Journal of the ACM (JACM)
Communications of the ACM
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
An Online Algorithm for Segmenting Time Series
ICDM '01 Proceedings of the 2001 IEEE International Conference on Data Mining
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
On Introducing Noise into the Bus-Contention Channel
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
General constructions for information-theoretic private information retrieval
Journal of Computer and System Sciences
Inferring Internet denial-of-service activity
ACM Transactions on Computer Systems (TOCS)
Personalization in privacy-aware highly dynamic systems
Communications of the ACM - Privacy and security in highly dynamic systems
Security in Computing (4th Edition)
Security in Computing (4th Edition)
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Improving the Robustness of Private Information Retrieval
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Forecasting Duration Intervals of Scientific Workflow Activities Based on Time-Series Patterns
ESCIENCE '08 Proceedings of the 2008 Fourth IEEE International Conference on eScience
Future Generation Computer Systems
Fully homomorphic encryption using ideal lattices
Proceedings of the forty-first annual ACM symposium on Theory of computing
De-anonymizing Social Networks
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
Privacy Weaknesses in Biometric Sketches
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
Noise Injection for Search Privacy Protection
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03
A Privacy Manager for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Privacy of Value-Added Context-Aware Service Cloud
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Communications of the ACM
Cloud computing privacy concerns on our doorstep
Communications of the ACM
An Obfuscation-Based Approach for Protecting Location Privacy
IEEE Transactions on Dependable and Secure Computing
Implementing Trust in Cloud Infrastructures
CCGRID '11 Proceedings of the 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
Practical delegation of computation using multiple servers
Proceedings of the 18th ACM conference on Computer and communications security
A historical probability based noise generation strategy for privacy protection in cloud computing
Journal of Computer and System Sciences
A trust-based noise injection strategy for privacy protection in cloud
Software—Practice & Experience
An association probability based noise generation strategy for privacy protection in cloud computing
ICSOC'12 Proceedings of the 10th international conference on Service-Oriented Computing
Hi-index | 0.00 |
Cloud computing promises an open environment where customers can deploy IT services in a pay-as-you-go fashion while saving huge capital investment in their own IT infrastructure. Due to the openness, various malicious service providers may exist. Such service providers may record service information in a service process from a customer and then collectively deduce the customer's private information. Therefore, from the perspective of cloud computing security, there is a need to take special actions to protect privacy at client sides. Noise obfuscation is an effective approach in this regard by utilising noise data. For instance, it generates and injects noise service requests into real customer service requests so that service providers would not be able to distinguish which requests are real ones if their occurrence probabilities are about the same. However, existing typical noise generation strategies mainly focus on the entire service usage period to achieve about the same final occurrence probabilities of service requests. In fact, such probabilities can fluctuate in a time interval such as three months and may significantly differ than other time intervals. In this case, service providers may still be able to deduce the customers' privacy from a specific time interval although unlikely from the overall period. That is to say, the existing typical noise generation strategies could fail to protect customers' privacy for local time intervals. To address this problem, we develop a novel time-series pattern based noise generation strategy. Firstly, we analyse previous probability fluctuations and propose a group of time-series patterns for predicting future fluctuated probabilities. Then, based on these patterns, we present our strategy by forecasting future occurrence probabilities of real service requests and generating noise requests to reach about the same final probabilities in the next time interval. The simulation evaluation demonstrates that our strategy can cope with these fluctuations to significantly improve the effectiveness of customers' privacy protection.