Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2522548.2523138acmotherconferencesArticle/Chapter ViewAbstractPublication PagescomputeConference Proceedingsconference-collections
research-article

Trends and research directions for privacy preserving approaches on the cloud

Published: 22 August 2013 Publication History

Abstract

With advancements in hardware and software capabilities, cloud computing has evolved into a widely utilized paradigm for pay per use and robust computation. An unparalleled repository of user sensitive data that resides on the cloud poses severe threat to the privacy of individuals. Users authenticate, store and perform computations on their data using cloud services. From the cloud's perspective, it gathers additional user data via ubiquitous devices, mines this information to offer personalized services like recommendations and disseminates the results. However, the interactions between the cloud and user at each stage of this pipeline development is limited by privacy concerns. In recent years, much work has been done on designing privacy preserving approaches for improving cloud security and the trust network. A wide array of data mining, cryptography and information hiding techniques have been applied to cater to different aspects of providing risk free work environment in the cloud. Given the lack of management of this information, a systematic investigation is required to structurally organize the topics studied. This paper aims to clearly portray the stringent and urgent need for applying privacy preserving approaches to the cloud and highlight the relevant work that has been done along these lines. The key objective is to identify important areas of user-cloud interaction and demonstrate a survey on the state of the art algorithms that have led to improved cloud privacy in these areas The focus is on exploring criteria for the impact of such approaches on user cloud interaction. An understanding of the research issues associated with these sensitive areas of cloud computing may enable us to better leverage benefits of the cloud and reflect on future possibilities of exploration.

References

[1]
Neethu Mariam Joseph, Esther Daniel and N A Vasanthi. Article: Survey on Privacy-Preserving Methods for Storage in Cloud Computing. IJCA Proceedings on Amrita International Conference of Women in Computing - 2013 AICWIC(4):1--4, January 2013
[2]
A., Evfimievski, J., Gehrke, & R., Srikant. (2003, June). Limiting privacy breaches in privacy preserving data mining. In Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (pp. 211--222). ACM
[3]
Siani, Pearson, Yun Shen, and Miranda Mowbray. "A privacy manager for cloud computing." In Cloud Computing, pp. 90--106. Springer Berlin Heidelberg, 2009
[4]
Ruj, Sushmita, Milos Stojmenovic, and Amiya Nayak. "Privacy preserving access control with authentication for securing data in clouds." In Cluster, Cloud and Grid Computing (CCGrid), 2012 12th IEEE/ACM International Symposium on, pp. 556--563. IEEE, 2012
[5]
Safwan Mahmud, Khan, and W. Hamlen Kevin. "AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing." In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, pp. 170--176. IEEE, 2012.
[6]
D. W., Chadwick, & K., Fatema,. A privacy preserving authorisation system for the cloud. Journal of Computer and System Sciences, 78(5), 1359--1373, (2012)
[7]
Anu, Gopalakrishnan." Cloud computing identity management." SETLabs briefings 7, no. 7 (2009): 45--54
[8]
Cavoukian, Ann. "Privacy and Digital Identity: Implications For The Internet." Proceedings from Identity in the Information Society Workshop, Lake Maggiore, Italy. 2008
[9]
Bertino, Elisa, Federica Paci, Rodolfo Ferrini, and Ning Shang. "Privacy-preserving digital identity management for cloud computing." IEEE Data Eng. Bull 32, no. 1 (2009): 21--27.
[10]
Angin, Pelin, Bharat Bhargava, Rohit Ranchal, Noopur Singh, Mark Linderman, L. Ben Othmane, and Leszek Lilien. "An entity-centric approach for privacy and identity management in cloud computing." In Reliable Distributed Systems, 2010 29th IEEE Symposium on, pp. 177--183. IEEE, 2010
[11]
Vic JR, Winkler. Securing the cloud: Cloud computer security techniques and tactics. Syngress, 2011
[12]
Andrew Solomon, Privacy and the cloud, Speech to cloud computing conference, Australia, 2010
[13]
Erin Gilmer, Privacy and security of patient data in the cloud, IBM Developer works, http://www.ibm.com/developerworks/library/cl-hipaa/, 2012
[14]
D'Angelo, Gabriele, Fabio Vitali, and Stefano Zacchiroli. "Content cloaking: preserving privacy with google docs and other web applications." In Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 826--830. ACM, 2010
[15]
Steven Y., Ko, Jeon, Kyungho and Ramsés Morales. "The hybrex model for confidentiality and privacy in cloud computing." Proc. of HotCloud (2011).
[16]
Bernardo, Ferreira, and Domingos Henrique. "Management and search of private data on storage clouds." In Proceedings of the Workshop on Secure and Dependable Middleware for Cloud Monitoring and Management, p. 4. ACM, 2012.
[17]
Itani, Wassim, Ayman Kayssi, and Ali Chehab. "Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures." In Dependable, Autonomic and Secure Computing, 2009. DASC'09. Eighth IEEE International Conference on, pp. 711--716. IEEE, 2009.
[18]
Mehul A., Shah, Mary Baker, Jeffrey C. Mogul, and Ram Swaminathan. "Auditing to keep online storage services honest." In Proceedings of the 11th USENIX workshop on Hot topics in operating systems, pp. 1--6. USENIX Association, 2007.
[19]
Wang, Cong, Qian Wang, Kui Ren, and Wenjing Lou. "Privacy-preserving public auditing for data storage security in cloud computing." In INFOCOM, 2010 Proceedings IEEE, pp. 1--9. IEEE, 2010.
[20]
Rampal, Singh, Sawan Kumar, and Shani Kumar Agrahari. "Ensuring Data Storage Security in Cloud Computing.", 2012
[21]
Rakesh, Agrawal, and Srikant Ramakrishnan. "Privacy-preserving data mining." ACM Sigmod Record 29, no. 2 (2000): 439--450.
[22]
Yehuda, Lindell, and Benny Pinkas. "Privacy preserving data mining." In Advances in Cryptology---CRYPTO 2000, pp. 36--54. Springer Berlin Heidelberg, 2000
[23]
Verykios, Vassilios S., Elisa Bertino, Igor Nai Fovino, Loredana Parasiliti Provenza, Yucel Saygin, and Yannis Theodoridis. "State-of-the-art in privacy preserving data mining." ACM Sigmod Record 33, no. 1 (2004): 50--57.
[24]
Jian, Wang, Yongcheng Luo, Yan Zhao, and Jiajin Le. "A survey on privacy preserving data mining." In Database Technology and Applications, 2009 First International Workshop on, pp. 111--114. IEEE, 2009.
[25]
Mike J. Atallah, Elisa Bertino, Ahmed K. Elmagarmid, Mohamed Ibrahim, and Vassilios S. Verykios, Disclosure Limitation of Sensitive Rules, In Proceedings of the IEEE Knolwedge and Data Engineering Workshop (1999), 45--52.
[26]
Elena Dasseni, Vassilios S. Verykios, Ahmed K. Elmagarmid, and Elisa Bertino, Hiding Association Rules by using Confidence and Support, In Proceedings of the 4th Information HidingWorkshop (2001), 369--383.
[27]
Vassilios S. Verykios, Ahmed K. Elmagarmid, Bertino Elisa, Yucel Saygin, and Dasseni Elena, Association Rule Hiding, IEEE Transactions on Knowledge and Data Engineering (2003)
[28]
Stanley R. M. Oliveira and Osmar R. Zaiane, Privacy preserving frequent itemset mining, In Proceedings of the IEEE ICDM Workshop on Privacy, Security and Data Mining (2002), 43--54.
[29]
Charu C., Aggarwal, and Philip S. Yu. A general survey of privacy-preserving data mining models and algorithms. Springer US, 2008
[30]
Benjamin, Fung, Rui Chen, Ke Wang, and S. Yu Philip. "Privacy-preserving data publishing: A survey of recent developments." ACM Computing Surveys (CSUR) 42, no. 4 (2010): 14.
[31]
L. Sweeney, "Achieving k-Anonymity Privacy Protection Using Generalization and Suppression," Int'l J. Uncertainty Fuzziness and Knowledge-Based Systems, vol. 10, no. 6, pp. 571--588, 2002.
[32]
X. Xiao and Y. Tao, "Anatomy: Simple and Effective Privacy Preservation," Proc. Int'l Conf. Very Large Data Bases (VLDB), pp. 139--150, 2006.
[33]
Tiancheng, Li, Ninghui Li, Jian Zhang, and Ian Molloy. "Slicing: A New Approach for Privacy Preserving Data Publishing." Knowledge and Data Engineering, IEEE Transactions on 24, no. 3 (2012): 561--574.
[34]
C. C. Aggarwal. On k-anonymity and the curse of dimensionality. In VLDB, pages 901--909, 2005
[35]
G., Adomavicius, and A. Tuzhilin, (2005) Personalization technologies: a process oriented perspective, Communications of the ACM, 48(10), 83--90
[36]
H., Fan, and M. S, Poole. (2006) What is personalization? Perspectives on the design and implementation of personalization in information systems, In Journal of organizational computing and electronic commerce, 16(3&4), 179--202
[37]
T., Li, & N. Li. (2009). On the tradeoff between privacy and utility in data publishing. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 517--526). ACM.
[38]
M., Hildebrandt. (2009). Who is profiling who? Invisible visibility. Reinventing data protection? (pp. 239--252).
[39]
Casadesus-Masanell, Ramon, and Andres Hervas-Drane. "Competing with Privacy." (2013).
[40]
Alfred, Kobsa. "Privacy-enhanced personalization." Communications of the ACM 50, no. 8 (2007): 24--33.
[41]
B. A., Huberman, E., Adar, and L. R, Fine. Valuating privacy. In Fourth Workshop on the Economics of Information Security, (Cambridge, MA, 2005); http://infosecon.net/workshop/pdf/7.pdf.
[42]
Juan D Velásquez. "Web Mining and privacy concerns: Some important legal issues to be consider before applying any data and information extraction technique in Web-based environments." Expert Systems with Applications(2013)
[43]
Eran, Toch, Yang Wang, and Lorrie Faith Cranor. "Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems." User Modeling and User-Adapted Interaction 22, no. 1-2 (2012): 203--220
[44]
Su, Diao, and Lu Tingjie. "U-Commerce Product Adoption: An Economic Model for Personalization and Privacy Concerns." In Management and Service Science, 2009. MASS'09. International Conference on, pp. 1--3. IEEE, 2009
[45]
Antón, Annie I., Julia B. Earp, and Jessica D. Young. "How internet users' privacy concerns have evolved since 2002." Security & Privacy, IEEE 8, no. 1 (2010): 21--27.
[46]
L., Story, B., Stone: Facebook retreats on online tracking. New York Times, New York (2007)
[47]
Facebook (2010), Facebook instant personalization. http://blog.facebook.com/blog.php?post=384733792130. Accessed 26 April 2010
[48]
TRUSTe, TNS: 2009 study: consumer attitudes about behavioral targeting. Tech. rep., TRUSTe (2009)
[49]
E., Toch, J., Cranshaw, P. H., Drielsma, J. Y., Tsai, P. G., Kelley, J., Springfield, L., Cranor, J., Hong, N., Sadeh: Empirical models of privacy in location sharing. In: Proceedings of the 12th ACM international conference on Ubiquitous computing, Ubicomp '10, pp. 129--138. ACM Press, New York (2010)
[50]
Y., Wang, G., Norcie, L. F., Cranor: Who is concerned about what? a study of american, chinese and indian users' privacy concerns on social networking sites. In: 4th international conference on trust and trustworthy computing (TRUST2011), Springer, Pittsburgh 2011
[51]
Based on: The Global Internet User Survey(GUIS), 2012 https://www.internetsociety.org/sites/default/files/rep-GIUS2012global-201211-en.pdf
[52]
Boyles, Jan Lauren, Aaron Smith, and Mary Madden. "Privacy and data management on mobile devices." Pew Internet & American Life Project, September (2012).
[53]
S., Warren, & L., Brandeis, (1890). The right to privacy. Harvard Law Review, 4,193--220.
[54]
R., Gross, & A., Acquisti. (2005). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on privacy in the electronic society WPES '05 (pp. 71--80). New York, NY, USA: ACM.
[55]
Eugene H., Spafford. "USACM and US legislation." Communications of the ACM55, no. 6 (2012): 5--5
[56]
M. J. Culnan, "How Privacy Notices Promote Informed Consumer Choice," Considering Consumer Privacy: A Resource for Policymakers and Practitioners, P. J. Bruening, ed., Center for Democracy & Technology, 2003, pp. 12--16
[57]
J., Gideon, L., Cranor, S., Egelman, and A., Acquisti. Power strips, prophylactics, and privacy, oh my! In Second Symposium on Usable Privacy and Security, (Pittsburgh, PA, 2006), ACM Press, 133--144; doi 10.1145/1143120.1143137.
[58]
A., Kobsa, and M., Teltzrow. Contextualized communication of privacy practices and personalization benefits: Impacts on users' data sharing behavior. In Privacy Enhancing Technologies: Fourth International Workshop(Toronto, Canada, 2005).
[59]
A., Young, & A., Quan-Haase. (2009). Information revelation and internet privacy concerns on social network sites: a case study of facebook. In Proceedings of the fourth international conference on communities and technologies (pp. 265--274).ACM.
[60]
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In SIGMOD, pages 563--574, 2004.
[61]
S. Wang, D. Agrawal, and A. El Abbadi. A comprehensive framework for secure query processing on relational data in the cloud. In SDM, pages 52--69, 2011.
[62]
C. Gentry. Computing arbitrary functions of encrypted data. Communication of ACM, 53:97--105, 2010.
[63]
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan.Private information retrieval. Journal of ACM, 45(6):965--981, 1998.
[64]
R. Ostrovsky. Efficient computation on oblivious RAMs. In STOC, pages 514--523, 1990.
[65]
F. G. Olumofin and I. Goldberg. Revisiting the computational practicality of private information retrieval. In Financial Cryptography, pages 158--172, 2011.
[66]
J., Kay: Scrutable adaptation: because we can and must. In: Adaptive hypermedia and adaptive web-based systems, pp. 11--19. Springer, Berlin (2006)
[67]
C., Dwyer, S. R., Hiltz, K, Passerini. Trust and privacy concern within social networking sites: a comparison of facebook and myspace. In: Proceedings of the thirteenth americas conference on information systems (AMCIS 2007), Keystone (2007)
[68]
S., Gerber, M., Fry, J., Kay, B., Kummerfeld, G., Pink, R. PersonisJ Wasinger,: mobile, Client-Side user modelling. In: International conference on user modeling, adaptation, and personalization, lecture notes in computer science, vol. 6075, pp. 111--122. Springer, Berlin (2010)
[69]
Oliveira, S. R. M., Zaiane, O. R.: Privacy preserving frequent itemset mining. In: IEEE ICDM Workshop on Privacy, Security and Data Mining, vol. 14, pp. 43--54 (2002)
[70]
Bertino, E., Fovino, I. N., Provenza, L. P.: A framework for evaluating privacy preserving data mining algorithms. Data Mining and Knowledge Discovery 11(2), 121--154 (2005)
[71]
Iyengar, V.: Transforming data to satisfy privacy constraints. In: Proc., the Eigth ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, pp. 279--288 (2002)
[72]
Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization. In: Proc. of the 21st Int'l Conf. on Data Engineering (2005)
[73]
Bertino, E., Fovino, I. N.: Information driven evaluation of data hiding algorithms. In: 7th International Conference on Data Warehousing and Knowledge Discovery, pp. 418--427 (2005)
[74]
Oliveira, S. R. M., Zaiane, O. R.: Privacy preserving clustering by data transformation. In: 18th Brazilian Symposium on Databases (SBBD 2003), pp. 304--318 (2003)

Cited By

View all
  • (2020)Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunitiesCluster Computing10.1007/s10586-020-03106-1Online publication date: 22-Apr-2020
  • (2015)DAGProceedings of the 2015 IEEE International Conference on Web Services10.1109/ICWS.2015.47(289-296)Online publication date: 27-Jun-2015

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
Compute '13: Proceedings of the 6th ACM India Computing Convention
August 2013
196 pages
ISBN:9781450325455
DOI:10.1145/2522548
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 August 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cloud computing
  2. data mining
  3. personalization
  4. privacy preservation
  5. storage

Qualifiers

  • Research-article

Conference

Compute '13
Compute '13: The 6th ACM India Computing Convention
August 22 - 25, 2013
Tamil Nadu, Vellore, India

Acceptance Rates

Compute '13 Paper Acceptance Rate 24 of 96 submissions, 25%;
Overall Acceptance Rate 114 of 622 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunitiesCluster Computing10.1007/s10586-020-03106-1Online publication date: 22-Apr-2020
  • (2015)DAGProceedings of the 2015 IEEE International Conference on Web Services10.1109/ICWS.2015.47(289-296)Online publication date: 27-Jun-2015

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media