메뉴 건너뛰기




Volumn 42, Issue 4, 2012, Pages 431-445

A trust-based noise injection strategy for privacy protection in cloud

Author keywords

cloud; noise injection strategy; privacy protection; trust

Indexed keywords

CAPITAL INVESTMENT; DIFFERENT SERVICES; IT INFRASTRUCTURES; IT SERVICES; NOISE INJECTION; PAY-AS-YOU-GO; PRIVACY PROTECTION; SERVICE PROCESS; SERVICE PROVIDER; SERVICE REQUESTS; TRUST; TRUST MODELS;

EID: 84860390205     PISSN: 00380644     EISSN: 1097024X     Source Type: Journal    
DOI: 10.1002/spe.1052     Document Type: Article
Times cited : (18)

References (36)
  • 1
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
    • Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I,. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems 2009; 25 (6): 599-616.
    • (2009) Future Generation Computer Systems , vol.25 , Issue.6 , pp. 599-616
    • Buyya, R.1    Yeo, C.S.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 2
    • 49149119622 scopus 로고    scopus 로고
    • Computing in the cloud
    • Weiss A,. Computing in the cloud. ACM Networker 2007; 11 (4): 16-25.
    • (2007) ACM Networker , vol.11 , Issue.4 , pp. 16-25
    • Weiss, A.1
  • 3
    • 77950347409 scopus 로고    scopus 로고
    • Above the clouds: A Berkeley view of cloud computing
    • et al
    • Armbrust M,. et al. Above the clouds: A Berkeley view of cloud computing. Communications of the ACM 2010; 53 (6): 50-58.
    • (2010) Communications of the ACM , vol.53 , Issue.6 , pp. 50-58
    • Armbrust, M.1
  • 6
    • 70349900879 scopus 로고    scopus 로고
    • Generation of similarity knowledge flow for intelligent browsing based on semantic link networks
    • et al
    • Luo X, Xu Z,. et al. Generation of similarity knowledge flow for intelligent browsing based on semantic link networks. Concurrency Computation: Practice and Experience 2009; 21 (16): 2018-2032.
    • (2009) Concurrency Computation: Practice and Experience , vol.21 , Issue.16 , pp. 2018-2032
    • Luo, X.1    Xu, Z.2
  • 7
    • 85016228906 scopus 로고    scopus 로고
    • IBM Cloud Labs 2009 [5 April ]
    • IBM Cloud Labs. IBM Perspective on Cloud Computing. Available at:, 2009 [5 April 2010 ].
    • (2010) IBM Perspective on Cloud Computing
  • 8
    • 71749086537 scopus 로고    scopus 로고
    • Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
    • Beijing, China, 1-4 December
    • Yan L, Rong C, Zhao G,. Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography. Proceedings of the First International Conference on Cloud Computing, Beijing, China, 1-4 December 2009; 167-177.
    • (2009) Proceedings of the First International Conference on Cloud Computing , pp. 167-177
    • Yan, L.1    Rong, C.2    Zhao, G.3
  • 12
    • 39749182452 scopus 로고    scopus 로고
    • The applicability of the perturbation based privacy preserving data mining for real-world data
    • DOI 10.1016/j.datak.2007.06.011, PII S0169023X07001322
    • Liu L, Kantarcioglu M, Thuraisingham B,. The applicability of the perturbation based privacy preserving data mining for real-world data. Data and Knowledge Engineering 2008; 65 (1): 5-21. (Pubitemid 351295928)
    • (2008) Data and Knowledge Engineering , vol.65 , Issue.1 , pp. 5-21
    • Liu, L.1    Kantarcioglu, M.2    Thuraisingham, B.3
  • 14
    • 21144453606 scopus 로고    scopus 로고
    • General constructions for information-theoretic private information retrieval
    • DOI 10.1016/j.jcss.2005.03.002, PII S0022000005000309
    • Beimel A, Ishai Y, Kushilevitz E,. General constructions for information-theoretic private information retrieval. Journal of Computer System Science 2005; 71 (2): 213-247. (Pubitemid 40878949)
    • (2005) Journal of Computer and System Sciences , vol.71 , Issue.2 , pp. 213-247
    • Beimel, A.1    Ishai, Y.2    Kushilevitz, E.3
  • 16
    • 34548787882 scopus 로고    scopus 로고
    • Improving the robustness of private information retrieval
    • Oakland, CA, U.S.A., 20-23 May
    • Goldberg I,. Improving the robustness of private information retrieval. Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland, CA, U.S.A., 20-23 May 2007; 131-148.
    • (2007) Proceedings of the 2007 IEEE Symposium on Security and Privacy , pp. 131-148
    • Goldberg, I.1
  • 17
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • Springer: Berlin, Heidelberg, January 1999;. ISSN: 0302-9743, ISBN: 978-3-540-65889-4
    • Cachin C, Micali S, Stadler M,. Computationally private information retrieval with polylogarithmic communication. Advances in Cryptology- EUROCRYPT'99. Springer: Berlin, Heidelberg, January 1999; 402-414. ISSN: 0302-9743, ISBN: 978-3-540-65889-4.
    • Advances in Cryptology-EUROCRYPT'99 , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 23
    • 70849118924 scopus 로고    scopus 로고
    • Examining the shifting nature of privacy, identities, and impression management with Web 2.0
    • 4, Vancouver, Canada, 29-31 August
    • Hawkey K,. Examining the shifting nature of privacy, identities, and impression management with Web 2.0. Proceedings of 2009 International Conference on Computational Science and Engineering, vol. 4, Vancouver, Canada, 29-31 August 2009; 990-995.
    • (2009) Proceedings of 2009 International Conference on Computational Science and Engineering , pp. 990-995
    • Hawkey, K.1
  • 25
    • 68349138297 scopus 로고    scopus 로고
    • A hybrid positioning system for technology-independent location-aware computing
    • ISSN: 1097-024X
    • Ficco M, Russo S,. A hybrid positioning system for technology-independent location-aware computing. Software: Practice and Experience 2009; 39 (13): 1095-1125. ISSN: 1097-024X.
    • (2009) Software: Practice and Experience , vol.39 , Issue.13 , pp. 1095-1125
    • Ficco, M.1    Russo, S.2
  • 30
    • 0037430830 scopus 로고    scopus 로고
    • Access control and trust in the use of widely distributed services
    • Bacon J, Moody K, Yao W,. Access control and trust in the use of widely distributed services. Software: Practice and Experience 2003; 33 (4): 375-394.
    • (2003) Software: Practice and Experience , vol.33 , Issue.4 , pp. 375-394
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 31
    • 72449135752 scopus 로고    scopus 로고
    • Maintaining control while delegating trust: Integrity constraints in trust management
    • Etalle S, Winsborough W,. Maintaining control while delegating trust: Integrity constraints in trust management. ACM Transactions on Information and System Security 2009; 13 (1): 27.
    • (2009) ACM Transactions on Information and System Security , vol.13 , Issue.1 , pp. 27
    • Etalle, S.1    Winsborough, W.2
  • 33
    • 71749098580 scopus 로고    scopus 로고
    • Trust model to enhance security and interoperability of cloud environment
    • Beijing, China, 1-4 December
    • Li W, Ping L,. Trust model to enhance security and interoperability of cloud environment. Proceedings of the First International Conference on Cloud Computing, Beijing, China, 1-4 December 2009; 69-79.
    • (2009) Proceedings of the First International Conference on Cloud Computing , pp. 69-79
    • Li, W.1    Ping, L.2
  • 35
    • 78951488046 scopus 로고    scopus 로고
    • SwinDeW-C: A peer-to-peer based cloud workflow system for managing instance intensive applications
    • Springer: Berlin, ISBN: 978-1-4419-6523-3
    • Liu X, Yuan D, Zhang G, Chen J, Yang Y,. SwinDeW-C: A peer-to-peer based cloud workflow system for managing instance intensive applications. Handbook of Cloud Computing. Springer: Berlin, 2010; 309-332. ISBN: 978-1-4419-6523-3.
    • (2010) Handbook of Cloud Computing , pp. 309-332
    • Liu, X.1    Yuan, D.2    Zhang, G.3    Chen, J.4    Yang, Y.5
  • 36
    • 84860423157 scopus 로고    scopus 로고
    • SwinDeW-G Available at:, 10 May 2010
    • SwinDeW-G Team. System Architecture of SwinDeW-G, 2008. Available at:, 10 May 2010.
    • (2010) System Architecture of SwinDeW-G


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.