Privacy-Aware Adaptive Data Encryption Strategy of Big Data in Cloud Computing

被引:61
|
作者
Gai, Keke [1 ]
Qiu, Meikang [1 ]
Zhao, Hui [2 ]
Xiong, Jian [3 ]
机构
[1] Pace Univ, Dept Comp Sci, New York, NY 10038 USA
[2] Henan Univ, Software Sch, Kaifeng 475000, Henan, Peoples R China
[3] Shanghai Jiao Tong Univ, IICNE, Shanghai 200030, Peoples R China
基金
美国国家科学基金会;
关键词
Privacy protection; data encryption; big data; cloud computing; selective encryption strategy; time constraints; ALLOCATION; SYSTEMS;
D O I
10.1109/CSCloud.2016.52
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Privacy issues have become a considerable issue while the applications of big data are growing dramatically fast in cloud computing. The benefits us implementing these emerging technologies have improved or changed service models and improve application performances in various perspectives. However, the remarkably growing volume of data sizes has also resulted in many challenges in practice. The time execution of encrypting data is one of the serious issues during the processes of data processing and transmissions. Many current applications abandon data encryptions in order to reach an adoptive performance level, companions with privacy concerns. In this paper, we concentrate on privacy issue and propose a novel data encryption approach, named as Dynamic Data Encryption Strategy (D2ES). Our proposed approach aims to selectively encrypt data using privacy classification methods under timing constraints. This approach is designed to maximize the privacy protection scope by using a selective encryption strategy within the required execution time requirements. The performance of D2ES has been evaluated in our experiments, which provides the proof of the privacy enhancement.
引用
收藏
页码:273 / 278
页数:6
相关论文
共 50 条
  • [1] Privacy-aware Data Storage in Cloud Computing
    Pottier, Remy
    Menaud, Jean-Marc
    [J]. CLOSER: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2017, : 377 - 384
  • [2] Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing
    Gai, Keke
    Qiu, Meikang
    Zhao, Hui
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) : 678 - 688
  • [3] Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures
    Itani, Wassim
    Kayssi, Ayman
    Chehab, Ali
    [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 711 - 716
  • [4] Privacy-aware Big Data Warehouse Architecture
    Navuluri, Karthik
    Mukkamala, Ravi
    Ahmad, Aftab
    [J]. 2016 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2016, 2016, : 341 - 344
  • [5] Prometheus: Privacy-Aware Data Retrieval on Hybrid Cloud
    Zhou, Zhigang
    Zhang, Hongli
    Du, Xiaojiang
    Li, Panpan
    Yu, Xiangzhan
    [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2643 - 2651
  • [6] Efficient and privacy-aware attribute-based data sharing in mobile cloud computing
    Zhang, Yinghui
    Wu, Axin
    Zheng, Dong
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1039 - 1048
  • [7] Efficient and privacy-aware attribute-based data sharing in mobile cloud computing
    Yinghui Zhang
    Axin Wu
    Dong Zheng
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1039 - 1048
  • [8] Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds
    Xu, Xiaolong
    Zhao, Xuan
    Ruan, Feng
    Zhang, Jie
    Tian, Wei
    Dou, Wanchun
    Liu, Alex X.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [9] A Perspective on the Challenges and Opportunities for Privacy-Aware Big Transportation Data
    Godwin Badu-Marfo
    Bilal Farooq
    Zachary Patterson
    [J]. Journal of Big Data Analytics in Transportation, 2019, 1 (1): : 1 - 23
  • [10] Sedic: Privacy-Aware Data Intensive Computing on Hybrid Clouds
    Zhang, Kehuan
    Zhou, Xiaoyong
    Chen, Yangyi
    Wang, XiaoFeng
    Ruan, Yaoping
    [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 515 - 525