Open Access Open Access  Restricted Access Subscription or Fee Access

Effective Privacy Preserving In Leakage Upper Bound Constraints Using Cloud

S. Hemalatha, S. AlaudeenBasha, N. Premkumar


In this paper, we propose a upper-bound privacy leakage constraint based approach to identify which intermediate datasets need to be encrypted and which do not, so that privacy preserving cost can be saved while the privacy requirements of data holders can still be satisfied. Cloud computing having a high computation power and storage capacity without any help of the infrastructure to organize the applications to the user. To avoid recomputation intermediate data sets are generated and stored recovering the privacy sensitive information through analyze the multiple intermediate data sets. In such cases, datasets are anonymized rather than encrypted to ensure both data utility and privacy preserving. Privacy preservation of multiple intermediate data sets are create a major problem. But in the existing applications, all the datasets are encrypted and it provides cost effectiveness and efficiency. To verify, which data sets are encrypted and not encrypted. Thus protecting its confidentiality against unintentional errors and attacks.


Data Storage Privacy, Encryption and Decryption, Privacy Preserving, Intermediate Dataset, Privacy Upper Bound, Economics of Scale.

Full Text:



E. Bertino, F. Paci, and R. Ferrini, “Privacy-Preserving Digital Identity Management for Cloud Computing,”IEEE Computer Society Data Engineering Bulletin, Mar.2009, pp. 1–4.

H. Takabi, J.B.D. Joshi, and G. Ahn, “Security and Privacy Challenges in Cloud Computing Environments,” IEEE Security & Privacy, vol. 8, no. 6, pp. 24-31, Nov./Dec. 2010.

X. Zhang, C. Liu, J. Chen, and W. Dou, “An Upper-Bound Control Approach for Cost-Effective Privacy Protection of Intermediate Data Set Storage in Cloud,” Proc. Ninth IEEE Int’l Conf. Dependable, Autonomic and Secure Computing (DASC ’11), pp. 518-525, 2011.

Lin and W. Tzeng, “A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 6, pp. 995-1003, 2012. N. Cao, C. Wang, M. Li,

K. Zhang, X. Zhou, Y. Chen, X. Wang and Y. Ruan, “Sedic:Privacy-Aware Data Intensive Computing on Hybrid Clouds,”Proc. 18th ACM Conf. Computer and Communications Security (CCS'11), pp. 515-526, 2011.

V. Ciriani, S.D.C.D. Vimercati, S. Foresti, S. Jajodia, S.Paraboschi and P. Samarati, “Combining Fragmentation and Encryption to Protect Privacy in Data Storage,” ACM Trans.Information and System Security, vol. 13, no. 3, pp. 1-33, 2010

S.B. Davidson, S. Khanna, T. Milo, D. Panigrahi and S. Roy,“Provenance Views for Module Privacy,” Proc. 30th ACM SIGMOD-SIGACT-SIGART Symp. Principles of Database Systems (PODS'11), pp. 175-186, 2011.

S.B. Davidson, S. Khanna, S. Roy, J. Stoyanovich, V. Tannen and Y. Chen, “On Provenance and Privacy,” Proc. 14th Int'l Conf.Database Theory, pp. 3-10, 2011.

S.B. Davidson, S. Khanna, V. Tannen, S. Roy, Y. Chen, T. Miloand J. Stoyanovich, “Enabling Privacy in Provenance-Aware Workflow Systems,” Proc. 5th Biennial Conf. Innovative Data Systems Research (CIDR'11), pp. 215-218, 2011.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.