Analytical Evaluation of k–Anonymity Algorithm and Epsilon-Differential Privacy Mechanism in Cloud Computing Environment
Title | Analytical Evaluation of k–Anonymity Algorithm and Epsilon-Differential Privacy Mechanism in Cloud Computing Environment |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Razaque, Abdul, Frej, Mohamed Ben Haj, Yiming, Huang, Shilin, Yan |
Conference Name | 2019 IEEE Cloud Summit |
Date Published | Aug. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-3101-6 |
Keywords | algorithm orientation, algorithm orientations, analytical evaluation, anonymity, anonymity algorithm, cloud computing, cloud computing environment, composability, Data analysis, Data models, data privacy, Data security, data segregation, Databases, Differential privacy, differential privacy algorithm, differential privacy mechanism, dilemmas, epsilon-differential privacy mechanism, evaluation, expected risks, Human Behavior, k-anonymity algorithm, Metrics, privacy, privacy environment, privacy problem, privacy protection algorithms, pubcrawl, resilience, Resiliency, Runtime, security of data, unexpected risks |
Abstract | Expected and unexpected risks in cloud computing, which included data security, data segregation, and the lack of control and knowledge, have led to some dilemmas in several fields. Among all of these dilemmas, the privacy problem is even more paramount, which has largely constrained the prevalence and development of cloud computing. There are several privacy protection algorithms proposed nowadays, which generally include two categories, Anonymity algorithm, and differential privacy mechanism. Since many types of research have already focused on the efficiency of the algorithms, few of them emphasized the different orientation and demerits between the two algorithms. Motivated by this emerging research challenge, we have conducted a comprehensive survey on the two popular privacy protection algorithms, namely K-Anonymity Algorithm and Differential Privacy Algorithm. Based on their principles, implementations, and algorithm orientations, we have done the evaluations of these two algorithms. Several expectations and comparisons are also conducted based on the current cloud computing privacy environment and its future requirements. |
URL | https://ieeexplore.ieee.org/document/9045758 |
DOI | 10.1109/CloudSummit47114.2019.00023 |
Citation Key | razaque_analytical_2019 |
- privacy problem
- epsilon-differential privacy mechanism
- evaluation
- expected risks
- Human behavior
- k-anonymity algorithm
- Metrics
- privacy
- privacy environment
- dilemmas
- privacy protection algorithms
- pubcrawl
- resilience
- Resiliency
- Runtime
- security of data
- unexpected risks
- Data models
- algorithm orientations
- analytical evaluation
- anonymity
- anonymity algorithm
- Cloud Computing
- cloud computing environment
- composability
- data analysis
- algorithm orientation
- data privacy
- Data Security
- data segregation
- Databases
- differential privacy
- differential privacy algorithm
- differential privacy mechanism