2015
DOI: 10.12720/jcm.10.1.55-63
|View full text |Cite
|
Sign up to set email alerts
|

Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing

Abstract: As a new software paradigm, cloud computing provides services dynamically according to user requirements. However, it is difficult to control personal privacy information because of the opening, virtualization, multi-tenancy and service outsourcing characters. Therefore, how to protect user privacy information has become a research focus. In this paper, we propose requirement-oriented privacy protection theory analysis architecture and implementation platform. Firstly, the theory analysis architecture is depic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…This scheme ensures that statistical queries on the target dataset and on datasets that differ by only one record are identical in results [ 15 ]. Ke et al [ 16 ] proposed the use of differential privacy computing to achieve privacy-preserving mining of joint datasets [ 16 ]. Barni et al [ 17 ] proposed a distributed algorithm, which assumes that the same record has a unique global identifier in a vertically divided data environment, and all parties involved in data fusion only have data with partial attributes; the original information is hidden in the communication process, and the privacy protection of the data fusion process is realized by constructing a complete anonymity table to determine whether the anonymity threshold is met [ 17 ].…”
Section: Related Workmentioning
confidence: 99%
“…This scheme ensures that statistical queries on the target dataset and on datasets that differ by only one record are identical in results [ 15 ]. Ke et al [ 16 ] proposed the use of differential privacy computing to achieve privacy-preserving mining of joint datasets [ 16 ]. Barni et al [ 17 ] proposed a distributed algorithm, which assumes that the same record has a unique global identifier in a vertically divided data environment, and all parties involved in data fusion only have data with partial attributes; the original information is hidden in the communication process, and the privacy protection of the data fusion process is realized by constructing a complete anonymity table to determine whether the anonymity threshold is met [ 17 ].…”
Section: Related Workmentioning
confidence: 99%
“…Some scholars research and propose a kind of forecasting method of cloud computing load resources matched with the mode in this field, such as Caron, et al [2] , and this method used improving the string matching algorithms (KMP). Saripalli, et al [5] proposed a method to identify the resources load peak and forecasting.. Prevost, et al [6] use the neural network and self-regression model to forecast the loads of different types of resources.…”
Section: Related Workmentioning
confidence: 99%
“…However, due to the randomness task of cloud computing platform, sparse and dense degree of different machine work is different, which causes the existence of spare resources wasting [1]. The prediction of resource consumption's status becomes a vital factors to improve the efficiency of cloud computing platform [2], [3]. Therefore, the prediction of data center in cloud computing has a significant value to research.…”
Section: Introductionmentioning
confidence: 99%