Linear Function based Transformation Scheme for Preserving Database Privacy in Cloud Computing

被引:2
|
作者
Yoon, Min [1 ]
Kim, Hyeong-Il [1 ]
Jang, Miyoung [1 ]
Chang, Jae-Woo [1 ]
机构
[1] Chonbuk Natl Univ, Dept Comp Engn, Jeonju 561756, South Korea
关键词
Cloud computing; Location data protection; Spatial transformation scheme; Linear Function;
D O I
10.1109/ICPADS.2013.90
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Because much interest in spatial database in cloud computing has been attracted, studies on preserving location data privacy in cloud computing have been actively done. However, since the existing spatial transformation schemes are weak to proximity attack, they cannot preserve the privacy of users who enjoy location-based services from the cloud computing. Therefore, a transformation scheme for providing a safe service to users is required. So, we, in this paper, propose a new transformation scheme based on a line symmetric transformation (LST). The proposed scheme performs both LST-based data distribution and error injection transformation for preventing proximity attack effectively. Finally, we show from our performance analysis that the proposed scheme greatly reduces the success rate of the proximity attack while performing the spatial transformation in an efficient way.
引用
收藏
页码:498 / 503
页数:6
相关论文
共 50 条
  • [31] A Privacy-preserving Multi-pattern Matching Scheme for Searching Strings in Cloud Database
    He, Meiqi
    Zhang, Jun
    Zeng, Gongxian
    Yiu, Siu Ming
    2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2017, : 293 - 302
  • [32] Secure and Privacy-Preserving Database Services in the Cloud
    Agrawal, Divyakant
    El Abbadi, Amr
    Wang, Shiyuan
    2013 IEEE 29TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2013, : 1268 - 1271
  • [33] Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing
    Zhang, Xiaoyu
    Chen, Xiaofeng
    Wang, Jianfeng
    Zhan, Zhihui
    Li, Jin
    SOFT COMPUTING, 2018, 22 (23) : 7719 - 7732
  • [34] A Practical Data Audit Scheme With Retrievability and Indistinguishable Privacy-Preserving for Vehicular Cloud Computing
    Zhou, Zequan
    Luo, Xiling
    Wang, Yupeng
    Mao, Jian
    Luo, Feixiang
    Bai, Yi
    Wang, Xiaochao
    Liu, Gang
    Wang, Junjun
    Zeng, Feng
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (12) : 16592 - 16606
  • [35] Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing
    Xiaoyu Zhang
    Xiaofeng Chen
    Jianfeng Wang
    Zhihui Zhan
    Jin Li
    Soft Computing, 2018, 22 : 7719 - 7732
  • [36] A New Privacy Preserving Approach used in Cloud Computing
    Wang, Jian
    Zhao, Yan
    Le, Jiajin
    ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 : 1318 - +
  • [37] Iris Recognition Approach for Preserving Privacy in Cloud Computing
    Nalini, M. K.
    Preetha, S.
    Samanta, Sumedha
    Tejaswini, V
    Yashasvi, M.
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2023, 19 (17) : 33 - 50
  • [38] An Efficient Privacy Preserving Cryptographic Approach in Cloud Computing
    Agarkhed, Jayashree
    Ashalatha, R.
    Patil, Siddarama R.
    ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
  • [39] Privacy-Preserving Data Sharing in Cloud Computing
    王慧
    JournalofComputerScience&Technology, 2010, 25 (03) : 401 - 414
  • [40] Privacy-preserving outsourced classification in cloud computing
    Ping Li
    Jin Li
    Zhengan Huang
    Chong-Zhi Gao
    Wen-Bin Chen
    Kai Chen
    Cluster Computing, 2018, 21 : 277 - 286