An Association Probability Based Noise Generation Strategy for Privacy Protection in Cloud Computing

  • Gaofeng Zhang
  • Xuyun Zhang
  • Yun Yang
  • Chang Liu
  • Jinjun Chen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7636)


Cloud computing allows customers to utilise IT services in a pay-as-you-go fashion to save huge cost on IT infrastructure. In open cloud, ‘malicious’ service providers could record service data from a cloud customer and collectively deduce the customer’s privacy without the customer’s permission. Accordingly, customers need to take certain actions to protect their privacy automatically at client sides, such as noise obfuscation. For instance, it can generate and inject noise service requests into real ones so that service providers are hard to distinguish which ones are real. Existing noise obfuscations focus on concealing occurrence probabilities of service requests. But in reality, association probabilities of service requests can also reveal customer privacy. So, we present a novel association probability based noise generation strategy by concealing these association probabilities. The simulation comparison demonstrates that this strategy can improve the effectiveness of privacy protection significantly from the perspective of association probability.


Cloud service Privacy protection Noise generation Association probability 


  1. 1.
    Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. Future Generation Computer Systems 25(6), 599–616 (2009)CrossRefGoogle Scholar
  2. 2.
    Ryan, M.D.: Cloud Computing Privacy Concerns on Our Doorstep. Communications of the ACM 54(1), 36–38 (2011)CrossRefGoogle Scholar
  3. 3.
    Ren, K., Liu, X., Chen, J., Xiao, N., Song, J., Zhang, W.: A QSQL-based Efficient Planning Algorithm for Fully-automated Service Composition in Dynamic Service Environments. In: 2008 IEEE International Conference on Service Computing (SCC 2008), pp. 301–308. IEEE Press (2008)Google Scholar
  4. 4.
    Evfimievski, A., Gehrke, J., Srikant, R.: Limiting Privacy Breaches in Privacy Preserving Data Mining. In: 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS 2003), pp. 211–222. ACM, Madison (2003)CrossRefGoogle Scholar
  5. 5.
    Bu, Y., Fu, A., Wong, R., Chen, L., Li, J.: Privacy Preserving Serial Data Publishing by Role Composition. In: 34th Internationasl Conference on Very Large Data Bases (VLDB 2008), pp. 845–856 (2008)Google Scholar
  6. 6.
    Zhang, G., Yang, Y., Chen, J.: A Histrotical Probability based Noise Generation Strategy for Privacy Protection in Cloud Computing. Journal of Computer and System Sciences 78(5), 1374–1381 (2012)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Zhang, G., Yang, Y., Liu, X., Chen, J.: A Time-Series Pattern based Noise Generation Strategy for Privacy Protection in Cloud Computing. In: 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2012), pp. 458–465. IEEE Press, New York (2012)CrossRefGoogle Scholar
  8. 8.
    Ye, S., Wu, F., Pandey, R., Chen, H.: Noise Injection for Search Privacy Protection. In: 2009 International Conference on Computational Science and Engineering (CSE 2009), pp. 1–8. IEEE Press, New York (2009)CrossRefGoogle Scholar
  9. 9.
    Babcock, B., Babu, S., Datar, M., Motwani, R., Widom, J.: Models and Issues in Data Stream Systems. In: 21st ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS 2002), pp. 1–16. ACM, Madison (2002)CrossRefGoogle Scholar
  10. 10.
    Liu, K., Jin, H., Chen, J., Liu, X., Yuan, D., Yang, Y.: A Compromised-time-cost Scheduling Algorithm in SwinDeW-C for Instance-intensive Cost-constrained Workflows on a Cloud Computing Platform. International Journal of High Performance Computing Applications 24(4), 445–456 (2010)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Gaofeng Zhang
    • 1
  • Xuyun Zhang
    • 2
  • Yun Yang
    • 3
    • 1
  • Chang Liu
    • 2
  • Jinjun Chen
    • 2
  1. 1.Faculty of Information and Communication TechnologiesSwinburne University of TechnologyMelbourneAustralia
  2. 2.Faculty of Engineering and Information TechnologyUniversity of TechnologySydneyAustralia
  3. 3.School of Computer Science and TechnologyAnhui UniversityHefeiChina

Personalised recommendations