通信学报 ›› 2016, Vol. 37 ›› Issue (4): 96-106.doi: 10.11959/j.issn.1000-436x.2016076

• 学术论文 • 上一篇    下一篇

面向DaaS应用的数据集成隐私保护机制研究

周志刚,张宏莉,余翔湛,李攀攀   

  1. 哈尔滨工业大学计算机网络与信息安全技术研究中心,黑龙江 哈尔滨150001
  • 出版日期:2016-04-25 发布日期:2016-04-26
  • 基金资助:
    国家重点基础研究发展计划(“973”计划)基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目

Research on data integration privacy preservation mechanism for DaaS

Zhi-gang ZHOU,Hong-li ZHANG,Xiang-zhan YU,Pan-pan LI   

  1. Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin 150001, China
  • Online:2016-04-25 Published:2016-04-26
  • Supported by:
    The National Basic Research Program of China (973 Program);The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China

摘要:

云计算的出现为多个数据拥有者进行数据集成发布及协同数据挖掘提供了更广阔的平台,在数据即服务模式(DaaS, data as a service)下,集成数据被部署在非完全可信的服务运营商平台上,数据隐私保护成为制约该模式应用和推广的挑战性问题。为防止数据集成时的隐私泄露,提出一种面向 DaaS 应用的两级隐私保护机制。该隐私保护机制独立于具体的应用,将数据属性切分到不同的数据分块中,并通过混淆数据确保数据在各个分块中均衡分布,实现对数据集成隐私保护。通过分析证明该隐私保护机制的合理性,并通过实验验证该隐私保护机制具有较低的计算开销。

关键词: 云安全, 数据即服务, 隐私保护, 匿名

Abstract:

The emergence of cloud computing provides a broader platform for multiple data owners to make integrated data publishing and collaborative data mining. In data-as-a-service (DaaS) model, integrated data was deployed in a cer-tain cloud platform with an untrusted service provider ta privacy leakage has become the challenge hindering applica-tion and popularization of DaaS model. For protecting privacy in the data integration stage, a two-layer privacy pro-tection mechanism for DaaS-oriented application was given, which was independent ith the specific applications, parti-tioning data attributes into different parts. In addition, the corres ding fake data set was used to assure the balanced distribution of data in each part, which realized privacy protection of data integration. The experimental results indicate that the proposed strategy is feasible, simultaneously has the low computing overhead.

Key words: cloud security, data as a service, privacy protection, anonymity

No Suggested Reading articles found!