计算机科学 ›› 2016, Vol. 43 ›› Issue (5): 113-116.doi: 10.11896/j.issn.1002-137X.2016.05.021
陶林波,沈建京,游庆祥,郭佳
TAO Lin-bo, SHEN Jian-jing, YOU Qing-xiang and GUO Jia
摘要: 云计算环境下用户数据的集中存储为数据挖掘提供了便利条件,同时也为用户的隐私保护带来了挑战。为了解决云数据在数据挖掘条件下的隐私保护问题,提出了云计算环境下的隐私保护模型。该模型以公有云为基础,增加了一个分类预处理模块,设定了分类标准,详细讨论了分类后数据的处理方法,并讨论了该模型下数据的检索、还原方法以及运行环境保护、数据的云端销毁等环节。最后对模型的复杂性及安全性进行理论的对比分析,证明了该模型在数据挖掘条件下对云数据隐私保护的有效性。
[1] Chowdhury A,Tripathi P.Enhancing Cloud Computing Reliabi-lity Using Efficient Scheduling by Providing Reliability as a Service[C]∥2014 International Conference on Parallel,Distri-buted and Grid Computing.2014:99-104 [2] Wu Ji-yi,Ping Ling-di,Pan Xue-zeng,et al.Cloud Computing:Concept and Platform [J].Telecommunications Science,2009,5(12):23-30(in Chinese) 吴吉义,平玲娣,潘雪增,等.云计算:从概念到平台[J].电信科学,2009,5(12):23-30 [3] Lin Wei-wei,Qi De-yu.Survey of Resource Schedulingin Cloud Computing [J].Computer Science,2012,9(10):1-6(in Chinese) 林伟伟,齐德昱.云计算资源调度研究综述[J].计算机科学,2012,9(10):1-6 [4] Hou Hong-feng,Wang Can,Wang Li-juan.Research on Infor-mation Security Issues of Cloud Computing [J].Electronic Design Engineering,2012,0(22):60-62(in Chinese) 侯洪凤,王璨,王立娟.云计算信息安全问题探讨[J].电子设计与工程,2012,0(22):60-62 [5] Marozzo F,Talia D,Trunfio P.A Cloud Framework for Parameter Sweeping Data Mining Applications[C]∥2011 Third IEEE International Conference on Cloud Computing Technology and Science.2011:367-374 [6] Garcia T,Wang T.Analysis of Big Data Technologies and Metho-ds-Query Large Web Public RDF Datasets on Amazon Cloud Using Hadoop and Open Source Parsers[C]∥2013 IEEE Seventh International Conference on Semantic Computing.2013:244-251 [7] Yang Hang,Fong S.Countering the Concept-drift Problem inBig Data Using iOVFDT[C]∥2013 IEEE International Congress on Big Data.2013:126-132 [8] Zhang Wei-dong,Zhang Kai,Dong Qing,et al.Calculation of Information Entropy in Data Mining with Decision Tree [J].Computer Engineering,2001,7(3):71-73(in Chinese) 张维东,张凯,董青,等.利用决策树进行数据挖掘中的信息嫡计算[J].计算机工程,2001,7(3):71-73 [9] Zheng Xian.Status and Development of Web Mining[J].Technology and Market,2013,0(3):64-65(in Chinese) 郑弦.Web挖掘的现状和展望[J].技术与市场,2013,0(3):64-65 [10] Wang Zhen-qi,Li Hai-long.Research of massive Web log data mining based on cloud computing[C]∥2013 International Conference on Computational and Information Sciences.2013:591-594 [11] Dev H,Sen T,Basak M,et al.An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks[C]∥2012 SC Companion:High Performance Computing,Networking Sto-rage and Analysis.2012:1106-1115 [12] Chen Ke-you.The Research on Data Security and Privacy Issues in Hybrid Cloud Computing [D].Nanchang:Jiangxi Normal University,2013(in Chinese) 陈科有.混合云计算数据安全与隐私保护问题研究[D].南昌:江西师范大学,2013 [13] Li Ling-juan,Zheng Shao-fei.Analysis of Data MiningPrivacy Pre-serving Technology Based on Data Processing [J].Computer Technology and Development,2011,1(3):94-97(in Chinese) 李玲娟,郑少飞.基于数据处理的数据挖掘隐私保护技术分析[J].计算机技术与发展,2011,1(3):94-97 |
No related articles found! |
|