Privacy on Metric Data Assets
نویسندگان
چکیده
This paper considers a cloud computing setting in which similarity querying of metric data is outsourced to a service provider. The data is to be revealed only to trusted users, not to the service provider or anyone else. Users query the server for the most similar data objects to a query example. Outsourcing offers the data owner scalability and a low-initial investment. The need for privacy may be due to the data being sensitive (e.g., in medicine), valuable (e.g., in astronomy), or otherwise confidential. Given this setting, the paper presents techniques that transform the data prior to supplying it to the service provider for similarity queries on the transformed data. Our techniques provide interesting trade-offs between query cost and accuracy. Various techniques are built to transform and encrypt data before storing to database server for security reasons. The queries made by trusted clients are also protected in the same fashion. They offer an intuitive privacy guarantee. Empirical studies with real data demonstrate that the techniques are capable of offering privacy while enabling efficient and accurate processing of similarity queries. Keywords— Query processing, Security, integrity, and protection
منابع مشابه
Reasoning About Security and Privacy in Cloud Computing Under a Unified Meta-Model
Over the last decade, cloud computing presents a rapid growth as an increasing number of individuals, private and public organizations tend to adopt cloud technologies for storing their data or providing their services. However, due to the fact that migration into cloud in most cases implies that data subjects lose control of their data, many people and several scientists raise issues about dat...
متن کاملMulti-Tenancy Issues with Service Delivery in Developing Economies: Privacy, Trust and Availability Concerns
Cloud computing is a new paradigm and innovation in the technology service delivery. It is utilized for IT-enabled value creation. The capex-free nature of cloud service delivery renders it very attractive to many SMEs. But it is saddled with multi-tenancy issues; prominent under this study are concerns of privacy, trust and availability. How do end-users trust providers with their sensitive da...
متن کاملAnalyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملDifferential Privacy in Metric Spaces: Numerical, Categorical and Functional Data Under the One Roof
We study Differential Privacy in the abstract setting of Probability on metric spaces. Numerical, categorical and functional data can be handled in a uniform manner in this setting. We demonstrate how mechanisms based on data sanitisation and those that rely on adding noise to query responses fit within this framework. We prove that once the sanitisation is differentially private, then so is th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014