Linear Function based Transformation Scheme for Preserving Database Privacy in Cloud Computing

被引:2
|
作者
Yoon, Min [1 ]
Kim, Hyeong-Il [1 ]
Jang, Miyoung [1 ]
Chang, Jae-Woo [1 ]
机构
[1] Chonbuk Natl Univ, Dept Comp Engn, Jeonju 561756, South Korea
关键词
Cloud computing; Location data protection; Spatial transformation scheme; Linear Function;
D O I
10.1109/ICPADS.2013.90
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Because much interest in spatial database in cloud computing has been attracted, studies on preserving location data privacy in cloud computing have been actively done. However, since the existing spatial transformation schemes are weak to proximity attack, they cannot preserve the privacy of users who enjoy location-based services from the cloud computing. Therefore, a transformation scheme for providing a safe service to users is required. So, we, in this paper, propose a new transformation scheme based on a line symmetric transformation (LST). The proposed scheme performs both LST-based data distribution and error injection transformation for preventing proximity attack effectively. Finally, we show from our performance analysis that the proposed scheme greatly reduces the success rate of the proximity attack while performing the spatial transformation in an efficient way.
引用
收藏
页码:498 / 503
页数:6
相关论文
共 50 条
  • [41] Survey of privacy preserving data queries in cloud computing
    Xiao, Ren-Yi
    Tongxin Xuebao/Journal on Communications, 2014, 35 (12): : 168 - 177
  • [42] Privacy-Preserving Data Sharing in Cloud Computing
    Wang, Hui
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (03) : 401 - 414
  • [43] Privacy preserving protocol for service aggregation in cloud computing
    Wang, Peishun
    Mu, Yi
    Susilo, Willy
    Yan, Jun
    SOFTWARE-PRACTICE & EXPERIENCE, 2012, 42 (04): : 467 - 483
  • [44] Privacy-Preserving Data Sharing in Cloud Computing
    Hui Wang
    Journal of Computer Science and Technology, 2010, 25 : 401 - 414
  • [45] Privacy preserving security using biometrics in cloud computing
    Kumar, Santosh
    Singh, Sanjay Kumar
    Singh, Amit Kumar
    Tiwari, Shrikant
    Singh, Ravi Shankar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 11017 - 11039
  • [46] Privacy Preserving Data Storage Technique in Cloud Computing
    Kartheeban, K.
    Murugan, A. Durai
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT TECHNIQUES IN CONTROL, OPTIMIZATION AND SIGNAL PROCESSING (INCOS), 2017,
  • [47] Privacy-preserving outsourced classification in cloud computing
    Li, Ping
    Li, Jin
    Huang, Zhengan
    Gao, Chong-Zhi
    Chen, Wen-Bin
    Chen, Kai
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 277 - 286
  • [48] Privacy Preserving Inner Product of Vectors in Cloud Computing
    Sheng, Gang
    Wen, Tao
    Guo, Quan
    Yin, Ying
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [49] Privacy preserving security using biometrics in cloud computing
    Santosh Kumar
    Sanjay Kumar Singh
    Amit Kumar Singh
    Shrikant Tiwari
    Ravi Shankar Singh
    Multimedia Tools and Applications, 2018, 77 : 11017 - 11039
  • [50] Research on Privacy-Preserving Technology for Cloud Computing
    Wang, Xiaolong
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 636 - 639