Linear Function based Transformation Scheme for Preserving Database Privacy in Cloud Computing

被引:2
|
作者
Yoon, Min [1 ]
Kim, Hyeong-Il [1 ]
Jang, Miyoung [1 ]
Chang, Jae-Woo [1 ]
机构
[1] Chonbuk Natl Univ, Dept Comp Engn, Jeonju 561756, South Korea
关键词
Cloud computing; Location data protection; Spatial transformation scheme; Linear Function;
D O I
10.1109/ICPADS.2013.90
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Because much interest in spatial database in cloud computing has been attracted, studies on preserving location data privacy in cloud computing have been actively done. However, since the existing spatial transformation schemes are weak to proximity attack, they cannot preserve the privacy of users who enjoy location-based services from the cloud computing. Therefore, a transformation scheme for providing a safe service to users is required. So, we, in this paper, propose a new transformation scheme based on a line symmetric transformation (LST). The proposed scheme performs both LST-based data distribution and error injection transformation for preventing proximity attack effectively. Finally, we show from our performance analysis that the proposed scheme greatly reduces the success rate of the proximity attack while performing the spatial transformation in an efficient way.
引用
收藏
页码:498 / 503
页数:6
相关论文
共 50 条
  • [1] A secure privacy preserving deduplication scheme for cloud computing
    Fan, Yongkai
    Lin, Xiaodong
    Liang, Wei
    Tan, Gang
    Nanda, Priyadarsi
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 127 - 135
  • [2] A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing
    Huang, Chanying
    Wei, Songjie
    Yan, Kedong
    Zhang, Gongxuan
    Fu, Anmin
    2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 260 - 265
  • [3] QSDB: An Encrypted Database Model for Privacy-Preserving in Cloud Computing
    Liu, Guoxiu
    Yang, Geng
    Wang, Haiwei
    Dai, Hua
    Zhou, Qiang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (07): : 3375 - 3400
  • [4] An Improved Privacy-Preserving Biometric Identification Scheme in Cloud Computing
    Huang, Kai
    Xu, Ming
    Fu, Shaojing
    Luo, Yuchuan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (10) : 1891 - 1894
  • [5] A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing
    Yassin, Ali A.
    Jin, Hai
    Ibrahim, Ayad
    Qiang, Weizhong
    Zou, Deqing
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1210 - 1217
  • [6] An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing
    Zhu, Liehuang
    Zhang, Chuan
    Xu, Chang
    Liu, Ximeng
    Huang, Cheng
    IEEE ACCESS, 2018, 6 : 19025 - 19033
  • [7] Privacy Preserving Approaches In Cloud Computing
    Karthiban, K.
    Smys, S.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 462 - 467
  • [8] Providing Privacy Preserving in Cloud Computing
    Wang, Jian
    Zhao, Yan
    Jiang, Shuo
    Le, Jiajin
    3RD INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION, 2010, : 472 - 475
  • [9] Privacy preserving in cloud computing environment
    Zou, Deqing
    Xiang, Yang
    Min, Geyong
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2752 - 2753
  • [10] A Flexible and Privacy-Preserving Collaborative Filtering Scheme in Cloud Computing for VANETs
    Yang, Huijie
    Shen, Jian
    Zhou, Tianqi
    Ji, Sai
    Vijayakumar, Pandi
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (02)