Enhancing Security in Public Clouds using Data Anonymization Techniques
Author(s) -
N. Nishara,
Reeta Pandey
Publication year - 2015
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2015906428
Subject(s) - computer science , anonymity , data anonymization , cloud computing , computer security , k anonymity , graph , process (computing) , information privacy , internet privacy , data mining , theoretical computer science , operating system
Security issues have given rise to immerging an active area of research due to the many security threats that most of the organizations have faced at present. Despite the advancements in cloud computing, the organizations are slow in accepting it, due to security threats that make a cloud environment to be source of data breaching. Maintaining privacy for the high dimensional database has become an important aspect of security. This paper, emphasizes on protecting the data in public cloud using data anonymization techniques. Anonymization is the process of making the sensitive data to be de-identified and preventing this data to be linked with identities of an individual or an organization. The data has to be anonymised, thereby preventing it from malicious attack & at the same time data must be also made available for the owner of the data. To preserve the data from the attacker, two methods of privacy preserving models are used k-anonymity and l-diversity. Finally, in this paper an algorithm for graph anonymisation is presented, called the Evolutionary Algorithm for Graph Anonymization (EAGA) that is based on k-anonymity model.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom