2012
DOI: 10.1016/j.jcss.2011.12.020
|View full text |Cite
|
Sign up to set email alerts
|

A historical probability based noise generation strategy for privacy protection in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
7

Relationship

3
4

Authors

Journals

citations
Cited by 66 publications
(37 citation statements)
references
References 33 publications
0
37
0
Order By: Relevance
“…And a common model is presented in terms of obfuscation-based private web search [28]. Zhang et al [9] present a historical probability based noise generation strategy for privacy protection in cloud computing to obtain a promising cost-saving in cloud environments. Besides, a similar idea about packet padding [25] focuses on concealing fingerprints of web pages.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…And a common model is presented in terms of obfuscation-based private web search [28]. Zhang et al [9] present a historical probability based noise generation strategy for privacy protection in cloud computing to obtain a promising cost-saving in cloud environments. Besides, a similar idea about packet padding [25] focuses on concealing fingerprints of web pages.…”
Section: Related Workmentioning
confidence: 99%
“…Our time-series pattern based noise injection model is modified from [9] to fulfill our time-series pattern idea as shown in Fig. 3.…”
Section: Noise Injection Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Gaofeng mentioned that the use of cloud computing by criminals means that their devices will be virtualized, geographically distributed and ephemeral, presenting technical and jurisdictional challenges for their identification and seizure by law enforcement and national-security agencies. These can impede digital forensic investigators and potentially prevent law enforcement and national-security agencies from acquiring digital evidence and analyzing digital content forensically in a timely fashion [9]. Other researchers such as Mell and Grance also mention that the sourcing and delivery model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction infrastructure as a Service is a basic product, which can be offered by a cloud provider.…”
Section: A Taxonomy Of CCmentioning
confidence: 99%