An Approach of Optimal Anonymization for Preserving Privacy in Cloud

Parmod Kalia, D. Bansal, S. Sofat
{"title":"An Approach of Optimal Anonymization for Preserving Privacy in Cloud","authors":"Parmod Kalia, D. Bansal, S. Sofat","doi":"10.2139/ssrn.3511000","DOIUrl":null,"url":null,"abstract":"Cloud computing has emerged as a technological evolution in the recent past. It facilitates the provision of data storage, infrastructure and application. Organizations as well as Individuals uses the online services being provide by the cloud service provider. Organizations use data stored in the cloud environment for analysis and decision making purpose.In cloud-based environments protecting sensitive data is a challenge where the user does not have physical access control over the data and cloud infrastructure. This indicates that the cloud provider could be a very serious attack vector. Data protection and preservation is considered to be a significant concern in large applications in cloud environment which requires processing of large sensitive data sets. To address the need of protecting sensitive micro data of an individual, a technique called Data Anonymization like K-anonymization, L-diversity and T-closeness has been proposed by various researchers. Data deidentification and Re-identification meets the requirement for release of data for the research as well as for the protection of privacy of an individual. In this paper it is proposed to protect and preserve sensitive data of cloud users on a cloud based online Property Management application. k-Anonymization has a feature that in the dataset each tuple is indistinguishable from at least k-1 others. Anonymization methods i.e. K- anonymity, L-diversity and T-closeness have been used and the performance of these technique is evaluated in terms of optimal anonymity. We can find optimal Anonymization for the purpose of preserving privacy and reducing re-identification risk by experimenting on the real data. It is seen that Anonymization is useful in circumstance when the input data are processed for the purpose of preliminarily accessing an optimal anonymization.","PeriodicalId":343060,"journal":{"name":"ICCS 2019: Proceedings","volume":"74 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ICCS 2019: Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.3511000","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Cloud computing has emerged as a technological evolution in the recent past. It facilitates the provision of data storage, infrastructure and application. Organizations as well as Individuals uses the online services being provide by the cloud service provider. Organizations use data stored in the cloud environment for analysis and decision making purpose.In cloud-based environments protecting sensitive data is a challenge where the user does not have physical access control over the data and cloud infrastructure. This indicates that the cloud provider could be a very serious attack vector. Data protection and preservation is considered to be a significant concern in large applications in cloud environment which requires processing of large sensitive data sets. To address the need of protecting sensitive micro data of an individual, a technique called Data Anonymization like K-anonymization, L-diversity and T-closeness has been proposed by various researchers. Data deidentification and Re-identification meets the requirement for release of data for the research as well as for the protection of privacy of an individual. In this paper it is proposed to protect and preserve sensitive data of cloud users on a cloud based online Property Management application. k-Anonymization has a feature that in the dataset each tuple is indistinguishable from at least k-1 others. Anonymization methods i.e. K- anonymity, L-diversity and T-closeness have been used and the performance of these technique is evaluated in terms of optimal anonymity. We can find optimal Anonymization for the purpose of preserving privacy and reducing re-identification risk by experimenting on the real data. It is seen that Anonymization is useful in circumstance when the input data are processed for the purpose of preliminarily accessing an optimal anonymization.
一种云环境下保护隐私的最优匿名化方法
云计算是最近才出现的一项技术发展。它有助于提供数据存储、基础设施和应用。组织和个人都使用云服务提供商提供的在线服务。组织使用存储在云环境中的数据进行分析和决策。在基于云的环境中,当用户对数据和云基础设施没有物理访问控制时,保护敏感数据是一项挑战。这表明云提供商可能是一个非常严重的攻击媒介。在需要处理大量敏感数据集的云环境中的大型应用程序中,数据保护和保存被认为是一个重要问题。为了解决保护个人敏感微数据的需要,许多研究者提出了一种类似于k -匿名化、l -多样性和t -接近的数据匿名化技术。数据去识别和再识别既符合研究数据发布的要求,也符合保护个人隐私的要求。本文提出了一种基于云的在线物业管理应用程序对云用户的敏感数据进行保护和保存的方法。k-匿名化有一个特征,即在数据集中,每个元组与至少k-1个其他元组无法区分。使用了K-匿名、l -多样性和t -接近等匿名化方法,并从最优匿名的角度对这些方法的性能进行了评价。通过对真实数据的实验,我们可以找到最优的匿名化,以保护隐私和降低再识别风险。可以看出,当为了初步访问最佳匿名化而处理输入数据时,匿名化是有用的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信