TY - GEN
T1 - An effective privacy protection scheme for cloud computing
AU - Chuang, I. Hsun
AU - Li, Syuan Hao
AU - Huang, Kuan Chieh
AU - Kuo, Yau Hwang
PY - 2011/5/11
Y1 - 2011/5/11
N2 - With the rapid development of cloud computing, more cloud services are into our daily life, and thus security protection of cloud services, especially data privacy protection, becomes more important. However to perform privacy protection causes huge overhead. Thus it is a critical issue to perform the most suitable protection to decline performance consumption while provide privacy protection. In this paper, the Effective Privacy Protection Scheme (EPPS) is proposed to provide the appropriate privacy protection which is satisfying the user-demand privacy requirement and maintaining system performance simultaneously. At first, we analyze the privacy level users require and quantify security degree and performance of encryption algorithms. Then, an appropriate security composition is derived by the results of analysis and quantified data. Finally, the simulation results show that the EPPS not only fulfills the user-demand privacy but also maintains the cloud system performance in different cloud environments. The execution result of EPPS outperforms other security schemes by 35% to 50%.
AB - With the rapid development of cloud computing, more cloud services are into our daily life, and thus security protection of cloud services, especially data privacy protection, becomes more important. However to perform privacy protection causes huge overhead. Thus it is a critical issue to perform the most suitable protection to decline performance consumption while provide privacy protection. In this paper, the Effective Privacy Protection Scheme (EPPS) is proposed to provide the appropriate privacy protection which is satisfying the user-demand privacy requirement and maintaining system performance simultaneously. At first, we analyze the privacy level users require and quantify security degree and performance of encryption algorithms. Then, an appropriate security composition is derived by the results of analysis and quantified data. Finally, the simulation results show that the EPPS not only fulfills the user-demand privacy but also maintains the cloud system performance in different cloud environments. The execution result of EPPS outperforms other security schemes by 35% to 50%.
UR - http://www.scopus.com/inward/record.url?scp=79955698831&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79955698831&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:79955698831
SN - 9788955191554
T3 - International Conference on Advanced Communication Technology, ICACT
SP - 260
EP - 265
BT - 13th International Conference on Advanced Communication Technology
T2 - 13th International Conference on Advanced Communication Technology: Smart Service Innovation through Mobile Interactivity, ICACT 2011
Y2 - 13 February 2011 through 16 February 2011
ER -