Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2017, Article ID 4785142, 11 pages
https://doi.org/10.1155/2017/4785142
Research Article

Privacy Data Decomposition and Discretization Method for SaaS Services

1School of Computer Science & Technology and School of Software, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu 210003, China
2College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu 210016, China
3Jiangsu High Tech. Research Key Laboratory for Wireless Sensor Networks, Nanjing, Jiangsu 210003, China
4Department of E-Commerce, Nanjing Audit University, Nanjing, Jiangsu 211815, China

Correspondence should be addressed to Changbo Ke; nc.ude.tpujn@ek.oborb

Received 17 April 2017; Accepted 28 May 2017; Published 9 July 2017

Academic Editor: Emilio Insfran

Copyright © 2017 Changbo Ke et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. C. Chou, “Cloud computing: a value creation model,” Computer Standards & Interfaces, vol. 38, pp. 72–77, 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. M. Armbrust, A. Fox, R. Griffith et al., “Above the clouds: a Berkeley view of cloud computing,” Tech. Rep. UCB-EECS-2009-28, University of California, Berkeley, Berkeley, Calif, USA, 2009. View at Google Scholar
  3. M. L. Damiani and C. Cuijpers, “Privacy challenges in third-party location services,” in Proceedings of the 14th International Conference on Mobile Data Management (MDM '13), vol. 2, pp. 63–66, Milan, Italy, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. Z. Liu, H. Yan, and Z. Li, “Server-aided anonymous attribute-based authentication in cloud computing,” Future Generation Computer Systems, vol. 52, pp. 61–66, 2015. View at Publisher · View at Google Scholar · View at Scopus
  5. F. Casino, J. Domingo-Ferrer, C. Patsakis, D. Puig, and A. Solanas, “A k-anonymous approach to privacy preserving collaborative filtering,” Journal of Computer and System Sciences, vol. 81, no. 6, pp. 1000–1011, 2015. View at Publisher · View at Google Scholar · View at Scopus
  6. V. Nikolaenko, U. Weinsberg, S. Ioannidis, M. Joye, D. Boneh, and N. Taft, “Privacy-preserving ridge regression on hundreds of millions of records,” in Proceedings of the 34th IEEE Symposium on Security and Privacy (SP '13), pp. 334–348, May 2013. View at Publisher · View at Google Scholar · View at Scopus
  7. M. Rushanan, A. D. Rubin, D. F. Kune, and C. M. Swanson, “SoK: security and privacy in implantable medical devices and body area networks,” in Proceedings of the 35th IEEE Symposium on Security and Privacy (SP '14), pp. 524–539, San Jose, Calif , USA, May 2014. View at Publisher · View at Google Scholar · View at Scopus
  8. E. De Cristofaro, C. Soriente, G. Tsudik, and A. Williams, “Hummingbird: privacy at the time of Twitter,” in Proceedings of the 33rd IEEE Symposium on Security and Privacy (SP '12), pp. 285–299, May 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. S. Pearson, “Taking account of privacy when designing cloud computing services,” in Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, pp. 44–52, Vancouver, Canada, May 2009, Also available as HP Labs Technical Report, HPL-2009-54. View at Publisher · View at Google Scholar
  10. S. Pearson and A. Charlesworth, “Accountability as a way forward for privacy protection in the cloud,” HP Labs Technical Report HPL-2009-178, 2009. View at Google Scholar
  11. H.-P. Kriegel, P. Kröger, E. Schubert, and A. Zimek, “Outlier detection in arbitrarily oriented subspaces,” in Proceedings of the 12th IEEE International Conference on Data Mining (ICDM '12), pp. 379–388, December 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. H. P. Kriegel, P. Kröger, E. Schubert, and A. Zimek, “Outlier detection in axis-parallel subspaces of high dimensional data,” in Proceedings of the 13th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, pp. 831–838, Springer, 2009.
  13. H.-P. Kriegel, P. Kröger, E. Schubert, and A. Zimek, “LoOP: local outlier probabilities,” in Proceedings of the ACM 18th International Conference on Information and Knowledge Management (CIKM '09), pp. 1649–1652, ACM Press, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  14. B. Tang, R. Sandhu, and Q. Li, “Multi-tenancy authorization models for collaborative cloud services,” Concurrency Computation, vol. 27, no. 11, pp. 2851–2868, 2015. View at Publisher · View at Google Scholar · View at Scopus
  15. R. Hamadi, H. Y. Paik, and B. Benatallah, “Conceptual modeling of privacy-aware Web service protocols,” in In proceeding of the 19th International conference on Advanced Information System Engineering (CAiSE '07), pp. 233–248, 2007.
  16. N. Guermouche, S. Benbernou, E. Coquery, and M.-S. Hacid, “Privacy-aware Web service protocol replaceability,” in Proceedings of the 2007 IEEE International Conference on Web Services (ICWS '07), pp. 1048–1055, July 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. K. Mokhtari, S. Benbernou, M. Said, E. Coquery, M. S. Hacid, and F. Leymann, “Verification of privacy timed properties in web service protocols,” in Proceedings of the IEEE International Conference on Services Computing (SCC '08), pp. 593-594, July 2008. View at Publisher · View at Google Scholar · View at Scopus
  18. W. She, I.-L. Yen, B. Thuraisingham, and E. Bertino, “Security-aware service composition with fine-grained information flow control,” IEEE Transactions on Services Computing, vol. 6, no. 3, pp. 330–343, 2013. View at Publisher · View at Google Scholar · View at Scopus
  19. H. Tout, A. Mourad, H. Yahyaoui, C. Talhi, and H. Otrok, “Towards a BPEL model-driven approach for web services security,” in Proceedings of the 10th Annual International Conference on Privacy, Security and Trust (PST '12), pp. 120–127, IEEE Computer Society, July 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. Y. H. Li, H. Paik, and B. Benatallah, “Formal consistency verification between BPEL process and privacy policy,” in Proceedings of the International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services (PST '06), pp. 212–223, Markham, Canada, October 2006. View at Publisher · View at Google Scholar
  21. C. Ke, Z. Huang, W. Li, Y. Sun, and F. Xiao, “Service outsourcing character oriented privacy conflict detection method in cloud computing,” Journal of Applied Mathematics, vol. 2014, Article ID 240425, 11 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  22. Z.-Q. Wei, M.-J. Kang, D.-N. Jia, B. Yin, and W. Zhou, “Research on privacy-protection policy for pervasive computing,” Chinese Journal of Computers, vol. 33, no. 1, pp. 128–138, 2010. View at Publisher · View at Google Scholar · View at Scopus
  23. C. Ke, Z. Huang, and M. Tang, “Supporting negotiation mechanism privacy authority method in cloud computing,” Knowledge-Based Systems, vol. 51, pp. 48–59, 2013. View at Publisher · View at Google Scholar · View at Scopus
  24. S.-E. Tbahriti, C. Ghedira, B. Medjahed, and M. Mrissa, “Privacy-enhanced web service composition,” IEEE Transactions on Services Computing, vol. 7, no. 2, pp. 210–222, 2014. View at Publisher · View at Google Scholar · View at Scopus
  25. Y. Zhang and D.-G. Fen, “Parsimonious semantic trust negotiation,” Chinese Journal of Computers, vol. 32, no. 10, pp. 1989–2003, 2009. View at Publisher · View at Google Scholar · View at Scopus
  26. J. Kolter, M. Netter, and G. Pernul, “Visualizing past personal data disclosures,” in Proceedings of the 5th International Conference on Availability, Reliability, and Security (ARES '10), pp. 131–139, February 2010. View at Publisher · View at Google Scholar · View at Scopus
  27. L. Liu, H. Zhu, Z. Huang, and D. Xie, “Minimal privacy authorization in web services collaboration,” Computer Standards and Interfaces, vol. 33, no. 3, pp. 332–343, 2011. View at Publisher · View at Google Scholar · View at Scopus
  28. L. Liu, H. Zhu, and Z. Huang, “Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms,” Expert Systems with Applications, vol. 38, no. 4, pp. 4540–4549, 2011. View at Publisher · View at Google Scholar · View at Scopus
  29. I. Roy, H. E. Ramadan, S. T. V. Setty et al., “Security and privacy for MapReduce,” in Proceedings of the 7th Usenix Symposium on Networked Systems Design and Implementation, M. Castro, Ed., pp. 297–312, USENIX Association, 2010.
  30. D. C. Chou, “Cloud computing risk and audit issues,” Computer Standards and Interfaces, vol. 42, pp. 137–142, 2015. View at Publisher · View at Google Scholar · View at Scopus
  31. S. Sen, S. Guha, A. Datta, S. K. Rajamani, J. Tsai, and J. M. Wing, “Bootstrapping privacy compliance in big data systems,” in Proceedings of the 35th IEEE Symposium on Security and Privacy (SP '14), pp. 327–342, May 2014. View at Publisher · View at Google Scholar · View at Scopus