International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112 | Views: 205

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014 | Popularity: 7.1 / 10


     

Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud using Privacy Leakage Upper Bound Constraint-Based Approach

Ravindra Suresh Kamble, Sheikh Gouse


Abstract: Cloud computing is an evolving paradigm with tremendous momentum, but its unique aspects exacerbating security and privacy challenges. Cloud computing provides massive computation power and storage capacity which enable users to deploy computation and data-intensive applications without infrastructure investment. Along the processing of such applications, a large volume of intermediate data sets will be generated, and often stored to save the cost of recomputing them. However, preserving the privacy of intermediate data sets becomes a challenging problem because adversaries may recover privacy-sensitive information by analyzing multiple intermediate data sets. Encrypting ALL data sets in cloud is widely adopted in existing approaches to address this challenge. But we argue that encrypting all intermediate data sets are neither efficient nor cost-effective because it is very time consuming and costly for data-intensive applications to end decrypt data sets frequently while performing any operation on them. In this paper, we propose a novel upper bound privacy leakage constraint-based approach to identify which intermediate data sets need to be encrypted and which do not, so that privacy-preserving cost can be saved while the privacy requirements of data holders can still be satisfied. Evaluation results demonstrate that the privacy-preserving cost of intermediate data sets can be significantly reduced with our approach over existing once where all data sets are encrypted.


Keywords: Cloud computing, data sets, privacy preserving, Data privacy management, privacy upper bound


Edition: Volume 3 Issue 8, August 2014


Pages: 1638 - 1644



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Ravindra Suresh Kamble, Sheikh Gouse, "Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud using Privacy Leakage Upper Bound Constraint-Based Approach", International Journal of Science and Research (IJSR), Volume 3 Issue 8, August 2014, pp. 1638-1644, https://www.ijsr.net/getabstract.php?paperid=2015612, DOI: https://www.doi.org/10.21275/2015612



Similar Articles

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 1659 - 1668

Anomaly Detection: Enhancing Systems with Machine Learning

Yogananda Domlur Seetharama

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1349 - 1363

IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing

Ponnarasan Krishnan

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 10, October 2021

Pages: 584 - 587

Big Data Getting Bigger: Catering Challenges

Daksh Mehta

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 934 - 939

Advanced Computation Techniques for Complex AI Algorithms

Mohammed Saleem Sultan, Mohammed Shahid Sultan

Share this Article



Top