ISSN在线(2320 - 9801)打印(2320 - 9798)
K.Deepika1,N。内维普拉萨德2,Prof.S.Balamurugan3,S.Charanyaa4
|
相关文章Pubmed,谷歌学者 |
访问更多的相关文章国际期刊的创新在计算机和通信工程的研究
本文综述方法为匿名化开雷竞技苹果下载发的数据从2009年到2010年。出版微数据,如人口普查或病人数据的广泛研究和其他目的是一个重要的问题区域集中的政府机构和其他社会关联。传统方法通过文献调查表明,消除的方法确定独特的识别等领域社会安全号码从微数据,仍然导致披露敏感数据,k-anonymization优化算法,似乎前途和强大的在某些情况下,仍然带着优化k-anonymity赋权的限制,从而导致严重的计算挑战。k-anonimity面临同质性攻击和背景知识攻击的问题。ldiversity的概念提出了在文献中解决这个问题也是一个数量的限制,因为它是低效的,以防止属性披露(偏斜攻击和相似性攻击),l-diversity很难实现,可能无法提供足够的隐私保护对敏感属性在等价类可以大大提高隐私信息披露限制技术,如抽样细胞抑制舍入和数据交换和pertubertation。本文旨在讨论高效的微数据匿名化方法需要划分等价类,通过最小化亲密内核平滑和确定醚移动距离通过控制微数据敏感属性的分布格局,也保持多样性。
关键字 |
数据匿名化、微数据k-anonymity、身份信息披露,披露属性,多样性 |
介绍 |
需要发布敏感数据在最近几年公共变得奢侈。虽然发布的要求需要有一个限制,出版社会网络数据不应该透露个人隐私信息。因此保护个人隐私和保证社会networ效用数据成为一个具有挑战性和有趣的研究课题。考虑图形模型[35]顶点表示敏感标签算法可以开发出版non-tabular数据对个人隐私的前提下。虽然数据在图形化模型表示KDLD序列生成[35]数据容易受到一些攻击如同质性攻击,相似背景知识攻击,攻击和许多更多。在本文中,我们做了一个调查在攻击和可能的解决方法提出了文学和效率是一样的。 |
桉树开源云计算系统[2009] |
丹尼尔·鲁米wolski丰富,克里斯•grzegorczyk Graziano obertelli,苏尼尔•索曼妖妇youseff, Dmitrii zagorodnov一般来说,云计算系统从根本上提供大量的数据和计算资源通过各种接口。这些接口类似于现有的网格和高性能计算资源管理和编程系统。今天,大多数云计算系统是完全依赖基础设施。基础设施是无形的研究团体。在本文中,作者介绍了桉树是一个开源软件云计算框架。这个开源软件框架实现了基础设施即服务(IaaS)。桉树的架构系统简单、灵活和模块化分层设计反映公共资源环境中发现许多学术设置。作者描述了四个高级组件,每个都有自己的web服务接口,组成一个桉树安装。集群控制器,它包括节点控制器,存储控制器和云控制器。节点控制器在每个节点上执行指定的托管虚拟机实例。每个节点控制器使查询发现节点的物理资源像核的数量,内存的大小,也可用的磁盘空间和学习的节点上的虚拟机实例的状态。 And next the author says that clster node generally executes on a cluster front end machine, or any machine that has network connectivity to both the nodes running NC’s and to the machine running the cloud controller. Many of the cloud controller operations are similar to the NC’s operations but are generally plural instead of singular(eg: run instances,terminate instances). Basically the cloud controller calculates how many simultaneous instances of the specific “type” can execute on its collection of NC’s and reports that number back to the CLC. VM instance interconnectivity is one of the most interesting challenges in the design of cloud computing infrastructure. While designing EUCALYPTUS, the authors recognized that the VM instance network solution must address connectivity isolation ad performance. This EUCALYPTUS design attempts to maintain inter-VM network performance as close to native as possible. |
在桉树,CC目前处理三种模式。第一个配置指示系统将VM软件以太网接口直接连接到一个真正的物理机器网络的桥梁。第二个配置允许管理员定义静态媒体访问控制(MAC)和IP地址元组。在这种模式下每个新创建的实例由系统分配一个免费的MAC / IP tuple,终止时释放的实例。在这些模式中,本机附近inter-VM通信的性能,当虚拟机集群上运行相同但没有国米VM网络隔离。最后,这项工作的目的是为了说明这一事实桉树系统填补了云计算的重要细分设计空间提供了一个系统,很容易部署现有资源,土地本身实验通过模块化的和开源的,这提供了强大的功能通过一个接口兼容的开箱即用的。作者提供,他们成功地部署完整的系统资源从单一的笔记本小linux集群。此外,他们已经安装所有那些希望尝试系统不安装任何软件的情况下。在此,他们得出的结论是,他们的经验到目前为止一直非常积极,美国主要的结论是,桉树正在帮助为研究团体提供急需的,开放源码软件框架的一个云计算的用户群研究人员可以开发。 |
云计算的安全系统通过可信计算技术(2010) |
一般来说,基本的网络需要安全传输信息进行身份验证。云计算提供了人们共享分布式资源和服务,属于不同的组织或网站。由于分布式系统和网络计算被广泛使用,安全已经成为一个紧迫的问题,将在未来更重要。为了提高工作效率,不同的服务是分布在不同的服务器,分布在不同的地方。用户从多个环境希望使用分布式计算的效率,就像使用电力。然后,云计算已经成为一个新的信息需求。云计算提供了一种工具,使大规模控制之间的共享和互操作分散资源拥有和管理。作者指出,因此,安全是主要元素在任何云计算基础设施,因为它是必要的,以确保只有授权的访问许可和安全行为是接受。因为云计算由不同的本地系统和包括成员来自多个环境,因此,安全在云是复杂的。在一边,安全机制应该为用户提供保证足够安全,另一方面,安全机制不应太复杂的用户难以忽视的情况。作者提出了一种新的方法,有利于提高安全可靠的云计算。在他们的设计中,作者综合可信计算平台(TCP),基于可信平台模块(TPM),到云计算系统中。TCP将用于认证、机密性和完整性的云计算环境。TCP可以提高云计算安全,不会对用户带来了复杂性。 Because the TCP is based on relatively independent hardware modules, it does not cost too much resource of CPU, and can improve the performance of processing cryptographic computation. The authors also designed a software middleware, the Trusted Platform Support Service (TSS), on which the cloud computing application can use easily the security function of TPM.The authors then discussed about the security model of the cloud computing. In order to achieve security in cloud computing system, some technologies have been used to build the security mechanism for cloud computing. The cloud computing security can be provided as security services. Security messages and secured messages can be transported, understood, and manipulated by standard Web services tools and software. The authors noted that this mechanism is a good choice because the web service technology has been well established in the network-computing environment.The CLOUD includes distributed users and resource |
从当地分布式系统或组织,有不同的安全策略。根据这个原因,如何构建一个合适的他们之间的关系是一个挑战。事实上,云计算环境的安全要求有一些方面,包括机密性。多种安全策略,动态的服务。,the trust among the entities, dynamically building trust domains.The authors proposed the mechanism of trusted computing platform and other related functions that aid to achieve the trusted cloud computing, which has a trusted computing environment.The word trust is defined as “A trusted component, operation, or process is one whose behavior is predictable under almost any operating condition and which is highly resistant to subversion by application software, viruses, and a given level of physical interference.” Then the authors concentrated on the trusted computing platform.TCP operates through a combination of software and hardware: manufacturers add some new hardware to each computer to support TC functions, and then a special TC(trusted computing) operating system mediates betweenthe hardware and any TC-enabled applications. TCP provides two basic services, authenticated boot and encryption, which are designed to work together. An authenticated boot service monitors what operating system software is booted on the computer and gives applications a sure way to tell which operating system is running. It does this by adding hardware that keeps a kind of audit log of the boot process.The authors keynoted that the build trusted cloud computing system using TCP.The trusted computing mechanism can provide a way that can help to establish a security environment. The model of trusted computing is originally designed to provide the privacy and trust in the personal platform and the trusted computing platform is the base of the trusted computing. Since the internet computing or network computing has been the main computing from the end of the last century, the model of trusted computing is being developed to the network computing, especially the distributed systems environment. The cloud computing is a promising distributed system model and will act as an important role in the e-business or research environments.The authors specified the Authentication cloud computing environment in TCP.In cloud computing environment, different entities can appeal to join the CLOUD. Then the first step is to prove their identities to the cloud computing system administration. Because cloud computing should involve a large amount of entities, such as users and resources from different sources, the authentication is important and complicated. Considering these, we use the TCP to aid to process the authentication in cloud computing. Then the authors were dealt about the Role based access control model in cloud computing environment. In order to reach the goal of trusted computing, the users should come from the trusted computing platform, and take the security mechanism on this platform to achieve the privacy and security for themselves. The user has his personal ID and secret key, such as the USB Key, to get the right to use the TCP. They can use the decryption function to protect their data and other information. |
作者描述,通过使用远程证明功能,用户在TCP可以通知他们的身份和相关信息他们想要访问远程机器。作者得出结论,他们分析了云计算的可信计算环境和可信计算在云计算平台的功能。他们提出的方法的优点是可信计算技术扩展到云计算环境中实现云计算的可信计算需求然后满足可信云计算。使用TCP作为云计算系统的硬件基础。在他们的设计中,TCP提供云计算系统的一些重要的安全功能,这些认证,通信安全和数据保护。有关这些实现方法也是本文作者提出的。 |
结论和未来的工作 |
各种方法为匿名化开发数据讨论了从2009年到2010年。出版微数据,如人口普查或病人数据的广泛研究和其他目的是一个重要的问题区域集中的政府机构和其他社会关联。传统方法通过文献调查表明,消除的方法确定独特的识别等领域社会安全号码从微数据,仍然导致披露敏感数据,k-anonymization优化算法,似乎前途和强大的在某些情况下,仍然带着优化k-anonymity赋权的限制,从而导致严重的计算挑战。k-anonimity面临同质性攻击和背景知识攻击的问题。ldiversity的概念提出了在文献中解决这个问题也是一个数量的限制,因为它是低效的,以防止属性披露(偏斜攻击和相似性攻击),l-diversity很难实现,可能无法提供足够的隐私保护对敏感属性在等价类可以大大提高隐私信息披露限制技术,如抽样细胞抑制舍入和数据交换和pertubertation。进化的数据匿名化技术和数据披露预防技术进行了较为详细的试验研究。数据匿名化技术的应用等几个光谱数据轨迹数据进行描述。这个调查将推动很多数据库匿名化领域的研究方向。 |
引用 |
|