Abstract
With the proliferation of cloud computing, there is an increasing need for sharing data repositories containing personal information across multiple distributed databases, and such data sharing is subject to different privacy constraints of multiple individuals. Most of the existing methods focus on single database anonymization, although the concept of distributed anonymization was discussed in some literatures, it only provides an uniform approach that exerts the same amount of preservation for all data providers, without catering for user’s specific privacy requirements. The consequence is that we may offer insufficient protection to a subset of people, while applying excessive privacy budget to the others. Motivated by this, we present a new distributed anonymization protocol based on the concept of personalized privacy preservation. Our technique performs a personalized anonymization to satisfy multiple data provider’s privacy requirements, and then publish their global anonymization view without any privacy breaches. Extensive experiments have been conducted to verify that our proposed protocol and anonymization method are efficient and effective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Vaquero, L.M., Merino, L.R., Caceres, J., Lindner, M.: A break in the clouds: towards a cloud definition. In: ACM SIGCOMM, pp. 50–55 (2009)
AMAZON. Nimbus health, http://aws.amazon.com/solutions/case-studies/nimbus-health/
AMAZON. Nimbus health, http://aws.amazon.com/solutions/case-studies/sharethis/
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. In: INFOCOM (2010)
Jurczyk, P., Xiong, L.: Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers. In: Gudes, E., Vaidya, J. (eds.) Data and Applications Security 2009. LNCS, vol. 5645, pp. 191–207. Springer, Heidelberg (2009)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In: INFOCOM (2010)
Xiao, Y., Lin, C., Jiang, Y., Chuang, X., Liu, F.: An Efficient Privacy-Preserving Publish-Subscribe Service Scheme for Cloud Computing. In: GLOBECOM (2010)
Cao, N., Yang, Z., Wang, C., Ren, K., Lou, W.: Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing. In: ICDCS (2011)
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In: Proc. of ACM Conference on CCS, pp. 199–212 (2009)
Kamara, S., Lauter, K.: Cryptographic cloud storage. In: RLCPS (2010)
Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. (2002)
Wong, R., Li, J., Wai-Chee Fu, A., Wang, K.: (a, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: KDD (2006)
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. TKDD (2007)
Xiao, X., Tao, Y.: m-Invariance: Towards Privacy Preserving Re-publication of Dynamic Datasets. In: SIGMOD (2007)
Bu, Y., Fu, A.W.C., Wong, R.C.W., Chen, L., Li, J.: Privacy Preserving Serial Data Publishing By Role Composition. In: VLDB (2008)
Xiao, X., Wang, G., Gehrke, J.: Differential Privacy via Wavelet Transforms. In: ICDE (2010)
Baig, M., Li, J., Liu, J., Wang, H.: Cloning for Privacy Protection in Multiple Independent Data Publications. In: ACM CIKM (2011)
Emekci, F., Agrawal, D., Abbadi, A.E., Gulbeden, A.: Privacy Preserving Query Processing using Third Parties. In: ICDE (2006)
Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE (2005)
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient full-domain k-anonymity. In: SIGMOD (2005)
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems (2002)
Xiao, X., Tao, Y.: Personalized Privacy Preservation. In: SIGMOD (2006)
Guttman, A.: R-trees: a dynamic index structure for spatial searching. In: SIGMOD (1984)
Tao, Y., Papadias, D., Sun, J.: The TPR*-Tree: An Optimized Spatio-Temporal Access Method for Predictive Queries. In: VLDB (2003)
Fung, B., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys, CSUR (2010)
Jiang, W., Clifton, C.: A secure distributed framework for achieving k-anonymity. VLDB Journal (2006)
Zhong, S., Yang, Z., Wright, R.N.: Privacy-enhancing k-anonymization of customer data. In: PODS (2005)
Lindell, Y., Pinkas, B.: Secure multipart computation for privacy-preserving data mining. Cryptology ePrint Archive Report, http://eprint.iacr.org
LeFevre, K., DeWitt, D., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: IEEE ICDE (2006)
Li, N., Li, T., Suresh, V.: t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. In: IEEE ICDE (2007)
Ganta, S.R., Kasiviswanathan, S.P., Smith, A.: Composition attacks and auxiliary information in data privacy. In: ACM SIGKDD (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ding, X., Yu, Q., Li, J., Liu, J., Jin, H. (2013). Distributed Anonymization for Multiple Data Providers in a Cloud System. In: Meng, W., Feng, L., Bressan, S., Winiwarter, W., Song, W. (eds) Database Systems for Advanced Applications. DASFAA 2013. Lecture Notes in Computer Science, vol 7825. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37487-6_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-37487-6_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37486-9
Online ISBN: 978-3-642-37487-6
eBook Packages: Computer ScienceComputer Science (R0)