...
首页> 外文期刊>International Journal of Innovative Research in Science, Engineering and Technology >Certain Investigations on Security Issues and Resolving Strategies in Cloud Computing
【24h】

Certain Investigations on Security Issues and Resolving Strategies in Cloud Computing

机译:云计算中有关安全性问题和解决策略的某些调查

获取原文
   

获取外文期刊封面封底 >>

       

摘要

This paper reviews methods developed for anonymizing data from 2011 to present. Publishing microdata such as census or patient data for extensive research and other purposes is an important problem area being focused by government agencies and other social associations. The traditional approach identified through literature survey reveals that the approach of eliminating uniquely identifying fields such as social security number from microdata, still results in disclosure of sensitive data, k-anonymization optimization algorithm ,seems to be promising and powerful in certain cases ,still carrying the restrictions that optimized k-anonymity are NP-hard, thereby leading to severe computational challenges. k-anonimity faces the problem of homogeneity attack and background knowledge attack . The notion of ldiversity proposed in the literature to address this issue also poses a number of constraints , as it proved to be inefficient to prevent attribute disclosure (skewness attack and similarity attack), l-diversity is difficult to achieve and may not provide sufficient privacy protection against sensitive attribute across equivalence class can substantially improve the privacy as against information disclosure limitation techniques such as sampling cell suppression rounding and data swapping and pertubertation. This paper aims to discuss efficient anonymization approach that requires partitioning of microdata equivalence classes and by minimizing closeness by kernel smoothing and determining ether move distances by controlling the distribution pattern of sensitive attribute in a microdata and also maintaining diversity.
机译:本文回顾了2011年至今为匿名数据开发的方法。发布诸如人口普查或患者数据之类的微数据以进行广泛研究和其他目的是政府机构和其他社会协会关注的重要问题领域。通过文献调查确定的传统方法表明,从微数据中消除唯一识别字段(例如社会保险号)的方法仍会导致敏感数据泄露,k-匿名优化算法,在某些情况下似乎是有希望和强大的,仍然具有优化的k-匿名性的限制是NP-难的,从而导致严重的计算挑战。 k-无名性面临同质性攻击和背景知识攻击的问题。文献中提出的解决这一问题的多样性概念也带来了许多限制,因为事实证明,这种多样性无法有效地防止属性泄露(偏度攻击和相似性攻击),因此l多样性难以实现且可能无法提供足够的隐私跨等价类的敏感属性的保护可以大大提高隐私性,而信息披露限制技术(例如采样单元抑制舍入以及数据交换和顽固化)则可以大大提高隐私性。本文旨在讨论有效的匿名化方法,该方法需要对微数据等效类进行分区,并通过内核平滑最小化紧密度,并通过控制微数据中敏感属性的分布模式并保持多样性来确定以太移动距离。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号