Computer Science ›› 2016, Vol. 43 ›› Issue (5): 113-116.doi: 10.11896/j.issn.1002-137X.2016.05.021

Previous Articles     Next Articles

Privacy Protection under Cloud Computing against Data Mining

TAO Lin-bo, SHEN Jian-jing, YOU Qing-xiang and GUO Jia   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Data storage under cloud environments is both convenient for data mining and challengeable for privacy protection.In order to solve the problem of privacy protection against data mining in cloud computing,a model was presented under the circumstance of public cloud.A classification and prepocessing module was added to the model.Classification criteria and processing methods of data were discussed in detail together with information retrieval,data reduction,file running protection and data destruction.The security effectiveness of the model was proved through theory analysis.

Key words: Cloud computing,Data mining,Core data,Privacy protection

[1] Chowdhury A,Tripathi P.Enhancing Cloud Computing Reliabi-lity Using Efficient Scheduling by Providing Reliability as a Service[C]∥2014 International Conference on Parallel,Distri-buted and Grid Computing.2014:99-104
[2] Wu Ji-yi,Ping Ling-di,Pan Xue-zeng,et al.Cloud Computing:Concept and Platform [J].Telecommunications Science,2009,5(12):23-30(in Chinese) 吴吉义,平玲娣,潘雪增,等.云计算:从概念到平台[J].电信科学,2009,5(12):23-30
[3] Lin Wei-wei,Qi De-yu.Survey of Resource Schedulingin Cloud Computing [J].Computer Science,2012,9(10):1-6(in Chinese) 林伟伟,齐德昱.云计算资源调度研究综述[J].计算机科学,2012,9(10):1-6
[4] Hou Hong-feng,Wang Can,Wang Li-juan.Research on Infor-mation Security Issues of Cloud Computing [J].Electronic Design Engineering,2012,0(22):60-62(in Chinese) 侯洪凤,王璨,王立娟.云计算信息安全问题探讨[J].电子设计与工程,2012,0(22):60-62
[5] Marozzo F,Talia D,Trunfio P.A Cloud Framework for Parameter Sweeping Data Mining Applications[C]∥2011 Third IEEE International Conference on Cloud Computing Technology and Science.2011:367-374
[6] Garcia T,Wang T.Analysis of Big Data Technologies and Metho-ds-Query Large Web Public RDF Datasets on Amazon Cloud Using Hadoop and Open Source Parsers[C]∥2013 IEEE Seventh International Conference on Semantic Computing.2013:244-251
[7] Yang Hang,Fong S.Countering the Concept-drift Problem inBig Data Using iOVFDT[C]∥2013 IEEE International Congress on Big Data.2013:126-132
[8] Zhang Wei-dong,Zhang Kai,Dong Qing,et al.Calculation of Information Entropy in Data Mining with Decision Tree [J].Computer Engineering,2001,7(3):71-73(in Chinese) 张维东,张凯,董青,等.利用决策树进行数据挖掘中的信息嫡计算[J].计算机工程,2001,7(3):71-73
[9] Zheng Xian.Status and Development of Web Mining[J].Technology and Market,2013,0(3):64-65(in Chinese) 郑弦.Web挖掘的现状和展望[J].技术与市场,2013,0(3):64-65
[10] Wang Zhen-qi,Li Hai-long.Research of massive Web log data mining based on cloud computing[C]∥2013 International Conference on Computational and Information Sciences.2013:591-594
[11] Dev H,Sen T,Basak M,et al.An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks[C]∥2012 SC Companion:High Performance Computing,Networking Sto-rage and Analysis.2012:1106-1115
[12] Chen Ke-you.The Research on Data Security and Privacy Issues in Hybrid Cloud Computing [D].Nanchang:Jiangxi Normal University,2013(in Chinese) 陈科有.混合云计算数据安全与隐私保护问题研究[D].南昌:江西师范大学,2013
[13] Li Ling-juan,Zheng Shao-fei.Analysis of Data MiningPrivacy Pre-serving Technology Based on Data Processing [J].Computer Technology and Development,2011,1(3):94-97(in Chinese) 李玲娟,郑少飞.基于数据处理的数据挖掘隐私保护技术分析[J].计算机技术与发展,2011,1(3):94-97

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!