Computer Science ›› 2016, Vol. 43 ›› Issue (9): 184-187.doi: 10.11896/j.issn.1002-137X.2016.09.036

Previous Articles     Next Articles

Privacy Protection from Implicit Attacks in Cloud Computing Environment

TAO Lin-bo, SHEN Jian-jing, XUE Meng and CAI Li-gang   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Privacy protection in cloud computing environment has become the key to the rapid development of cloud computing,until now more researches focus on the explicit protection methods of privacy protection such as encryption,lacking of enough attention to implicit attack,such as data mining attack.A protection model was established in this paper according to how to protect privacy in cloud computing environment against data mining attack.The model selects several key objectives as the key protection during the life cycle of user’s data,including input,storage,reduction and destruction.Then correlative modules were established according to the key objectives corresponding to data privacy.Finally,the effectiveness of this model was proved through the complexity comparison.

Key words: Cloud computing,Data mining,Privacy protection,Implicit attack

[1] Lin Wei-wei,Qi De-yu.Survey of Resource Scheduling in Cloud Computing [J].Computer Science,2012,9(10):1-6(in Chinese) 林伟伟,齐德昱.云计算资源调度研究综述[J].计算机科学,2012,9(10):1-6
[2] Hou Hong-feng,Wang Can,Wang Li-juan.Research onInformation Security Issues of Cloud Computing [J].Journal of Electronic Design Engineering,2012,0(22):60-62(in Chinese) 侯洪凤,王璨,王立娟.云计算信息安全问题探讨[J].电子设计与工程,2012,0(22):60-62
[3] Chowdhury A,Tripathi P.Enhancing Cloud Computing Reliabi-lity Using Efficient Scheduling by Providing Reliability as a Service[C]∥2014 International Conference on Parallel,Distri-buted and Grid Computing.2014:99-104
[4] Hua Bei,Zhong Cheng.The Privacy Preserving Technology in Data Mining[J].Microelectronics & Computer,2009(8):26-28(in Chinese) 华蓓,钟诚.数据挖掘中的隐私保护技术进展分析[J].微电子学与计算机,2009(8):26-28
[5] Marozzo F,Talia D,Trunfio P.A Cloud Framework for Parameter Sweeping Data Mining Applications[C]∥2011 Third IEEE International Conference on Cloud Computing Technology and Science.2011:367-374
[6] Yang Hang,Fong S.Countering the Concept-drift Problem inBig Data Using iOVFDT[C]∥2013 IEEE International Congress on Big Data.2013:126-132
[7] Ding Jing,Yang Shan-lin,Luo He,et al.Data Mining ServiceModel in Cloud Computer Environment[J].Computer Science,2012,9(6A):217-220(in Chinese) 丁静,杨善林,罗贺,等.云计算环境下的数据挖掘服务模式[J].计算机科学,2012,9(6A):217-220
[8] Wang Zhen-qi,Li Hai-long.Research of Massive Web Log Data Mining Based on Cloud Computing[C]∥2013 International Conference on Computational and Information Sciences.2013:591-594
[9] Dev H,Sen T,Basak M,et al.An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks[C]∥2012 SC Companion:High Performance Computing,Networking Storage and Analysis.2012:1106-1115
[10] Zheng Xian.Status and Development of Web Mining[J].Journal of Technology and Market,2013,0(3):64-65(in Chinese) 郑弦.Web挖掘的现状和展望[J].技术研发,2013,0(3):64-65
[11] Li Ling-juan,Zheng Shao-fei.Analysis of Data Mining Privacy Preserving Technology Based on Data Processing [J].Journal of Computer Technology and Development,2011,1(3):94-97(in Chinese) 李玲娟,郑少飞.基于数据处理的数据挖掘隐私保护技术分析[J].计算机技术与发展,2011,1(3):94-97
[12] He Yao,Wang Wen-qing,Xue Fei.Study of Massive Data Mining Based on Cloud Computing[J].Computer Technology and Development,2013,3(2):69-72(in Chinese) 贺瑶,王文庆,薛飞.基于云计算的海量数据挖掘研究[J].计算机技术与发展,2013,3(2):69-72
[13] Ding Yan,Yang Qing-ping,Qian Yu-ming.Architecture and Key Technology of a Data Mining Platform Based on Cloud Computing[J].ZTE Technology Journa,2013,9(1):53-57(in Chinese) 丁岩,杨庆平,钱煜明.基于云计算的数据挖掘平台架构及其关键技术研究[J].中兴通信技术,2013,9(1):53-57
[14] Abuhussein A,Bedi H,Shiva S.Evaluating Security and Privacy in Cloud Computing Services:A Stakeholder’s Perspective[C]∥The 7th International Conference for Internet Technology and Secured Transactions.2012:388-395

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!