Reference Hub1
A Framework for Protecting Users' Privacy in Cloud

A Framework for Protecting Users' Privacy in Cloud

Adesina S. Sodiya, Adegbuyi B.
Copyright: © 2016 |Volume: 10 |Issue: 4 |Pages: 11
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781466689718|DOI: 10.4018/IJISP.2016100102
Cite Article Cite Article

MLA

Sodiya, Adesina S., and Adegbuyi B. "A Framework for Protecting Users' Privacy in Cloud." IJISP vol.10, no.4 2016: pp.33-43. http://doi.org/10.4018/IJISP.2016100102

APA

Sodiya, A. S. & Adegbuyi B. (2016). A Framework for Protecting Users' Privacy in Cloud. International Journal of Information Security and Privacy (IJISP), 10(4), 33-43. http://doi.org/10.4018/IJISP.2016100102

Chicago

Sodiya, Adesina S., and Adegbuyi B. "A Framework for Protecting Users' Privacy in Cloud," International Journal of Information Security and Privacy (IJISP) 10, no.4: 33-43. http://doi.org/10.4018/IJISP.2016100102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Data and document privacy concerns are increasingly important in the online world. In Cloud Computing, the story is the same, as the secure processing of personal data represents a huge challenge The main focus is to to preserve and protect personally identifiable information (PII) of individuals, customers, businesses, governments and organisations. The current use of anonymization techniques is not quite efficient because of its failure to use the structure of the datasets under consideration and inability to use a metric that balances the usefulness of information with privacy preservation. In this work, an adaptive lossy decomposition algorithm was developed for preserving privacy in cloud computing. The algorithm uses the foreign key associations to determine the generalizations possible for any attribute in the database. It generates penalties for each obscured attribute when sharing and proposes an optimal decomposition of the relation. Postgraduate database of Federal University of Agriculture, Abeokuta, Nigeria and Adult database provided at the UCIrvine Machine Learning Repository were used for the evaluation. The result shows a system that could be used to improve privacy in cloud computing.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.