Privacy and Anonymization as a Service: PASS
The Internet and the World Wide Web democratized the means to publish and share corporate and personal data. Many anecdotes occurred over the last decades that well illustrate the danger for privacy and confidentiality. The advent of Cloud computing infrastructures is likely, if successful, to further encourage this trend. The analysis, diagnosis and prevention of privacy risk within a Cloud computing infrastructure are therefore important services to provide to users. In recent years, several algorithms such as K-anonymity, L-diversity and Anatomy, have been proposed to address the issue of data anonymization and diversification. They transform original data sets into modified data sets ensuring some privacy while minimizing the information loss incurred during the transformation. Shared and published data can remain meaningful without jeopardizing privacy.
We propose an integrated collection of privacy management services together with an interface to orchestrate their execution and assess their evaluation. The system consists of Web services and Cloud architecture. Cloud users can explore and apply privacy management services as Cloud services. This proposal is a first but significant step towards the general concept of a Cloud of data services and data transformation processes for data privacy, anonymity, security, quality, mining, management, publishing and sharing of data.
Keywordsweb services data privacy anonymization online database tools data quality cloud services
Unable to display preview. Download preview PDF.
- 1.Machanavajjhala, Gehrke, J., Kifer, D.: l-diversity: Privacy beyond k-anonymity. In: ICDE (2006) Google Scholar
- 2.Mirakabad, M.R.Z., Jantan, A., Bressan, S.: Towards a Privacy Diagnosis Centre: Measuring k-Anonymity. In: International Symposium on Computer Science and its Applications, CSA (2008)Google Scholar
- 3.Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, 557–570 (2002)Google Scholar
- 4.Wang, K., Fung, B.: Anonymizing sequential releases. In: SIGKDD (2006)Google Scholar
- 5.Xiao, X., Tao, Y.: Anatomy: Simple and effective privacy preservation. In: VLDB (2006)Google Scholar
- 9.WCF (Windows Communication Foundation), http://msdn.microsoft.com/en-us/netframework/aa663324.aspx