A Sub Chunk-Confusion Based Privacy Protection Mechanism for Association Rules in Cloud Services

被引:1
|
作者
Shi, Yuliang [1 ]
Zhou, Zhongmin [1 ]
Cui, Lizhen [1 ]
Liu, Shijun [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Peoples R China
基金
中国国家自然科学基金;
关键词
Multitenancy; sub block-confusion; dynamic data; privacy protection;
D O I
10.1142/S0218194016400015
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In cloud computing services, according to the customized privacy protection policy by the tenant and the sub chunk-confusion based on privacy protection technology, we can partition the tenant's data into many chunks and confuse the relationships among chunks, which makes the attacker cannot infer tenant's information by simply combining attributes. But it still has security issues. For example, with the amount of data growing, there may be a few hidden association rules among some attributes of the data chunks. Through these rules, it is possible to get some of the privacy information of the tenant. To address this issue, the paper proposes a privacy protection mechanism based on chunk-confusion privacy protection technology for association rules. The mechanism can detect unidimensional and multidimensional attributes association rules, hide them by adding fake data, re-chunking and re-grouping, and then ensure the privacy of tenant's data. In addition, this mechanism also provides evaluation formulas. They filter detected association rules, remove the invalid and improve system performance. They also evaluate the effect of privacy protection. The experimental evaluation proves that the mechanism proposed in this paper can better protect the data privacy of tenant and has feasibility and practicality in real world applications.
引用
收藏
页码:539 / 562
页数:24
相关论文
共 50 条
  • [31] Users' Privacy Protection Scheme in Location Based Services
    Lin, Tu-Liang
    Wang, Pin-Jie
    ICEMT 2018: PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON EDUCATION AND MULTIMEDIA TECHNOLOGY, 2018, : 107 - 111
  • [32] Method for privacy protection in location-based services
    He, Jing-Sha
    Xu, Fei
    Xu, Jing
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (08): : 1130 - 1134
  • [33] PRIVACY PROTECTION FOR USERS OF LOCATION-BASED SERVICES
    Shin, Kang G.
    Ju, Xiaoen
    Chen, Zhigang
    Hu, Xin
    IEEE WIRELESS COMMUNICATIONS, 2012, 19 (01) : 30 - 39
  • [34] QBPP: Quality of services-based location privacy protection method for location-based services in cloud-enabled Internet of vehicles
    Chen, Ji-ming
    Li, Ting-ting
    Wang, Liang-jun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (07)
  • [35] Location Data Record Privacy Protection Based on Differential Privacy Mechanism
    Gu, Ke
    Yang, Lihao
    Yin, Bo
    INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (04): : 639 - 654
  • [36] Cloud computing data privacy protection method based on blockchain
    He, Yingjun
    Ouyang, Wenhui
    Li, Shaolong
    Wang, Lin
    Zhou, Jing
    Su, Wenwei
    Li, Shenzhang
    Mei, Donghui
    Shi, Yan
    Jin, Yanxu
    Li, Chenglin
    Ren, Yonghui
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2023, 14 (05) : 480 - 492
  • [37] A dynamic location privacy protection scheme based on Cloud storage
    Li, Li
    Lv, Zhengjuan
    Tong, Xiaohong
    Shi, Runhua
    International Journal of Network Security, 2019, 21 (05) : 828 - 834
  • [38] Privacy Protection in Cloud Using Identity Based Group Signature
    Kuzhalvaimozhi, S.
    Rao, G. Raghavendra
    2014 FIFTH INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT), 2014, : 75 - 80
  • [39] A threshold-based model for privacy protection in cloud computing
    Ren X.-Y.
    Chen L.-J.
    Zhang J.-F.
    Ma X.-D.
    Advances in Information Sciences and Service Sciences, 2011, 3 (03): : 163 - 168
  • [40] Privacy protection based on encrypting sensitive attribute for cloud data
    Zhang, Lifen
    Dai, Jun
    Journal of Computational Information Systems, 2014, 10 (03): : 1085 - 1092