RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      KCI등재 SCOPUS

      An improved privacy preservation technique in health-cloud

      한글로보기

      https://www.riss.kr/link?id=A106609135

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      In today’s cloud computing environment, health-cloud preserve the person specific sensitive information for several purposes such as bio-medical research, health insurance companies, medical data analysis, etc. When any authorized person access thes...

      In today’s cloud computing environment, health-cloud preserve the person specific sensitive information for several purposes such as bio-medical research, health insurance companies, medical data analysis, etc. When any authorized person access these clouds, the released data should not compromise any individuals’ privacy and it remains useful as well. In the health-cloud system, the data must be released in such a way that any individuals’ identity cannot be revealed. The database management system alone cannot ensure any individual’s privacy. The Access Control (AC) models are also not able to protect the data from indirect access or multiple queries. To remove such issues inference control is one of the techniques which ensures the data confidentiality from indirect data access. In this paper, we have proposed a hybrid technique which includes two different inference control techniques, query set size restriction and k-anonymity to ensure individuals’ privacy. A query set size restriction is used to prevent the sensitive data from inference attacks, whereas k-anonymity is implemented to protect the data from linking attacks. Both these techniques reach a certain privacy level with satisfactory data utilization. We have also generated a rule set to increase the privacy of healthcare data.

      더보기

      참고문헌 (Reference)

      1 Ninghui Li, "t-closeness:Privacy beyond k-anonymity and l-diversity" 106-115, 2007

      2 Latanya Sweeney, "k-anonymity: A model for protecting privacy" 10 (10): 557-570, 2002

      3 Bhavani Thuraisingham, "Security and privacy for multimedia database management systems" 33 (33): 13-29, 2007

      4 Gábor Bergmann, "Querybased access control for secure collaborative modeling using bidirectional transformations" ACM 351-361, 2016

      5 Anand Kumar, "Query monitoring and analysis for database privacy-a security automata model approach" Springer 458-472, 2015

      6 Cándido Caballero-Gil, "Providing k-anonymity and revocation in ubiquitous vanets" 36 : 482-494, 2016

      7 P. Samarati, "Protecting respondents identities in microdata release" Institute of Electrical and Electronics Engineers (IEEE) 13 (13): 1010-1027, 2001

      8 Pierangela Samarati, "PrOtecting Privacy When Disclosing Information: K-Anonymity and Its Enforcement Through Generalization and Suppression" SRI International 1998

      9 Wei Wang, "Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation" 88 : 136-148, 2015

      10 Salman Iqbal, "On cloud security attacks : a taxonomy and intrusion detection and prevention as a service" 74 : 98-120, 2016

      1 Ninghui Li, "t-closeness:Privacy beyond k-anonymity and l-diversity" 106-115, 2007

      2 Latanya Sweeney, "k-anonymity: A model for protecting privacy" 10 (10): 557-570, 2002

      3 Bhavani Thuraisingham, "Security and privacy for multimedia database management systems" 33 (33): 13-29, 2007

      4 Gábor Bergmann, "Querybased access control for secure collaborative modeling using bidirectional transformations" ACM 351-361, 2016

      5 Anand Kumar, "Query monitoring and analysis for database privacy-a security automata model approach" Springer 458-472, 2015

      6 Cándido Caballero-Gil, "Providing k-anonymity and revocation in ubiquitous vanets" 36 : 482-494, 2016

      7 P. Samarati, "Protecting respondents identities in microdata release" Institute of Electrical and Electronics Engineers (IEEE) 13 (13): 1010-1027, 2001

      8 Pierangela Samarati, "PrOtecting Privacy When Disclosing Information: K-Anonymity and Its Enforcement Through Generalization and Suppression" SRI International 1998

      9 Wei Wang, "Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation" 88 : 136-148, 2015

      10 Salman Iqbal, "On cloud security attacks : a taxonomy and intrusion detection and prevention as a service" 74 : 98-120, 2016

      11 Y Kumar Jain, "Min max normalization based data perturbation method for privacy protection" 2 (2): 45-50, 2011

      12 Ashwin Machanavajjhala, "L-diversity: privacy beyond k-anonymity" 1 (1): 2007

      13 Pierangela Samarati, "International School on Foundations of Security Analysis and Design" Springer 137-196, 2000

      14 Muhamed Turkanovic, "Inference attacks and control on database structures" 4 (4): 3-, 2015

      15 Mohammad Saiful Islam, "Inference attack against encrypted range queries on outsourced databases" ACM 235-246, 2014

      16 Jordi Soria-Comas, "Enhancing data utility in differential privacy via microaggregation-based k k-anonymity" 23 (23): 771-794, 2014

      17 Tamer E Abuelsaad, "Data perturbation and anonymization using one way hash"

      18 Raymond W Yip, "Data level inference detection in database systems" IEEE 179-189, 1998

      19 Zhipeng Cai, "Collective datasanitization for preventing sensitive information inference attacks in social networks" 2016

      20 Tania Basso, "Challenges on anonymity, privacy, and big data" IEEE 164-171, 2016

      21 Ben Niu, "Achieving kanonymity in privacy-aware location-based services" IEEE 754-762, 2014

      22 Zahid Pervaiz, "Accuracy-constrained privacy-preserving access control mechanism for relational data" 26 (26): 795-807, 2014

      23 Khaled El Emam, "A globally optimal k-anonymity method for the de-identification of health data" 16 (16): 670-682, 2009

      24 Adeela Waqar, "A framework for preservation of cloud users data privacy using dynamic reconstruction of metadata" 36 (36): 235-248, 2013

      더보기

      동일학술지(권/호) 다른 논문

      동일학술지 더보기

      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      인용정보 인용지수 설명보기

      학술지 이력

      학술지 이력
      연월일 이력구분 이력상세 등재구분
      2023 평가예정 해외DB학술지평가 신청대상 (해외등재 학술지 평가)
      2020-01-01 평가 등재학술지 유지 (해외등재 학술지 평가) KCI등재
      2017-08-01 평가 SCOPUS 등재 (기타) KCI등재
      2017-01-01 평가 등재후보학술지 선정 (신규평가) KCI등재후보
      더보기

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼