{"title":"云大数据超越加密的隐私保护","authors":"Hongbing Cheng, Weihong Wang, Chunming Rong","doi":"10.1109/ICITEC.2014.7105598","DOIUrl":null,"url":null,"abstract":"As the paradigm of future information technology architecture, cloud computing has been a hot issue since it emerged. However, data privacy protection is perceived as the most important challenge that cloud tenants concern, and conventional protection technology sometimes can not be applied to cloud data efficiently. In this paper, a scheme is proposed to protect the tenants' data privacy in cloud computing beyond encryption. In the scheme, in order to protect the data privacy which will be stored in the cloud, tenants only need to do some hash operations on privacy data rather than encryption. Analysis and simulation experiment results show that the proposed scheme can protect the tenants' data privacy efficiently.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Privacy protection beyond encryption for cloud big data\",\"authors\":\"Hongbing Cheng, Weihong Wang, Chunming Rong\",\"doi\":\"10.1109/ICITEC.2014.7105598\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As the paradigm of future information technology architecture, cloud computing has been a hot issue since it emerged. However, data privacy protection is perceived as the most important challenge that cloud tenants concern, and conventional protection technology sometimes can not be applied to cloud data efficiently. In this paper, a scheme is proposed to protect the tenants' data privacy in cloud computing beyond encryption. In the scheme, in order to protect the data privacy which will be stored in the cloud, tenants only need to do some hash operations on privacy data rather than encryption. Analysis and simulation experiment results show that the proposed scheme can protect the tenants' data privacy efficiently.\",\"PeriodicalId\":293382,\"journal\":{\"name\":\"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITEC.2014.7105598\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITEC.2014.7105598","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Privacy protection beyond encryption for cloud big data
As the paradigm of future information technology architecture, cloud computing has been a hot issue since it emerged. However, data privacy protection is perceived as the most important challenge that cloud tenants concern, and conventional protection technology sometimes can not be applied to cloud data efficiently. In this paper, a scheme is proposed to protect the tenants' data privacy in cloud computing beyond encryption. In the scheme, in order to protect the data privacy which will be stored in the cloud, tenants only need to do some hash operations on privacy data rather than encryption. Analysis and simulation experiment results show that the proposed scheme can protect the tenants' data privacy efficiently.