메뉴 건너뛰기




Volumn 78, Issue 5, 2012, Pages 1374-1381

A historical probability based noise generation strategy for privacy protection in cloud computing

Author keywords

Cloud computing; Historical probability; Noise generation strategy; Privacy protection

Indexed keywords

CLOUD COMPUTING; DATA PRIVACY; INVESTMENTS; PROBABILITY; QUALITY OF SERVICE; SALES;

EID: 84861628263     PISSN: 00220000     EISSN: 10902724     Source Type: Journal    
DOI: 10.1016/j.jcss.2011.12.020     Document Type: Conference Paper
Times cited : (65)

References (38)
  • 1
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
    • 0167-739X
    • R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility Future Gener. Comput. Syst. 0167-739X 25 6 June 2009 599 616
    • (2009) Future Gener. Comput. Syst. , vol.25 , Issue.6 , pp. 599-616
    • Buyya, R.1    Yeo, C.S.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 2
    • 49149119622 scopus 로고    scopus 로고
    • Computing in the cloud
    • 1091-3556
    • A. Weiss Computing in the cloud ACM Networker 1091-3556 11 4 December 2007 16 25
    • (2007) ACM Networker , vol.11 , Issue.4 , pp. 16-25
    • Weiss, A.1
  • 3
    • 68249129760 scopus 로고    scopus 로고
    • Berkeley, California, USA, 2010, accessed on January 21
    • M. Armbrust et al., Above the Clouds: A Berkeley View of Cloud Computing, Berkeley, California, USA, 2010, http://www.eecs.berkeley.edu/Pubs/TechRpts/ 2009/EECS-2009-28.html, accessed on January 21, 2011.
    • (2011) Above the Clouds: A Berkeley View of Cloud Computing
    • Armbrust, M.1
  • 6
    • 78650837743 scopus 로고    scopus 로고
    • Cloud computing privacy concerns on our doorstep
    • 0001-0782
    • M. Ryan Cloud computing privacy concerns on our doorstep Commun. ACM 0001-0782 54 1 January 2011 36 38
    • (2011) Commun. ACM , vol.54 , Issue.1 , pp. 36-38
    • Ryan, M.1
  • 7
    • 78650804208 scopus 로고    scopus 로고
    • A firm foundation for private data analysis
    • 0001-0782
    • C. Dwork A firm foundation for private data analysis Commun. ACM 0001-0782 54 1 January 2011 86 95
    • (2011) Commun. ACM , vol.54 , Issue.1 , pp. 86-95
    • Dwork, C.1
  • 9
    • 71749086537 scopus 로고    scopus 로고
    • Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
    • Beijing, China, December 1-4
    • L. Yan, C. Rong, G. Zhao, Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography, in: Proceedings of The 1st International Conference on Cloud Computing, Beijing, China, December 1-4, 2009, pp. 167-177.
    • (2009) Proceedings of the 1st International Conference on Cloud Computing , pp. 167-177
    • Yan, L.1    Rong, C.2    Zhao, G.3
  • 14
    • 57849106781 scopus 로고    scopus 로고
    • Data collection with self-enforcing privacy
    • 1094-9224 Article 9, 24 pages
    • P. Golle, F. Mcsherry, and I. Mironov Data collection with self-enforcing privacy ACM Trans. Inform. Syst. Secur. 1094-9224 12 2 December 2008 Article 9, 24 pages
    • (2008) ACM Trans. Inform. Syst. Secur. , vol.12 , Issue.2
    • Golle, P.1    McSherry, F.2    Mironov, I.3
  • 15
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • 0163-5808
    • R. Agrawal, and R. Srikant Privacy-preserving data mining ACM SIGMOD Record 0163-5808 29 2 June 2000 439 450
    • (2000) ACM SIGMOD Record , vol.29 , Issue.2 , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 18
    • 39749182452 scopus 로고    scopus 로고
    • The applicability of the perturbation based privacy preserving data mining for real-world data
    • 0169-023X
    • L. Liu, M. Kantarcioglu, and B. Thuraisingham The applicability of the perturbation based privacy preserving data mining for real-world data Data and Knowledge Engineering 0169-023X 65 1 April 2008 5 21
    • (2008) Data and Knowledge Engineering , vol.65 , Issue.1 , pp. 5-21
    • Liu, L.1    Kantarcioglu, M.2    Thuraisingham, B.3
  • 20
    • 0032201622 scopus 로고    scopus 로고
    • Private information retrieval
    • 0004-5411
    • B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan Private information retrieval J. ACM 0004-5411 45 6 November 1998 965 981
    • (1998) J. ACM , vol.45 , Issue.6 , pp. 965-981
    • Chor, B.1    Kushilevitz, E.2    Goldreich, O.3    Sudan, M.4
  • 21
    • 21144453606 scopus 로고    scopus 로고
    • General constructions for information-theoretic private information retrieval
    • 0022-0000
    • A. Beimel, Y. Ishai, and E. Kushilevitz General constructions for information-theoretic private information retrieval J. Comput. System Sci. 0022-0000 71 2 August 2005 213 247
    • (2005) J. Comput. System Sci. , vol.71 , Issue.2 , pp. 213-247
    • Beimel, A.1    Ishai, Y.2    Kushilevitz, E.3
  • 23
    • 34548787882 scopus 로고    scopus 로고
    • Improving the robustness of private information retrieval
    • Oakland, California, USA, May 20-23
    • I. Goldberg, Improving the robustness of private information retrieval, in: Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 20-23, 2007, pp. 131-148.
    • (2007) Proceedings of the 2007 IEEE Symposium on Security and Privacy , pp. 131-148
    • Goldberg, I.1
  • 24
    • 0031378815 scopus 로고    scopus 로고
    • Replication is not needed: Single database, computationally-private information retrieval
    • Miami Beach, Florida, USA, October 19-22
    • E. Kushilevitz, R. Ostrovsky, Replication is not needed: Single database, computationally-private information retrieval, in: Proceedings of the 38th Annual Symposium on Foundations of Computer Science, Miami Beach, Florida, USA, October 19-22, 1997, pp. 364-373.
    • (1997) Proceedings of the 38th Annual Symposium on Foundations of Computer Science , pp. 364-373
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 25
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • January ISSN 0302-9743, ISBN 978-3-540-65889-4
    • C. Cachin, S. Micali, M. Stadler, Computationally private information retrieval with polylogarithmic communication, in: Advances in Cryptology - EUROCRYPT99, January 1999, pp. 402-414, ISSN 0302-9743, ISBN 978-3-540-65889-4.
    • (1999) Advances in Cryptology - EUROCRYPT99 , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 30
    • 84937578170 scopus 로고    scopus 로고
    • Web mixes: A system for anonymous and unobservable internet access
    • January ISSN: 0302-9743, ISBN 978-3-540-41724-8
    • O. Berthold, H. Federrath, S. Köpsell, Web mixes: A system for anonymous and unobservable internet access, Designing Privacy Enhancing Technologies, January 2001, pp. 115-129, ISSN: 0302-9743, ISBN 978-3-540-41724-8.
    • (2001) Designing Privacy Enhancing Technologies , pp. 115-129
    • O. Berthold1
  • 32
    • 70849118924 scopus 로고    scopus 로고
    • Examining the shifting nature of privacy, identities, and impression management with Web 2.0
    • Vancouver, Canada, August 29-31
    • K. Hawkey, Examining the shifting nature of privacy, identities, and impression management with Web 2.0, in: Proceedings of 2009 International Conference on Computational, Science and Engineering, vol. 4, Vancouver, Canada, August 29-31, 2009, pp. 990-995.
    • (2009) Proceedings of 2009 International Conference on Computational, Science and Engineering , vol.4 , pp. 990-995
    • Hawkey, K.1
  • 35
    • 33745432342 scopus 로고    scopus 로고
    • Access control to people location information
    • 1094-9224
    • U. Hengartner, and P. Steenkiste Access control to people location information ACM Trans. Inform. Syst. Secur. 1094-9224 8 4 November 2005 424 456
    • (2005) ACM Trans. Inform. Syst. Secur. , vol.8 , Issue.4 , pp. 424-456
    • Hengartner, U.1    Steenkiste, P.2
  • 37
    • 84860390205 scopus 로고    scopus 로고
    • A trust-based noise injection strategy for privacy protection in cloud computing
    • doi:10.1002/spe.1052 ISSN 1097-024X, in press
    • G. Zhang, Y. Yang, D. Yuan, J. Chen, A trust-based noise injection strategy for privacy protection in cloud computing, Softw. Pract. Exp. (ISSN 1097-024X), doi:10.1002/spe.1052, in press.
    • Softw. Pract. Exp.
    • Zhang, G.1    Yang, Y.2    Yuan, D.3    Chen, J.4
  • 38
    • 78951488046 scopus 로고    scopus 로고
    • SwinDeW-C: A peer-to-peer based cloud workflow system for managing instance intensive applications
    • Springer 978-1-4419-6523-3
    • X. Liu, D. Yuan, G. Zhang, J. Chen, and Y. Yang SwinDeW-C: A peer-to-peer based cloud workflow system for managing instance intensive applications Handbook of Cloud Computing 2010 Springer 978-1-4419-6523-3 309 332
    • (2010) Handbook of Cloud Computing , pp. 309-332
    • Liu, X.1    Yuan, D.2    Zhang, G.3    Chen, J.4    Yang, Y.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.