Privacy Preserving of Intermediate Datasets In Cloud for Improving Efficiency

International Journal of Computer Trends and Technology (IJCTT)
© 2014 by IJCTT Journal
Volume-16 Number-2
Year of Publication : 2014
Authors : B.Sravanthi , Bhaludra Raveendranadh Singh , Mahesh Akuthota , Moligi Sangeetha


B.Sravanthi , Bhaludra Raveendranadh Singh , Mahesh Akuthota , Moligi Sangeetha. "Privacy Preserving of Intermediate Datasets In Cloud for Improving Efficiency ". International Journal of Computer Trends and Technology (IJCTT) V16(2):73-76, Oct 2014. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Cloud computing provides massive storage capacity to the users to deploy their applications without any infrastructure investment. Along with those applications a large set of intermediate datasets will be generated, and it is a challenging problem to preserve the privacy of those intermediate datasets. Encrypting all datasets in cloud is generally used in existing approaches. But we proposed that, encrypting all intermediate datasets are either cost effective nor efficient because it is a time consuming process for data intensive applications to encrypt and decrypt data repeatedly while performing any operation on that data. We propose a upper bound privacy leakage constraint based approach to recognize which intermediate datasets need to be encrypted and which intermediate datasets are not, then privacy preserving cost can be decreased when the privacy is a requirement to the data holders and the data holders can also be satisfied.

1) M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica and M. Zaharia, “A View of Cloud Computing,” Commun. ACM, vol. 53, no. 4, pp. 50-58, 2010.
2) L. Wang, J. Zhan, W. Shi and Y. Liang, “In Cloud, Can Scientific Communities Benefit from the Economies of Scale?,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 2, pp. 296-303, 2012.
3) R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg and I. Brandic, “Cloud Computing and Emerging It Platforms: Vision, Hype, And Reality for Delivering Computing as the 5th Utility,” Fut.
4) Gener. Comput. Syst., vol. 25, no. 6, pp. 599-616, 2009.
5) H. Takabi, J.B.D. Joshi and G. Ahn, “Security and Privacy Callenges in Cloud Computing Environments,” IEEE Security & Privacy, vol. 8, no. 6, pp. 24-31, 2010.
6) D. Zissis and D. Lekkas, “Addressing Cloud Computing Security Issues,” Fut. Gener. Comput. Syst., vol. 28, no. 3, pp. 583-592, 2011.
7) D. Yuan, Y. Yang, X. Liu and J. Chen, “On-Demand Minimum Cost Benchmarking for Intermediate Dataset Storage in Scientific Cloud Workflow Systems,” J. Parallel Distrib. Computing vol. 71, no. 2, pp. 316-332, 2011.
8) S.Y. KO, I. Hoque, B. Cho and I. Gupta, “Making Cloud Intermediate Data Fault-Tolerant,” Proc. 1st ACM Symp. Cloud Computing (SoCC'10), pp. 181-192, 2010.

Intermediate Dataset, Data Storage Privacy, Cloud Computing, Privacy Upper Bound, Privacy Preserving.