Skip to main content

Negative Survey-Based Privacy Protection of Cloud Data

  • Conference paper
  • First Online:
Advances in Swarm and Computational Intelligence (ICSI 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9141))

Included in the following conference series:

Abstract

Cloud platforms usually need to collect privacy data from a large number of users. Although the existing methods of privacy protection for cloud data can protect users’ privacy data to a certain degree, there is plenty of room for improvement in efficiency and degree of privacy protection. Negative survey spired by Artificial Immune System (AIS) collects each user’s unreal privacy information to protect users’ privacy. This study focuses on the accuracy of the reconstructed positive survey from negative survey, which is one of the key problems in the Negative Survey-based privacy protection of cloud data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bao, Y., Luo, W., Lu, Y.: On the dependable level of the negative survey. Statistics and Probability Letters 89, 31–40 (2014)

    Article  MATH  MathSciNet  Google Scholar 

  2. Bao, Y., Luo, W., Zhang, X.: Estimating positive surveys from negative surveys. Statistics and Probability Letters 83(2), 551–558 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  3. Du, G., Huang, T., Zhao, B., Song, L.: Dynamic self-defined immunity model base on data mining for network intrusion detection. In: the 4th International Coference on Machine Learning and Cybernetics, vol. 6, pp. 3866–3870 (2005)

    Google Scholar 

  4. Esponda, F.: Negative Representations of Information. Ph.D. thesis, University of New Mexico (2005)

    Google Scholar 

  5. Esponda, F.: Negative surveys. Arxiv: math/0608176 (2006)

  6. Esponda, F., Guerrero, V.M.: Surveys with negative questions for sensitive items. Statistics and Probability Letters 79, 2456–2461 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  7. Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: the IEEE Symposium on Research in Security and Privacy, pp. 202–212 (1994)

    Google Scholar 

  8. Foster, I., Zhao, Y., Raicu, I.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, pp. 1–10 (2008)

    Google Scholar 

  9. Groat, M.M., Hey, W., Forrest, S.: Kipda: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In: The Thirtieth Annual IEEE International Conference on Computer Communications, pp. 2024–2032 (2011)

    Google Scholar 

  10. He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: Pda: privacy- preserving data aggregation in wireless sensor networks. In: IEEE International Conference on Computer Communications, pp. 2045–2053 (2007)

    Google Scholar 

  11. Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation 8(4), 443–473 (2000)

    Article  Google Scholar 

  12. Horey, J., Groat, M., Forrest, S., Esponda, F.: Anonymous data collection in sensor networks. In: The Fourth Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp. 1–8 (2007)

    Google Scholar 

  13. Horey, J.L., Forrest, S., Groat, M.: Reconstructing spatial distributions from anonymized locations. In: 28th International Conference on Data Engineering Workshops, pp. 243–250 (2012)

    Google Scholar 

  14. Kim, J., Bentley, P.J.: Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator. In: The 2011 Congress on Evolutionary Computation (CEC 2001), vol. 2, pp. 1244–1252 (2001)

    Google Scholar 

  15. Shi, J., Zhang, R., Liu, Y., Zhang, Y.: Prisense: Privacy-preserving data aggregation in people-centric urban sensing systems. In: IEEE International Conference on Computer Communications, pp. 1–9 (2010)

    Google Scholar 

  16. Vu, H., Nguyen, T., Mittal, N., Venkatesan, S.: Peq: A privacy-preserving scheme for exact query evaluation in distributed sensor data networks. In: 28th IEEE International Symposium on Reliable Distributed Systems, SRDS 2009. pp. 189–198, September 27–30 2009

    Google Scholar 

  17. Xie, H., Kulik, L., Tanin, E.: Privacy-aware collection of aggregate spatial data. Data & Knowledge Engineering 70(6), 576–595 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shanyu Tang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Liu, R., Tang, S. (2015). Negative Survey-Based Privacy Protection of Cloud Data. In: Tan, Y., Shi, Y., Buarque, F., Gelbukh, A., Das, S., Engelbrecht, A. (eds) Advances in Swarm and Computational Intelligence. ICSI 2015. Lecture Notes in Computer Science(), vol 9141. Springer, Cham. https://doi.org/10.1007/978-3-319-20472-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-20472-7_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-20471-0

  • Online ISBN: 978-3-319-20472-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics