings of the Third Annual ACM Bangalore Conference, 2010.

Rajeev Bedi, Mohit Marwaha, Tajinder Singh, Harwinder Singh and Amritpal Singh, “Analysis of different privacy preserving Cloud storage frameworks,” International Journal of Computer Science & Information Technology (IJCSIT), Vol.3, No.6, Dec 2011.

Xuyun Zhang, Chang Liu, Surya Nepal, Jinjun Chen, "An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud, “Journal of Computer and System Sciences, 2012.

Gaofeng Zhang, Yun Yang, Xiao Liu,Jinjun Chen,"A Time-series Pattern based Noise Generation Strategy for Privacy Protection in Cloud Computing,"2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, 2012.

Gaofeng Zhang,YunYang, Jinjun Chen,"A historical probability based noise generation strategy for privacy protection in cloud computing,” Journal of Computer and System Sciences,vol.78,pp.1374–1381, 2012.

K.Kiran Kumar, K.Padmaja, P.Radha Krishna, “Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing," Cloud Computing,Vol.PP,No.99, 2012.

Remya Rajan, ”Efficient and privacy preserving multi User keyword search for cloud Storage services,” International Journal of Advanced Technology & Engineering Research (IJATER), Vol.2, No.4, July 2012.

UCI machine learning repository from “http://archive.ics.uci.edu/ml/datasets.html”.

Wang, J., An effective min-attribute generalization algorithm to protect private data based cloud environment, (2012) International Review on Computers and Software (IRECOS), 7 (3), pp. 1199-1203.

Dong, G., Jiang, L., Liu, C., Based on cloud computing inventory and distribution management platforms, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 2837-2842.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize