CFP last date
20 January 2025
Reseach Article

Enhancing Security in Public Clouds using Data Anonymization Techniques

by N. Nishara, Reeta Pandey
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 128 - Number 1
Year of Publication: 2015
Authors: N. Nishara, Reeta Pandey
10.5120/ijca2015906428

N. Nishara, Reeta Pandey . Enhancing Security in Public Clouds using Data Anonymization Techniques. International Journal of Computer Applications. 128, 1 ( October 2015), 33-36. DOI=10.5120/ijca2015906428

@article{ 10.5120/ijca2015906428,
author = { N. Nishara, Reeta Pandey },
title = { Enhancing Security in Public Clouds using Data Anonymization Techniques },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 128 },
number = { 1 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 33-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume128/number1/22840-2015906428/ },
doi = { 10.5120/ijca2015906428 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:19:59.372811+05:30
%A N. Nishara
%A Reeta Pandey
%T Enhancing Security in Public Clouds using Data Anonymization Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 128
%N 1
%P 33-36
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security issues have given rise to immerging an active area of research due to the many security threats that most of the organizations have faced at present. Despite the advancements in cloud computing, the organizations are slow in accepting it, due to security threats that make a cloud environment to be source of data breaching. Maintaining privacy for the high dimensional database has become an important aspect of security. This paper, emphasizes on protecting the data in public cloud using data anonymization techniques. Anonymization is the process of making the sensitive data to be de-identified and preventing this data to be linked with identities of an individual or an organization. The data has to be anonymised, thereby preventing it from malicious attack & at the same time data must be also made available for the owner of the data. To preserve the data from the attacker, two methods of privacy preserving models are used - k-anonymity and l-diversity. Finally, in this paper an algorithm for graph anonymisation is presented, called the Evolutionary Algorithm for Graph Anonymization (EAGA) that is based on k-anonymity model.

References
  1. k-Anonymity” – P.Samarati, S.Foresti, S. De Capitani, Universit`a degli Studi Milano, Italia.
  2. Privacy Preserving for high dimensional data with Anonymisation Techniques”- Prof. Girish Agarwal, Prof.Pragati Patil, ABHA Gaikwad Patil College of Engineering, Nagpur. IJARCSSE, Volume 3, June 2013.
  3. “Anatomy- Simple & Effective privacy preservation”- X.Xiao and Y.Tao, Proc.Int’l Conf. Very Large Databases (VLDB), pp. 139-150, 2006.
  4. Anonymous Publication of Sensitive Transactional Data” – Gabriel Ghinita, Member IEEE, Panos Kalnis, Yufei Tao, in Proc. Of IEEE Transactions on Knowledge & Data Engineering Feb 2011(vol. 23 ) pp.161-174.
  5. White papers on Cloud Security. Cloud Computing & Information Security, June 2012.
  6. Cloud Computing – Principles and Paradigms, Andrzej Goscinski, R.K.Buyya, James Broberg, Wiley Publishers, 2013.
  7. NIST cloud computing standards roadmap, U.S. Department of Commerce, Special Publication 500-291, Version 2.
Index Terms

Computer Science
Information Sciences

Keywords

Data anonymization Cloud Computing k-anonymity l-diversity