计算机科学 ›› 2016, Vol. 43 ›› Issue (9): 184-187.doi: 10.11896/j.issn.1002-137X.2016.09.036

• 信息安全 • 上一篇    下一篇

云计算环境下隐私数据的隐式攻击保护

陶林波,沈建京,薛猛,蔡立刚   

  1. 解放军信息工程大学理学院 郑州450001,解放军信息工程大学理学院 郑州450001,解放军信息工程大学理学院 郑州450001,沈阳工业大学理学院 沈阳110870
  • 出版日期:2018-12-01 发布日期:2018-12-01

Privacy Protection from Implicit Attacks in Cloud Computing Environment

TAO Lin-bo, SHEN Jian-jing, XUE Meng and CAI Li-gang   

  • Online:2018-12-01 Published:2018-12-01

摘要: 云计算环境下用户的隐私数据保护成为了云计算能否快速发展的关键,目前更多的研究集中在了隐私数据的加密等显式保护方法上,而对集中存储带来的统计分析以及数据挖掘等隐式攻击带来的隐私泄露关注不够。针对云计算环境下用户隐私数据面临的数据挖掘带来的隐私泄露风险,建立了一种保护模型。其将数据在云端的录入、存储、还原、销毁几个生命周期的关键环节作为保护目标,建立相应的保护模块,对隐私数据进行相应的处理。最后通过复杂度对比的方法证明了本文模型的有效性。

关键词: 云计算,数据挖掘,隐私保护,隐式攻击

Abstract: Privacy protection in cloud computing environment has become the key to the rapid development of cloud computing,until now more researches focus on the explicit protection methods of privacy protection such as encryption,lacking of enough attention to implicit attack,such as data mining attack.A protection model was established in this paper according to how to protect privacy in cloud computing environment against data mining attack.The model selects several key objectives as the key protection during the life cycle of user’s data,including input,storage,reduction and destruction.Then correlative modules were established according to the key objectives corresponding to data privacy.Finally,the effectiveness of this model was proved through the complexity comparison.

Key words: Cloud computing,Data mining,Privacy protection,Implicit attack

[1] Lin Wei-wei,Qi De-yu.Survey of Resource Scheduling in Cloud Computing [J].Computer Science,2012,9(10):1-6(in Chinese) 林伟伟,齐德昱.云计算资源调度研究综述[J].计算机科学,2012,9(10):1-6
[2] Hou Hong-feng,Wang Can,Wang Li-juan.Research onInformation Security Issues of Cloud Computing [J].Journal of Electronic Design Engineering,2012,0(22):60-62(in Chinese) 侯洪凤,王璨,王立娟.云计算信息安全问题探讨[J].电子设计与工程,2012,0(22):60-62
[3] Chowdhury A,Tripathi P.Enhancing Cloud Computing Reliabi-lity Using Efficient Scheduling by Providing Reliability as a Service[C]∥2014 International Conference on Parallel,Distri-buted and Grid Computing.2014:99-104
[4] Hua Bei,Zhong Cheng.The Privacy Preserving Technology in Data Mining[J].Microelectronics & Computer,2009(8):26-28(in Chinese) 华蓓,钟诚.数据挖掘中的隐私保护技术进展分析[J].微电子学与计算机,2009(8):26-28
[5] Marozzo F,Talia D,Trunfio P.A Cloud Framework for Parameter Sweeping Data Mining Applications[C]∥2011 Third IEEE International Conference on Cloud Computing Technology and Science.2011:367-374
[6] Yang Hang,Fong S.Countering the Concept-drift Problem inBig Data Using iOVFDT[C]∥2013 IEEE International Congress on Big Data.2013:126-132
[7] Ding Jing,Yang Shan-lin,Luo He,et al.Data Mining ServiceModel in Cloud Computer Environment[J].Computer Science,2012,9(6A):217-220(in Chinese) 丁静,杨善林,罗贺,等.云计算环境下的数据挖掘服务模式[J].计算机科学,2012,9(6A):217-220
[8] Wang Zhen-qi,Li Hai-long.Research of Massive Web Log Data Mining Based on Cloud Computing[C]∥2013 International Conference on Computational and Information Sciences.2013:591-594
[9] Dev H,Sen T,Basak M,et al.An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks[C]∥2012 SC Companion:High Performance Computing,Networking Storage and Analysis.2012:1106-1115
[10] Zheng Xian.Status and Development of Web Mining[J].Journal of Technology and Market,2013,0(3):64-65(in Chinese) 郑弦.Web挖掘的现状和展望[J].技术研发,2013,0(3):64-65
[11] Li Ling-juan,Zheng Shao-fei.Analysis of Data Mining Privacy Preserving Technology Based on Data Processing [J].Journal of Computer Technology and Development,2011,1(3):94-97(in Chinese) 李玲娟,郑少飞.基于数据处理的数据挖掘隐私保护技术分析[J].计算机技术与发展,2011,1(3):94-97
[12] He Yao,Wang Wen-qing,Xue Fei.Study of Massive Data Mining Based on Cloud Computing[J].Computer Technology and Development,2013,3(2):69-72(in Chinese) 贺瑶,王文庆,薛飞.基于云计算的海量数据挖掘研究[J].计算机技术与发展,2013,3(2):69-72
[13] Ding Yan,Yang Qing-ping,Qian Yu-ming.Architecture and Key Technology of a Data Mining Platform Based on Cloud Computing[J].ZTE Technology Journa,2013,9(1):53-57(in Chinese) 丁岩,杨庆平,钱煜明.基于云计算的数据挖掘平台架构及其关键技术研究[J].中兴通信技术,2013,9(1):53-57
[14] Abuhussein A,Bedi H,Shiva S.Evaluating Security and Privacy in Cloud Computing Services:A Stakeholder’s Perspective[C]∥The 7th International Conference for Internet Technology and Secured Transactions.2012:388-395

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!