Privacy and Anonymization as a Service: PASS

  • Ghasem Heyrani-Nobari
  • Omar Boucelma
  • Stéphane Bressan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5982)


The Internet and the World Wide Web democratized the means to publish and share corporate and personal data. Many anecdotes occurred over the last decades that well illustrate the danger for privacy and confidentiality. The advent of Cloud computing infrastructures is likely, if successful, to further encourage this trend. The analysis, diagnosis and prevention of privacy risk within a Cloud computing infrastructure are therefore important services to provide to users. In recent years, several algorithms such as K-anonymity, L-diversity and Anatomy, have been proposed to address the issue of data anonymization and diversification. They transform original data sets into modified data sets ensuring some privacy while minimizing the information loss incurred during the transformation. Shared and published data can remain meaningful without jeopardizing privacy.

We propose an integrated collection of privacy management services together with an interface to orchestrate their execution and assess their evaluation. The system consists of Web services and Cloud architecture. Cloud users can explore and apply privacy management services as Cloud services. This proposal is a first but significant step towards the general concept of a Cloud of data services and data transformation processes for data privacy, anonymity, security, quality, mining, management, publishing and sharing of data.


web services data privacy anonymization online database tools data quality cloud services 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Machanavajjhala, Gehrke, J., Kifer, D.: l-diversity: Privacy beyond k-anonymity. In: ICDE (2006) Google Scholar
  2. 2.
    Mirakabad, M.R.Z., Jantan, A., Bressan, S.: Towards a Privacy Diagnosis Centre: Measuring k-Anonymity. In: International Symposium on Computer Science and its Applications, CSA (2008)Google Scholar
  3. 3.
    Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, 557–570 (2002)Google Scholar
  4. 4.
    Wang, K., Fung, B.: Anonymizing sequential releases. In: SIGKDD (2006)Google Scholar
  5. 5.
    Xiao, X., Tao, Y.: Anatomy: Simple and effective privacy preservation. In: VLDB (2006)Google Scholar
  6. 6.
    JQuery new JavaScript library,
  7. 7.
    JSON (JavaScript Object Notation),
  8. 8.
    AJAX (Asynchronous JavaScript and XML),
  9. 9.
    WCF (Windows Communication Foundation),

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Ghasem Heyrani-Nobari
    • 1
  • Omar Boucelma
    • 2
  • Stéphane Bressan
    • 1
  1. 1.School of ComputingNational University of Singapore 
  2. 2.LSISAix-Marseille University 

Personalised recommendations