{"id":"https://openalex.org/W2142977023","doi":"https://doi.org/10.1109/trustcom.2013.64","title":"A Privacy-Leakage-Tolerance Based Noise Enhancing Strategy for Privacy Protection in Cloud Computing","display_name":"A Privacy-Leakage-Tolerance Based Noise Enhancing Strategy for Privacy Protection in Cloud Computing","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2142977023","doi":"https://doi.org/10.1109/trustcom.2013.64","mag":"2142977023"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.64","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052928440","display_name":"Gaofeng Zhang","orcid":"https://orcid.org/0000-0003-0536-7226"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Gaofeng Zhang","raw_affiliation_strings":["[Fac. of Inf. & Commun. Technol., Swinburne Univ. of Technol., Melbourne, VIC, Australia]"],"affiliations":[{"raw_affiliation_string":"[Fac. of Inf. & Commun. Technol., Swinburne Univ. of Technol., Melbourne, VIC, Australia]","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035343733","display_name":"Yun Yang","orcid":"https://orcid.org/0000-0002-7868-5471"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yun Yang","raw_affiliation_strings":["[Fac. of Inf. & Commun. Technol., Swinburne Univ. of Technol., Melbourne, VIC, Australia]"],"affiliations":[{"raw_affiliation_string":"[Fac. of Inf. & Commun. Technol., Swinburne Univ. of Technol., Melbourne, VIC, Australia]","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101808353","display_name":"Jinjun Chen","orcid":"https://orcid.org/0000-0003-1677-9525"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jinjun Chen","raw_affiliation_strings":["Sch. of Syst., Univ. of Technol., Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Sch. of Syst., Univ. of Technol., Sydney, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.485,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":6,"citation_normalized_percentile":{"value":0.64624,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":82,"max":83},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Security Challenges in Cloud Computing","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.67418605},{"id":"https://openalex.org/keywords/privacy-preserving-computation","display_name":"Privacy-Preserving Computation","score":0.565844},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud Computing","score":0.554048},{"id":"https://openalex.org/keywords/secure-computation","display_name":"Secure Computation","score":0.538291},{"id":"https://openalex.org/keywords/privacy","display_name":"Privacy","score":0.536357},{"id":"https://openalex.org/keywords/anonymization","display_name":"Anonymization","score":0.521543},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4915379}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7479751},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.71864414},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.67418605},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6356989},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.5380217},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5161253},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4915379},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.35629183},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.35311055},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.15687391},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.64","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.55,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":29,"referenced_works":["https://openalex.org/W1549027070","https://openalex.org/W1655958391","https://openalex.org/W1977367431","https://openalex.org/W1981602197","https://openalex.org/W2007933321","https://openalex.org/W2022220984","https://openalex.org/W2027172399","https://openalex.org/W2033011282","https://openalex.org/W2054228499","https://openalex.org/W2058181105","https://openalex.org/W2073346043","https://openalex.org/W2075291208","https://openalex.org/W2081086981","https://openalex.org/W2086863233","https://openalex.org/W2108144968","https://openalex.org/W2114296561","https://openalex.org/W2115256097","https://openalex.org/W2118329289","https://openalex.org/W2128906841","https://openalex.org/W2131443541","https://openalex.org/W2131629857","https://openalex.org/W2154816087","https://openalex.org/W2159675343","https://openalex.org/W2168275893","https://openalex.org/W2168426216","https://openalex.org/W2341111334","https://openalex.org/W2512503597","https://openalex.org/W3006076509","https://openalex.org/W4298235322"],"related_works":["https://openalex.org/W98994209","https://openalex.org/W67940504","https://openalex.org/W4308699695","https://openalex.org/W4224216661","https://openalex.org/W3210347767","https://openalex.org/W2152144666","https://openalex.org/W2066014542","https://openalex.org/W2030205047","https://openalex.org/W2024170198","https://openalex.org/W1819617256"],"abstract_inverted_index":{"Cloud":[0],"computing":[1],"promises":[2],"a":[3,13,52,126,177,191,203,228],"service-oriented":[4],"environment":[5],"where":[6],"customers":[7,123,218],"can":[8,80,175,208,232,242,276],"utilise":[9],"IT":[10,24],"services":[11],"in":[12,35,47,70,117,139,183,219,266,288],"pay-as-you-go":[14,185],"fashion":[15,186],"while":[16],"saving":[17],"huge":[18],"capital":[19],"investments":[20],"on":[21,136,159,180,236,284],"their":[22],"own":[23],"infrastructures.":[25],"Due":[26],"to":[27,99,132,198],"the":[28,58,114,156,173,184,214,225,237,240,279],"openness,":[29],"malicious":[30],"service":[31,41,45,49,85,90,94,166],"providers":[32,42,95],"may":[33],"exist":[34],"these":[36,40],"environments.":[37,290],"Some":[38],"of":[39,128,194,221,227,281],"could":[43,124,152],"record":[44],"data":[46,182],"cloud":[48,122,140,188,217,267,289],"processes":[50],"about":[51],"customer":[53,89,174],"and":[54,82,239,244],"then":[55],"collectively":[56],"deduce":[57],"customer's":[59],"private":[60],"information":[61],"without":[62],"authorisation.":[63],"Noise":[64],"obfuscation":[65,119,135,151],"is":[66],"an":[67],"effective":[68],"approach":[69],"this":[71,146,200,251],"regard":[72],"by":[73,155,250],"utilising":[74],"noise":[75,84,109,118,134,150,165,181,205,222,229,247,260,286],"data.":[76],"For":[77],"example,":[78],"it":[79],"generate":[81],"inject":[83],"requests":[86,91,167],"into":[87,169],"real":[88,104,170],"so":[92],"that":[93,273],"are":[96,103],"not":[97,112],"able":[98],"distinguish":[100],"which":[101],"ones":[102],"ones.":[105,171],"However,":[106],"existing":[107,246,285],"typical":[108],"obfuscations":[110,287],"do":[111],"consider":[113],"customer-defined":[115],"privacy-leakage-tolerance":[116,215,258],"processes.":[120],"Specifically,":[121],"define":[125],"boundary":[127,147],"privacy":[129,137,160,195,201,264,282],"leakage":[130],"possibility":[131],"require":[133],"protection":[138,265,283],"computing.":[141,268],"In":[142],"other":[143],"words,":[144],"under":[145],"--":[148],"privacy-leakage-tolerance,":[149,238],"be":[153,209,233],"enhanced":[154],"efficiency":[157,280],"improvement":[158],"protection,":[161],"such":[162],"as":[163],"reducing":[164],"injected":[168],"So,":[172],"obtain":[176],"lower":[178],"cost":[179],"for":[187,216,263],"environments,":[189],"with":[190],"reasonable":[192],"effectiveness":[193],"protection.":[196],"Therefore,":[197],"address":[199],"concern,":[202],"novel":[204,257],"enhancing":[206,261],"strategy":[207,262,275],"presented.":[210],"We":[211],"firstly":[212],"analyse":[213],"terms":[220],"generation.":[223],"Then,":[224],"creation":[226],"generation":[230,248],"set":[231,241],"presented":[234],"based":[235,259],"guide":[243],"enhance":[245],"strategies":[249],"boundary.":[252],"Lastly,":[253],"we":[254],"present":[255],"our":[256,274],"The":[269],"simulation":[270],"evaluation":[271],"demonstrates":[272],"significantly":[277],"improve":[278]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2142977023","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2}],"updated_date":"2024-11-24T05:26:31.964793","created_date":"2016-06-24"}