Data Obfuscation: Anonymity and Desensitization of Usable Data Sets
IEEE Security and Privacy
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Modeling human behavior in user-adaptive systems: Recent advances using soft computing techniques
Expert Systems with Applications: An International Journal
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Achieving secure, scalable, and fine-grained data access control in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
Improving tor using a TCP-over-DTLS tunnel
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Code obfuscation against static and dynamic reverse engineering
IH'11 Proceedings of the 13th international conference on Information hiding
Anonymous Service Usage and Payment in Service-Based Systems
HPCC '11 Proceedings of the 2011 IEEE International Conference on High Performance Computing and Communications
Hi-index | 0.00 |
In current cloud computing systems, because users' data is stored and processed by computing systems managed and operated by various service providers, users are concerned with the risks of unauthorized usage of their sensitive data by various entities, including service providers. The current cloud computing systems protect users' data confidentiality from all entities, except service providers. In this paper, an approach is presented for improving the protection of users' data confidentiality in cloud computing systems from all entities, including service providers. The authors' approach has the following features: 1 separation of cloud application providers, data processing service providers and data storage providers, 2 anonymization of users' identities, 3 grouping cloud application components and distributing their execution to distinct cloud infrastructures of data processing service providers, and 4 use of data obfuscation and cryptography for protecting the sensitive data from unauthorized access by all entities, including service providers. The proposed approach ensures that users' sensitive data can be protected from their service providers even if the users do not have full cooperation from their service providers.