Visible to the public Analytical Evaluation of k–Anonymity Algorithm and Epsilon-Differential Privacy Mechanism in Cloud Computing Environment

TitleAnalytical Evaluation of k–Anonymity Algorithm and Epsilon-Differential Privacy Mechanism in Cloud Computing Environment
Publication TypeConference Paper
Year of Publication2019
AuthorsRazaque, Abdul, Frej, Mohamed Ben Haj, Yiming, Huang, Shilin, Yan
Conference Name2019 IEEE Cloud Summit
Date PublishedAug. 2019
PublisherIEEE
ISBN Number978-1-7281-3101-6
Keywordsalgorithm orientation, algorithm orientations, analytical evaluation, anonymity, anonymity algorithm, cloud computing, cloud computing environment, composability, Data analysis, Data models, data privacy, Data security, data segregation, Databases, Differential privacy, differential privacy algorithm, differential privacy mechanism, dilemmas, epsilon-differential privacy mechanism, evaluation, expected risks, Human Behavior, k-anonymity algorithm, Metrics, privacy, privacy environment, privacy problem, privacy protection algorithms, pubcrawl, resilience, Resiliency, Runtime, security of data, unexpected risks
Abstract

Expected and unexpected risks in cloud computing, which included data security, data segregation, and the lack of control and knowledge, have led to some dilemmas in several fields. Among all of these dilemmas, the privacy problem is even more paramount, which has largely constrained the prevalence and development of cloud computing. There are several privacy protection algorithms proposed nowadays, which generally include two categories, Anonymity algorithm, and differential privacy mechanism. Since many types of research have already focused on the efficiency of the algorithms, few of them emphasized the different orientation and demerits between the two algorithms. Motivated by this emerging research challenge, we have conducted a comprehensive survey on the two popular privacy protection algorithms, namely K-Anonymity Algorithm and Differential Privacy Algorithm. Based on their principles, implementations, and algorithm orientations, we have done the evaluations of these two algorithms. Several expectations and comparisons are also conducted based on the current cloud computing privacy environment and its future requirements.

URLhttps://ieeexplore.ieee.org/document/9045758
DOI10.1109/CloudSummit47114.2019.00023
Citation Keyrazaque_analytical_2019