在线刊号(2320-9801)印刷刊号(2320-9798)
K.Deepika1,纳文·普拉萨德2, Prof.S.Balamurugan3., S.Charanyaa4
|
有关文章载于Pubmed,谷歌学者 |
更多相关文章请访问国际计算机与通信工程创新研究杂志
本文回顾了从2009年雷竞技苹果下载到2010年为匿名数据开发的方法。为广泛研究和其他目的发布人口普查或患者数据等微观数据是政府机构和其他社会协会关注的一个重要问题领域。通过文献调查发现,传统的方法从微数据中剔除社保号等唯一标识字段,但仍然会导致敏感数据的泄露,k-匿名优化算法在某些情况下似乎是有前景和强大的,但仍然存在优化的k-匿名是np难的限制,从而导致严重的计算挑战。k-匿名面临着同质性攻击和背景知识攻击的问题。为了解决这个问题,文献中提出的ldiversity概念也提出了一些约束,因为它被证明是低效的,无法防止属性泄露(偏度攻击和相似攻击),l-多样性难以实现,并且可能无法对跨等价类的敏感属性提供足够的隐私保护,可以大大改善信息披露限制技术(如采样单元抑制舍入和数据交换和扰动)的隐私。本文旨在讨论一种高效的匿名化方法,该方法需要划分微数据等价类,通过核平滑最小化接近度,通过控制敏感属性在微数据中的分布模式并保持多样性来确定以太移动距离。
关键字 |
数据匿名化,微数据,k匿名,身份披露,属性披露,多样性 |
介绍 |
近年来,向公众公布敏感数据的需求急剧增长。虽然发布有其必要性,但发布的社交网络数据不能泄露个人隐私是有限制的。因此,保护个人隐私和确保社交网络数据的效用成为一个具有挑战性和有趣的研究课题。考虑一个图形模型[35],其中顶点表示敏感标签,可以开发算法来发布非表格数据,而不损害个人隐私。虽然KDLD序列生成[35]后的数据是用图形模型表示的,但数据容易受到同质性攻击、背景知识攻击、相似性攻击等多种攻击。本文对文献中常见的攻击和可能的解决方法进行了研究,并对其有效性进行了分析。 |
eucalyptus开源云计算系统[2009] |
Daniel nurmi, Rich wolski, Chris grzegorczyk, Graziano obertelli, sunil soman, lamia youseff, Dmitrii zagorodnov通常,云计算系统从根本上通过各种接口提供对大量数据和计算资源的访问。这些接口类似于现有的网格和高性能计算资源管理和编程系统。今天,大多数云计算系统都完全依赖于基础设施。这种基础设施对研究团体来说是不可见的。在本文中,作者介绍了EUCALYPTUS,这是一个用于云计算的开源软件框架。这个开源软件框架实现了基础设施即服务(IaaS)。EUCALYPTUS系统的体系结构简单,灵活,模块化,具有层次设计,反映了在许多学术环境中发现的公共资源环境。作者描述了组成EUCALYPTUS安装的四个高级组件,每个组件都有自己的web服务接口。它包括节点控制器、集群控制器、存储控制器和云控制器。节点控制器在指定用于托管虚拟机实例的每个节点上执行。每个节点控制器都进行查询,以发现节点的物理资源,如核数、内存大小、可用磁盘空间,还可以了解节点上虚拟机实例的状态。 And next the author says that clster node generally executes on a cluster front end machine, or any machine that has network connectivity to both the nodes running NC’s and to the machine running the cloud controller. Many of the cloud controller operations are similar to the NC’s operations but are generally plural instead of singular(eg: run instances,terminate instances). Basically the cloud controller calculates how many simultaneous instances of the specific “type” can execute on its collection of NC’s and reports that number back to the CLC. VM instance interconnectivity is one of the most interesting challenges in the design of cloud computing infrastructure. While designing EUCALYPTUS, the authors recognized that the VM instance network solution must address connectivity isolation ad performance. This EUCALYPTUS design attempts to maintain inter-VM network performance as close to native as possible. |
在EUCALYPTUS中,CC目前处理这三种模式。第一个配置指示系统将虚拟机的接口直接连接到连接到实际物理机网络的软件以太网网桥。第二个配置允许管理员定义静态媒体访问控制(MAC)和IP地址元组。在这种模式下,系统创建的每个新实例都会被分配一个空闲的MAC/IP元组,该元组在实例终止时被释放。在这些模式下,当虚拟机运行在同一集群上,但不存在虚拟机间网络隔离时,虚拟机间通信的性能接近本机。最后,这项工作旨在说明这样一个事实,即EUCALYPTUS系统通过提供一个易于部署顶级现有资源的系统填补了云计算设计领域的重要利基,它通过模块化和开源实现了自身的实验,并通过兼容接口提供了强大的开箱即用功能。作者提供了他们成功地在从一台笔记本电脑到小型linux集群的资源上部署了完整的系统。此外,他们还为所有希望在不安装任何软件的情况下试用该系统的人提供了安装。在此,他们总结到目前为止他们的经验是非常积极的,使我们得出这样的结论:EUCALYPTUS正在帮助研究社区提供一个非常需要的开源软件框架,围绕这个框架可以开发云计算研究人员的用户基础。 |
基于可信计算技术的云计算系统安全性(2010) |
一般来说,基础网络需要安全性来实现信息的认证传输。云计算为人们提供了共享属于不同组织或站点的分布式资源和服务的方法。随着分布式系统和网络计算的广泛应用,安全问题已经成为一个紧迫的问题,在未来将变得更加重要。为了提高工作效率,将不同的业务分布在不同的服务器上,而服务器又分布在不同的地方。来自多个环境的用户都希望能够更高效地使用分布式计算,就像使用电力一样。那么,云计算就成为了一种新的信息需求。云计算提供了一种能够在分散拥有和管理的资源之间进行大规模受控共享和互操作的设施。作者指出,因此安全性是任何云计算基础设施中的一个主要元素,因为必须确保只允许授权访问,并且接受安全行为。由于云计算是由不同的本地系统组成,包含了来自多个环境的成员,因此云中的安全问题比较复杂。一方面,安全机制应该为用户提供足够安全的保证,另一方面,安全机制不应该过于复杂,使用户陷入不方便的境地。提出了一种新的方法,有利于提高云计算的安全性和可靠性。在设计中,作者将基于可信平台模块(TPM)的可信计算平台(TCP)集成到云计算系统中。TCP协议将用于云计算环境下的认证、保密和完整性。TCP可以提高云计算的安全性,不会给用户带来太大的复杂性。 Because the TCP is based on relatively independent hardware modules, it does not cost too much resource of CPU, and can improve the performance of processing cryptographic computation. The authors also designed a software middleware, the Trusted Platform Support Service (TSS), on which the cloud computing application can use easily the security function of TPM.The authors then discussed about the security model of the cloud computing. In order to achieve security in cloud computing system, some technologies have been used to build the security mechanism for cloud computing. The cloud computing security can be provided as security services. Security messages and secured messages can be transported, understood, and manipulated by standard Web services tools and software. The authors noted that this mechanism is a good choice because the web service technology has been well established in the network-computing environment.The CLOUD includes distributed users and resource |
来自具有不同安全策略的分布式本地系统或组织。基于这个原因,如何在他们之间建立一个合适的关系是一个挑战。实际上,云计算环境对安全的要求是多方面的,包括保密性。多重安全策略,服务动态。,the trust among the entities, dynamically building trust domains.The authors proposed the mechanism of trusted computing platform and other related functions that aid to achieve the trusted cloud computing, which has a trusted computing environment.The word trust is defined as “A trusted component, operation, or process is one whose behavior is predictable under almost any operating condition and which is highly resistant to subversion by application software, viruses, and a given level of physical interference.” Then the authors concentrated on the trusted computing platform.TCP operates through a combination of software and hardware: manufacturers add some new hardware to each computer to support TC functions, and then a special TC(trusted computing) operating system mediates betweenthe hardware and any TC-enabled applications. TCP provides two basic services, authenticated boot and encryption, which are designed to work together. An authenticated boot service monitors what operating system software is booted on the computer and gives applications a sure way to tell which operating system is running. It does this by adding hardware that keeps a kind of audit log of the boot process.The authors keynoted that the build trusted cloud computing system using TCP.The trusted computing mechanism can provide a way that can help to establish a security environment. The model of trusted computing is originally designed to provide the privacy and trust in the personal platform and the trusted computing platform is the base of the trusted computing. Since the internet computing or network computing has been the main computing from the end of the last century, the model of trusted computing is being developed to the network computing, especially the distributed systems environment. The cloud computing is a promising distributed system model and will act as an important role in the e-business or research environments.The authors specified the Authentication cloud computing environment in TCP.In cloud computing environment, different entities can appeal to join the CLOUD. Then the first step is to prove their identities to the cloud computing system administration. Because cloud computing should involve a large amount of entities, such as users and resources from different sources, the authentication is important and complicated. Considering these, we use the TCP to aid to process the authentication in cloud computing. Then the authors were dealt about the Role based access control model in cloud computing environment. In order to reach the goal of trusted computing, the users should come from the trusted computing platform, and take the security mechanism on this platform to achieve the privacy and security for themselves. The user has his personal ID and secret key, such as the USB Key, to get the right to use the TCP. They can use the decryption function to protect their data and other information. |
作者描述了通过使用远程验证功能,TCP中的用户可以将他们的身份和相关信息通知给他们想要访问的远程机器。分析了云计算环境下的可信计算以及可信计算平台在云计算中的作用。他们提出的方法的优点是将可信计算技术扩展到云计算环境中,实现对云计算的可信计算需求,进而实现可信云计算。采用TCP协议作为云计算系统的硬件基础。TCP在其设计中为云计算系统提供了一些重要的安全功能,如身份验证、通信安全和数据保护。本文还提出了相应的实现方法。 |
结论及未来工作 |
讨论了从2009年到2010年为匿名数据开发的各种方法。为广泛研究和其他目的发布人口普查或患者数据等微观数据是政府机构和其他社会协会关注的一个重要问题领域。通过文献调查发现,传统的方法从微数据中剔除社保号等唯一标识字段,但仍然会导致敏感数据的泄露,k-匿名优化算法在某些情况下似乎是有前景和强大的,但仍然存在优化的k-匿名是np难的限制,从而导致严重的计算挑战。k-匿名面临着同质性攻击和背景知识攻击的问题。为了解决这个问题,文献中提出的ldiversity概念也提出了一些约束,因为它被证明是低效的,无法防止属性泄露(偏度攻击和相似攻击),l-多样性难以实现,并且可能无法对跨等价类的敏感属性提供足够的隐私保护,可以大大改善信息披露限制技术(如采样单元抑制舍入和数据交换和扰动)的隐私。详细讨论了数据匿名化技术和数据泄露防范技术的发展。介绍了数据匿名化技术在弹道数据等几种频谱数据中的应用。这项调查将促进数据库匿名化领域的许多研究方向。 |
参考文献 |
|