Paper Title:
A New Privacy Preserving Approach Used in Cloud Computing
  Abstract

Cloud computing seems to offer some incredible benefits for communicators: the availability of an incredible array of software applications, access to lightning-quick processing power, unlimited storage, and the ability to easily share and process information. All of this is available through your browser any time you can access the Internet. While this might all appear enticing, there remain issues of reliability, portability, privacy, and security. When our private data are out-sourced in cloud computing, we should guarantee the confidentiality and searchability of the private data. Our paper provides a new approach to avoid the disclosure of the sensitive attributes of users when user ask for service from the Service Provider (SP) in cloud computing.

  Info
Periodical
Key Engineering Materials (Volumes 439-440)
Edited by
Yanwen Wu
Pages
1318-1323
DOI
10.4028/www.scientific.net/KEM.439-440.1318
Citation
J. Wang, Y. Zhao, J. J. Le, "A New Privacy Preserving Approach Used in Cloud Computing", Key Engineering Materials, Vols. 439-440, pp. 1318-1323, 2010
Online since
June 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Yan Zhao, Jian Wang, Qiu Sha Zhu, Jia Jin Le
Abstract:Some medical records are often added and deleted in the practical applications. The leakage of privacy information caused by re-publishing...
1433
Authors: Li Ming Huang, Jing Wen Liu, Ying Qian, Xing Shun Liu, Jin Ling Song
Abstract:To keep the k-anonymized dataset consistent with the original dataset in real time, the increment update algorithms basing on Semantic...
328
  | Authors: Xiang Min Ren, Jing Yang, Jian Pei Zhang, Zong Fu Jia
Chapter 1: Computer Science and Theory, Related Studies
Abstract:In traditional database domain, k-anonymity is a hotspot in data publishing for privacy protection. In this paper, we study how to use...
64
Authors: Xiangmin Ren, Boxuan Jia, Kechao Wang
Chapter 13: Software Development and Application
Abstract:Uncertain data management has become an important research direction and a hot area of research. This paper proposes an UDAK-anonymity...
1689
Authors: Liang Zhu, Bin Liu, Guang Liu, Quan Long Lei
Chapter 7: Data and Signal Processing
Abstract:Relational top-N queries with both text attributes and numeric attributes are useful in many applications, by using the ranking...
1326