Abstract
Along with more and more data intensive applications have been migrated into cloud environments, storing some valuable intermediate datasets has been accommodated in order to avoid the high cost of re-computing them. However, this poses a risk on data privacy protection because malicious parties may deduce the private information of the parent dataset or original dataset by analyzing some of those stored intermediate datasets. The traditional way for addressing this issue is to encrypt all of those stored datasets so that they can be hidden. We argue that this is neither efficient nor cost-effective because it is not necessary to encrypt ALL of those datasets and encryption of all large amounts of datasets can be very costly. In this paper, we propose a new approach to identify which stored datasets need to be encrypted and which not. Through intensive analysis of information theory, our approach designs an upper bound on privacy measure. As long as the overall mixed information amount of some stored datasets is no more than that upper bound, those datasets do not need to be encrypted while privacy can still be protected. A tree model is leveraged to analyze privacy disclosure of datasets, and privacy requirements are decomposed and satisfied layer by layer. With a heuristic implementation of this approach, evaluation results demonstrate that the cost for encrypting intermediate datasets decreases significantly compared with the traditional approach while the privacy protection of parent or original dataset is guaranteed.
Original language | English |
---|---|
Title of host publication | 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Pages | 518-525 |
Number of pages | 8 |
ISBN (Electronic) | 9780769546124 |
ISBN (Print) | 9781467300063 |
DOIs | |
Publication status | Published - 1 Dec 2011 |
Externally published | Yes |
Event | 9th IEEE Int. Conf. on Dependable, Autonomic and Secure Comput., DASC 2011, incl. 9th Int. Conf. on Pervasive Intelligence and Computing, PICom 2011, 9th Int. Symp. on Embedded Computing, EmbeddedCom 2011, 1st Int. Conf. on Cloud and Green Comput.CGC - Sydney, NSW, Australia Duration: 12 Dec 2011 → 14 Dec 2011 |
Other
Other | 9th IEEE Int. Conf. on Dependable, Autonomic and Secure Comput., DASC 2011, incl. 9th Int. Conf. on Pervasive Intelligence and Computing, PICom 2011, 9th Int. Symp. on Embedded Computing, EmbeddedCom 2011, 1st Int. Conf. on Cloud and Green Comput.CGC |
---|---|
Country/Territory | Australia |
City | Sydney, NSW |
Period | 12/12/11 → 14/12/11 |
Keywords
- cloud computing
- privacy protection
- intermediate datasets
- upper-bound
- cost-effective