• DocumentCode
    30813
  • Title

    A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud

  • Author

    Xuyun Zhang ; Chang Liu ; Nepal, Surya ; Pandey, Shishir ; Jinjun Chen

  • Author_Institution
    Fac. of Eng. & IT, Univ. of Technol. Sydney, Sydney, NSW, Australia
  • Volume
    24
  • Issue
    6
  • fYear
    2013
  • fDate
    Jun-13
  • Firstpage
    1192
  • Lastpage
    1202
  • Abstract
    Cloud computing provides massive computation power and storage capacity which enable users to deploy computation and data-intensive applications without infrastructure investment. Along the processing of such applications, a large volume of intermediate data sets will be generated, and often stored to save the cost of recomputing them. However, preserving the privacy of intermediate data sets becomes a challenging problem because adversaries may recover privacy-sensitive information by analyzing multiple intermediate data sets. Encrypting ALL data sets in cloud is widely adopted in existing approaches to address this challenge. But we argue that encrypting all intermediate data sets are neither efficient nor cost-effective because it is very time consuming and costly for data-intensive applications to en/decrypt data sets frequently while performing any operation on them. In this paper, we propose a novel upper bound privacy leakage constraint-based approach to identify which intermediate data sets need to be encrypted and which do not, so that privacy-preserving cost can be saved while the privacy requirements of data holders can still be satisfied. Evaluation results demonstrate that the privacy-preserving cost of intermediate data sets can be significantly reduced with our approach over existing ones where all data sets are encrypted.
  • Keywords
    cloud computing; cryptography; data privacy; ALL data set encryption; cloud computing; cost-effective privacy preservation; data set decryption; intermediate data sets; privacy leakage upper bound constraint-based approach; privacy-sensitive information; Computational modeling; Data privacy; Encryption; Joints; Privacy; Upper bound; Cloud computing; data storage privacy; intermediate data set; privacy preserving; privacy upper bound;
  • fLanguage
    English
  • Journal_Title
    Parallel and Distributed Systems, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1045-9219
  • Type

    jour

  • DOI
    10.1109/TPDS.2012.238
  • Filename
    6263245