Linear Function based Transformation Scheme for Preserving Database Privacy in Cloud Computing

被引:2
|
作者
Yoon, Min [1 ]
Kim, Hyeong-Il [1 ]
Jang, Miyoung [1 ]
Chang, Jae-Woo [1 ]
机构
[1] Chonbuk Natl Univ, Dept Comp Engn, Jeonju 561756, South Korea
关键词
Cloud computing; Location data protection; Spatial transformation scheme; Linear Function;
D O I
10.1109/ICPADS.2013.90
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Because much interest in spatial database in cloud computing has been attracted, studies on preserving location data privacy in cloud computing have been actively done. However, since the existing spatial transformation schemes are weak to proximity attack, they cannot preserve the privacy of users who enjoy location-based services from the cloud computing. Therefore, a transformation scheme for providing a safe service to users is required. So, we, in this paper, propose a new transformation scheme based on a line symmetric transformation (LST). The proposed scheme performs both LST-based data distribution and error injection transformation for preventing proximity attack effectively. Finally, we show from our performance analysis that the proposed scheme greatly reduces the success rate of the proximity attack while performing the spatial transformation in an efficient way.
引用
收藏
页码:498 / 503
页数:6
相关论文
共 50 条
  • [21] A privacy-preserving multi-keyword ranked retrieval scheme in cloud computing
    Li, Yuancheng
    Hou, Haiyan
    Chen, Wenping
    INFORMATION SECURITY JOURNAL, 2020, 29 (06): : 284 - 296
  • [22] Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing
    Huang, Qin-Long
    Ma, Zhao-Feng
    Yang, Yi-Xian
    Fu, Jing-Yi
    Niu, Xin-Xin
    Journal of China Universities of Posts and Telecommunications, 2013, 20 (06): : 88 - 95
  • [23] An Efficient Privacy-Preserving Publish-Subscribe Service Scheme for Cloud Computing
    Xiao, Yanping
    Lin, Chuang
    Jiang, Yixin
    Chu, Xiaowen
    Liu, Fangqin
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [24] Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing
    HUANG Qin-long
    MA Zhao-feng
    YANG Yi-xian
    FU Jing-yi
    NIU Xin-xin
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2013, 20 (06) : 88 - 95
  • [25] Privacy-Preserving Recommendation Based on Kernel Method in Cloud Computing
    Li, Tao
    Qian, Qi
    Ren, Yongjun
    Ren, Yongzhen
    Xia, Jinyue
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 66 (01): : 779 - 791
  • [26] Block Chain Technology Assisted Privacy Preserving Resource Allocation Scheme for Internet of Things Based Cloud Computing
    Ramamoorthi, Raja
    Ramasamy, Arunprakash
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2023, 30 (06): : 1943 - 1950
  • [27] A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing
    Xia, Zhihua
    Wang, Xinhui
    Zhang, Liangao
    Qin, Zhan
    Sun, Xingming
    Ren, Kui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (11) : 2594 - 2608
  • [28] Optimal Privacy Preserving Scheme Based on Modified ANN and PSO in Cloud
    Amma, N. G. Nageswari
    Dhanaseelan, F. Ramesh
    INTERNATIONAL JOURNAL OF ENTERPRISE INFORMATION SYSTEMS, 2019, 15 (01) : 116 - 134
  • [29] An Improved Scheme of Privacy Preserving Based on Lagrange Interpolation in Cloud Storage
    Jin, Yu
    Wang, Yadan
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRIAL ENGINEERING (AIIE 2016), 2016, 133 : 424 - 428
  • [30] A Blockchain based Privacy-Preserving Reputation Scheme for Cloud Service
    Geng, Ziye
    He, Yunhua
    Wang, Chao
    Xu, Gang
    Xiao, Ke
    Yu, Shui
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,