Abstract
Nowadays big data security plays a major issue in cloud computing. Chunk-confusion-based privacy protection mechanism (CCPPM) protects the privacy of the tenants in plaintext. But both multi-tenant applications’ data and tenants’ privacy requirements are dynamically changing, which will have a great effect on the underlying storage model of cloud data. Moreover, the tenants’ business processing will change the data distribution and destroy the distribution balance of privacy data, which makes the data stored in the cloud face the risk of leakage of privacy. Therefore, the paper proposed a privacy protection evaluation mechanism for dynamic data based on CCPPM. The paper firstly introduces three kinds of the privacy leakages due to unbalanced data under the CCPPM, and analyzes two methods used for attacking. Aiming at the privacy leakages and the attack methods, we proposed a dynamic data processing algorithm to record the tenants’ operation sequence and set up the corresponding evaluation formula. Next, we evaluated the effect of privacy protection from two aspects of simple attack and background-knowledge-based attack, and used the data distribution similarity privacy preserving dynamic evaluation algorithm presented in this paper to obtain the measurement results of privacy leakages. Finally, according to the evaluation results, the defense strategies are given to prevent data privacy leakages. The experimental evaluation proves that rationality of dynamic the evaluation mechanism proposed in this paper has better feasibility and practicality for big data privacy protection.
Similar content being viewed by others
References
Sweeney, L. (2002). k-anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems, 10, 557–570.
Tian, X. X., Wang, X. L., & Gao, M. (2010). Database as a Services-Security and privacy preserving. Chinese Journal of Software, 21(5), 991–1006.
Shyam, N. K. (2015). DecenCrypto cloud: decentralized cryptography technique for secure communication over the clouds. Journal of Computer Sciences and Applications, 3(3), 73–78.
Yang, J. J., Li, J. Q., & Niu, Y. (2015). A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Generation Computer Systems, 43–44, 74–86.
Denning, D. E., Akl, S. G., Heckman, M., et al. (1987). Views for multilevel database security. IEEE Transactions on Software Engineering, SE-1(2), 129–140.
Karabulut, Y., & Nassi, I. (2009). Secure enterprise services consumption for SaaS technology platforms. Proceedings - International Conference on Data Engineering (pp. 1749–1756).
Xiong, J. B., Li, F. H., Ma, J. F., Liu, X. M., Yao, Z. Q., & Chen, P. S. (2015). A full lifecycle privacy protection scheme for sensitive data in cloud computing. Peer-to-Peer Networking and Applications, 8(6), 1025–1037.
Feng, D. G., & Li, M. Z, H. (2014). Big data security and privacy protection. Chinese Journal of Computers, 37(1), 246–258.
Li, L., Li, Q. Z., Shi, Y. L., & Zhang, K. (2012). SAPS-A Single Attribute Protection Scheme for SaaS. Information, 15(1), 275–282.
Zhang, K., Li, Q. Z., & Shi, Y. L. (2010). Research on data combination privacy preservation mechanism for SaaS. Chinese Journal of Computers, 33(11), 2044–2054.
Shi, Y. L., Jiang, Z., & Zhang, K. (2013). Policy-Based Customized Privacy Preserving Mechanism for SaaS Applications. Grid and Pervasive Computing, 7861, 491–500.
Shao, Y. L., & Shi, Y. L. (2014). A Novel Cloud Data Fragmentation Cluster-Based Privacy Preserving Mechanism IJGDC. International Journal of Grid and Distributed Computing,, 7(4), 21–32.
Fan, C. I., & Huang, S. Y. (2013). Controllable privacy preserving search based on symmetric predicate encryption in cloud storage. Future Generation Computer Systems, 29, 1716–1724.
Byun, J. W., Sohn, Y., Bertino, E., & Li, N. (2006). Secure Anonymization for Incremental Datasets. 3rd VLDB Workshop on Secure Data Management, 4165LNCS, 48–63.
Shen, Y., Cui, W. J., Li, Q. Z., & Shi, Y. L. (2011). Hybrid fragmentation to preserve data privacy for SaaS. Proceedings-8th Web Information Systems and Applications Conference,WISA 2011,Workshop on Semantic Web and Ontology, SWON 2011 Workshop on Electronic Government Technology and Application, EGTA 2011 (pp.3–6).
Saleh, E., Takouna, l., & Meinal, C. (2013). SignedQuery: Protecting users data in multi-tenant SaaS environments. Proceedings of the 2013 International Conference on Advances in Computing, Communications and Informatics (pp.213–218).
Patel, K., Singh, N., Parikh, K., Kumar K. S., & Sendhil, J. N. (2014). Data security and privacy using data partition and centric key management in cloud. 2014 International Conference on Information Communication and Embedded Systems.
Tsai, W., Bai, X. Y., & Huang, Y. (2014). Software-as-a-service (SaaS): perspectives and challenges. SCIENCE CHINA Information Sciences, 57(5), 1–15.
Zhou, S. G., Li, F., Tao, Y. F., & Xiao, X. K. (2009). Privacy Preservation in Database Applications: A Survey. Chinese Journal of Computers, 32(5), 847–863.
Kailkhura, B., Brahma, S., Han, Y. S., & Varshney, P. K. (2013). Optimal distributed detection in the presence of Byzantines. ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing –Proceedings (pp. 2925–2929).
Li, Y. B., Dai, W. Y., Ming, Z., & Qiu, M. K. (2016). Privacy protection for preventing data over-collection in Smart City. IEEE Transactions on Computers, 65(5), 1339–1350.
Nadendla, V. S. S., Chen, H., & Varshney, P. K. (2010). Secure distributed detection in the presence of eavesdroppers. Signals, Systems and Computers (ASILOMAR), 2010 Conference Record of the Forty Fourth Asilomar Conference on (pp. 1437–1441).
Mao, H., Shuai, X., & Kapadia, A. (2011). Loose Tweets: An Analysis of Privacy Leaks on Twitter. Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, (pp. 1–12).
Li, Z., & Oechtering T. J. (2014). Tandem distributed Bayesian detection withprivacy constraints. Acoustics, Speech and Signal Processing (ICASSP) (pp. 8168- 8172).
Wang, C. M., Guo, Y. J., & Guo, Y. H. (2012). Privacy metric for user’s trajectory in location-based services. Journal of Software, 23, 352–360.
Du, W., Teng, Z., & Zhu, Z. (2008). Privacy-maxent: integrating background knowledge in privacy quantification. Special Interest Group on Management of Data (ACM) (pp. 459–472).
Liu, J. Q. (2012). Publishing set-valued data against realistic adversaries. Journal of Computer Science and Technology, 27, 24–36.
Li, J. Y., Qiu, M. K., Ming, Z., Quan, G., Qin, X., & Gu, Z. H. (2012). Online optimization for scheduling Preemptable tasks on IaaS cloud systems. Journal of Parallel and Distributed Computing (JPDC), 72(5), 666–677.
Qiu, M. Y., & Sha, E. (2009). Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems. ACM Transactions on Design Automation of Electronic Systems (TODAES), 14(2), 1–30.
Charikar, M. (2002). Similarity Estimation Techniques from Rounding Algorithms. Proceedings of the 34th Annual ACM Symposium on Theory of Computing (pp. 380–388).
Xiong, W. P., & Li, D. (2013). Quality model for evaluating SaaS service. Proceedings of 4th International Conference on Emerging Intelligent Data and Web Technologies (pp. 83–87).
Souza, Rafael, T. D., & Sergio, D. Z. (2015). Privacy-Preserving Mechanism for Monitoring Sensitive Data. Proceedings of 12th International Conference on Information Technology: New Generations (pp. 191–196).
Sandha, Ganaga, M. D. (2014). Study on data security mechanism in cloud computing. Proceedings of 2014 2nd International Conference on Current Trends in Engineering and Technology (pp. 13–17).
Acknowledgments
The research work was supported by the National Natural Science Foundation of China under Grant No.61572295, 61272241, the Innovation Methods Work Special Project No.2015IM010200, the TaiShan Industrial Experts Programme of Shandong Province, the Natural Science Foundation of Shandong Province under Grant No.ZR2014FM031, ZR2013FQ014, the Shandong Province Science and Technology Major Special Project No.2015ZDJQ01002, 2015ZDXX0201B03, 2015ZDXX0201A04, the Shandong Province Key Research and Development Plan No.2015GGX101015, the Fundamental Research Funds of Shandong University No.2015JC031.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shi, Yl., Chen, Y., Zhou, Zm. et al. A Privacy Protection Evaluation Mechanism for Dynamic Data Based on Chunk-Confusion. J Sign Process Syst 89, 27–39 (2017). https://doi.org/10.1007/s11265-016-1161-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11265-016-1161-2