Hybrid Solution for Privacy-Preserving Data Mining on the Cloud Computing

被引:2
|
作者
Osman, Huda [1 ,2 ]
Maarof, Mohd Aizaini [1 ]
Siraj, Maheyzah Md [1 ]
机构
[1] Univ Teknol Malaysia UTM, Fac Engn, Sch Comp, Johor Baharu, Malaysia
[2] Univ Kassala, Fac Comp Sci & Informat Technol, Kassala, Sudan
关键词
Privacy-Preserving; Data mining outsourcing; Cloud data privacy; ANONYMIZATION;
D O I
10.1007/978-3-030-33582-3_70
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The continuous evolution of the cloud has attracted many enterprises to outsource their data to the cloud to accomplish data mining tasks and other services. So that data owners can enjoy the benefits of the cloud without fear from violations of data privacy, PPDM approaches came to protect the privacy of data while preserving the usefulness of data. This article reviews the most popular models of PPDM over the cloud along with their strengths and the weaknesses to conclude the research gap. Some of the current PPDM models still vulnerable to various types of attacks like the K-anonymity model whereby surface from background knowledge attack, homogeneity attack, similarity attack and probabilistic inference attack, others of them consume great computational complexity, for example, the methods which depended on cryptography. The hybrid solution was proposed to protect the data privacy and overcome the current problems of PPDM include identify and attributes disclosures whereby preservation the privacy of data before to outsourced on the cloud is the main focus. K-Anonymization is combined with homomorphic encryption to rid from their limitations and take their advantage together to enhance data privacy-preserving and maintain the data utility of outsourced data.
引用
收藏
页码:748 / 758
页数:11
相关论文
共 50 条
  • [1] Privacy-Preserving Data Sharing in Cloud Computing
    Hui Wang
    [J]. Journal of Computer Science and Technology, 2010, 25 : 401 - 414
  • [2] Privacy-Preserving Data Sharing in Cloud Computing
    Wang, Hui
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (03) : 401 - 414
  • [3] Privacy-Preserving Data Sharing in Cloud Computing
    王慧
    [J]. Journal of Computer Science & Technology, 2010, 25 (03) : 401 - 414
  • [4] Granular Computing in Privacy-Preserving Data Mining
    Zhan, Justin
    Lin, Tsau Young
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2, 2008, : 86 - +
  • [5] Privacy-preserving Association Rule Mining Algorithm for Encrypted Data in Cloud Computing
    Kim, Hyeong-Jin
    Shin, Jae-Hwan
    Song, Young-ho
    Chang, Jae-Woo
    [J]. 2019 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (IEEE CLOUD 2019), 2019, : 487 - 489
  • [6] Hybrid Transformation in Privacy-Preserving Data Mining
    Putri, Awalia W.
    Hira, Laksmiwati
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON DATA AND SOFTWARE ENGINEERING (ICODSE), 2016,
  • [7] A Proposal of Privacy-Preserving Data Aggregation on the Cloud Computing
    Ushida, Mebae
    Itoh, Kouichi
    Katayama, Yoshinori
    Kozakura, Fumihiko
    Tsuda, Hiroshi
    [J]. 2013 16TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2013), 2013, : 141 - 148
  • [8] A Possible Solution For Privacy-Preserving Cloud Data Storage
    Paul, Mithun
    Collberg, Christian
    Bambauer, Derek
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2015), 2015, : 397 - 403
  • [9] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    [J]. SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [10] Efficient Privacy-Preserving Spatial Data Query in Cloud Computing
    Miao, Yinbin
    Yang, Yutao
    Li, Xinghua
    Wei, Linfeng
    Liu, Zhiquan
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (01) : 122 - 136