Preview

A Privacy Leakage Upper-Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Datasets in Cloud

Good Essays
Open Document
Open Document
895 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
A Privacy Leakage Upper-Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Datasets in Cloud
A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective Privacy Preserving of Intermediate Datasets In cloud

ABSTRACT

Cloud computing provides massive computation power and storage capacity which enable users to deploy computation and data intensive applications without infrastructure investment. Along the processing of such applications, a large volume of intermediate datasets will be generated, and often stored to save the cost of re-computing them. However, preserving the privacy of intermediate datasets becomes a challenging problem because adversaries may recover privacy-sensitive information by analyzing multiple intermediate datasets. Encrypting ALL datasets in cloud is widely adopted in existing approaches to address this challenge. But we argue that encrypting all intermediate datasets are neither efficient nor cost-effective because it is very time consuming and costly for data-intensive applications to en/decrypt datasets frequently while performing any operation on them. In this paper, we propose a novel upper-bound privacy leakage constraint based approach to identify which intermediate datasets need to be encrypted and which do not, so that privacy-preserving cost can be saved while the privacy requirements of data holders can still be satisfied. Evaluation results demonstrate that the privacy-preserving cost of intermediate datasets can be significantly reduced with our approach over existing ones where all datasets are encrypted.

EXISTING SYSTEM:

Existing technical approaches for preserving the priva-cy of datasets stored in cloud mainly include encryption and anonymization. On one hand, encrypting all datasets, a straightforward and effective approach, is widely adopted in current research . However, processing on encrypted datasets efficiently is quite a challenging task, because most existing applications only run on unencrypted datasets. However, preserving the privacy of intermediate datasets becomes a

You May Also Find These Documents Helpful

  • Best Essays

    With the unprecedented growth and spread of information, there is no wonder why large Information Technology companies have been investing in the “cloud”. To expand, when referring to Cloud Computing, this means to access and store information not stored with in your computer whether it be public, private, or hybrid cloud computing. In technological terms, the server you are accessing is somewhere else and therefore, the information and tools you are using are “up in the clouds” but more so stored in another server space. However, whether you are paying for services through software, total usage, or free usage (hence the types of cloud services) Cloud Computing seems to be everywhere. Yet, it is important to recognize what is to gain by using cloud computing from big businesses to individual users and what are some risky moves when utilizing cloud storage over the Internet. Hence, the content of this paper will discuss the pros and cons of cloud computing and where cloud computing is headed in todays online society.…

    • 1307 Words
    • 6 Pages
    Best Essays
  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Good Essays

    As a result of recent lawsuits against many organizations, companies have developed a policy on proper email practices on company computers. No longer is your personal email regarded as private when accessed on a company's computer. Companies, in order to decrease lawsuits and increase productivity, have purchased email monitoring software to track email usage during work hours. Therefore, with the onslaught of email monitoring, is a private email really private?…

    • 377 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Large enterprises have been reluctant to move certain files or apps to the cloud network. The market size for cloud is far behind what it was expected to be, and for good reason. Consumers have concerns with cloud computing security, especially when it involves data security and confidentiality issues. This article shows the legitimacy of concerns people are have when dealing with…

    • 2396 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    Cloud Security Report

    • 9993 Words
    • 40 Pages

    Cloud Computing is the result of a rapid evolution of computing technologies and a response to the new world business requirements. The adoption of the technology is widely accepted and its future is promising. However the cloud computing phenomena does not come without a risk. There are many issues of concerns that might slow the adoption of the cloud computing; most notably are the security concerns which come as a result of the complexity of cloud technologies and the wide parties involved with them. Issues such as cloud computing compliance and governance, cloud computing deployment and architectural models, virtualization, cloud computing applications, cloud operations, standards, guidelines, frameworks and contracting for cloud service provisioning are all necessary for any business to understand before adopting the technology. This report will explain the top security risks of using cloud service providers for essential business applications and how they can be identified using the cloud risk assessment process. It will also explore various topics related to cloud computing, including concepts and terminologies of cloud security, risk assessment, frameworks and standards. It will conclude with a scenario of a case study to explain the process of analyzing a cloud service provider services security; and to show some of the most common cloud computing risks that exist in the world.…

    • 9993 Words
    • 40 Pages
    Powerful Essays
  • Good Essays

    Week 3 Case Study CIS 500

    • 711 Words
    • 3 Pages

    Strader, whom is the CIO at Volvo, created vehicles that are data rich it environments given that consumers today highly value smart tech as much as automotive engineering. Volvo Car Corporation is one of the car industry’s most well-known brands. Volvo brand focuses on passengers and drivers; for the fact that the company strive to develop some of the safest cars on the road.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Privacy is a person’s right to control access to his or her personal information. Everybody value the protection of their personal information. No one wants to see some of their personal information made public, especially on the internet. However, the recent evolution of technology has started to threaten every individual’s privacy by reducing the amount of control that they had over their personal data and making it possible for people who do not have the proper authority to access them. According to Zalta (2014), the 21st century has become the century of Big Data and advanced Information Technology allows for the storage and processing of exabytes of data. The combination of increasing power of new technology and the declining clarity and agreement on privacy give…

    • 480 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Zhang, Y., Yang, L. T., Zhou, Y., & Kuang, W. (2010). Information security underlying transparent computing: Impacts, visions and challenges. Web Intelligence & Agent Systems, 8(2), 203-217…

    • 962 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Project Deliverable 5

    • 899 Words
    • 4 Pages

    Secrecy ensures the safety of data from illegal access throughout an organization’s information planning, which extends to all data directly linked with the architecture’s applications, data stores, communication links and/or processes.…

    • 899 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Cloud computing is one of the most recent revolutionary technologies in the world. The applications of Cloud computing is rapidly increasing in day to day life. Today the application of Cloud computing is so widespread that it is being used even in the health care industry. Although healthcare was once considered an industry that would not adopt cloud computing due to systemic security, legal, and privacy issues, that no longer seems to be the case. Those in healthcare IT are moving even farther into the world of cloud computing. As the evolution of cloud computing in health care is occurring at a rapid rate in recent times, we can expect a major part of the healthcare industry to move onto the cloud and thereby more focus is laid on providing a cost Effective and efficient healthcare service to the people all around the globe. Despite the common belief that certain boundaries and security issues of the cloud would hinder the shift, the healthcare industry is taking an initiative to move to these cloud based platforms. Cloud computing can transform the way healthcare is practiced by empowering professionals to deliver better healthcare services to their patients.…

    • 1553 Words
    • 5 Pages
    Best Essays
  • Good Essays

    assignment IST309

    • 1030 Words
    • 3 Pages

    The purpose of this paper is to talk about how security concerns of cloud computing matter to business as well as to other organizations and looking for the solution of the problems. Public cloud computing provides immense convenience but at the same time consists of huge privacy and security risks. The paper will discuss this problem from survey done by other researchers and the realistic problems cause by leakage of cloud data.…

    • 1030 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Census Bureau is the leading source of quality data about the Nation’s people and economy. It collects, analyzes and disseminates such data through surveys, decennial data collection activities, Federal, state and local sources and many private organizations, to its citizens and private and public organizations alike. In the process, the Bureau collects a lot of personally identifiable information (PII) through these sources. Therefore, the protection of these data and systems for collecting and processing is highly critical. Securing information resources should include controls and safeguards to offset possible threats and vulnerabilities both from external and internal sources. Additionally, controls to safeguard and ensure the confidentiality,…

    • 260 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cloud computing has been envisioned as the de-facto solution to the rising storage costs of IT Enterprises. With the high costs of data storage devices as well as the rapid rate at which data is being generated it proves costly for enterprises or individual users to frequently update their hardware. Apart from reduction in storage costs data outsourcing to the cloud also helps in reducing the maintenance. Cloud storage moves the user’s data to large data centers, which are remotely located, on which user does not have any control. However, this unique feature of the cloud poses many new security challenges which need to be clearly understood and resolved. We provide a scheme which gives a proof of data integrity in the cloud which the customer can employ to check the correctness of his data in the cloud. This proof can be agreed upon by both the cloud and the customer and can be incorporated in the Service level agreement (SLA).…

    • 6658 Words
    • 27 Pages
    Powerful Essays
  • Powerful Essays

    The Data Encryption Standard (DES) algorithm has been a popular secret key encryption algorithm and is used in many commercial and financial applications.…

    • 2451 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    The area of research discussed in this paper is about security challenges in cloud computing. I reviewed five papers, which are mentioned in this paper. First paper is about “emerging security challenges in cloud computing,” An insight to cloud security challenges and their mitigation”. It was presented by Akhil Behl [1] and it was published by IEEE on 2011 World Congress on Information Security and Communication Technologies. Second paper is about “Information Security Risk Management Framework for the Cloud Computing Environments”. It was presented by Xuan Zhang et al.[2], School of Information and Software, Yunnan University china and it was published by IEEE on 2010 10th International Conference on Computer and Information Technology. Third paper is about “MCDB: Using Multi-Clouds to ensure Security in Cloud Computing”. It was presented by Mohammad A. AlZain, et al.[3], Department of Computer Science and Computer Engineering, La Trobe University, Bundoora 3086, Australia and it was published by IEEE on 2011 9th International Conference on Dependable, Autonomic and Secure Computing. Fourth paper is about “attack sequence detection in Cloud using Hidden Markov Model” and it is presented by Chia-Mei Chen, et al. [4], and published on IEEE on 2012 seventh Asia Joint Conference on Information Security. Fifth paper is about “A novel Approach for Security in Cloud Computing using Hidden Markov Model and Clustering” and it was presented by Pardeep Kumar et al. [5]. It was published on IEEE on 2011 World Congress on Information and Communication Technologies.…

    • 922 Words
    • 4 Pages
    Good Essays