| Literature DB >> 27610326 |
Chen-Yi Lin1, Yuan-Hung Kao2, Wei-Bin Lee2, Rong-Chang Chen3.
Abstract
With the popularity of smart handheld devices and the emergence of cloud computing, users and companies can save various data, which may contain private data, to the cloud. Topics relating to data security have therefore received much attention. This study focuses on data stream environments and uses the concept of a sliding window to design a reversible privacy-preserving technology to process continuous data in real time, known as a continuous reversible privacy-preserving (CRP) algorithm. Data with CRP algorithm protection can be accurately recovered through a data recovery process. In addition, by using an embedded watermark, the integrity of the data can be verified. The results from the experiments show that, compared to existing algorithms, CRP is better at preserving knowledge and is more effective in terms of reducing information loss and privacy disclosure risk. In addition, it takes far less time for CRP to process continuous data than existing algorithms. As a result, CRP is confirmed as suitable for data stream environments and fulfills the requirements of being lightweight and energy-efficient for smart handheld devices.Entities:
Keywords: Cloud computing; Data protection; Data streams; Sliding window
Year: 2016 PMID: 27610326 PMCID: PMC4995193 DOI: 10.1186/s40064-016-3095-3
Source DB: PubMed Journal: Springerplus ISSN: 2193-1801
Pathology information
| Time | Heartbeat | Blood pressure | Blood glucose | Oxygen content |
|---|---|---|---|---|
| 1 | 77 | 145 | 125 | 170 |
| 2 | 75 | 148 | 121 | 167 |
| 3 | 76 | 147 | 123 | 169 |
| 4 | 78 | 146 | 122 | 168 |
| 5 | 77 | 147 | 124 | 170 |
| 6 | 76 | 146 | 123 | 171 |
| 7 | 77 | 145 | 125 | 169 |
| 8 | 75 | 147 | 126 | 170 |
| 9 | 76 | 148 | 124 | 168 |
| 10 | 75 | 149 | 125 | 169 |
| 11 | 76 | 148 | 124 | 171 |
| 12 | 78 | 147 | 128 | 170 |
| … | … | … | … | … |
| … | … | … | … | … |
| … | … | … | … | … |
Fig. 1Schematic diagram of CRP data protection
CRP data protected by generalising Table 1
| Time | Heartbeat | Blood pressure | Blood glucose | Oxygen content |
|---|---|---|---|---|
| 1 | 77 | 145 | 125 | 170 |
| 2 | 75 | 148 | 121 | 167 |
| 3 | 76 | 147 | 123 | 169 |
| 4 | 79 | 146 | 121 | 168 |
| 5 | 77 | 147 | 125 | 171 |
| 6 | 75 | 145 | 122 | 172 |
| 7 | 77 | 144 | 126 | 168 |
| 8 | 74 | 148 | 127 | 169 |
| 9 | 76 | 149 | 123 | 167 |
| 10 | 74 | 150 | 125 | 169 |
| 11 | 77 | 147 | 123 | 172 |
| 12 | 79 | 146 | 129 | 171 |
| … | … | … | … | … |
| … | … | … | … | … |
| … | … | … | … | … |
Test datasets
| Datasets name | Number of attributes | Number of instances | Number of classes |
|---|---|---|---|
| Abalone | 8 | 4177 | 3 |
| Breast Cancer Wisconsin (original) | 10 | 699 | 2 |
| Census | 12 | 13,518 | 5 |
| Landsat Satellite | 36 | 4435 | 7 |
| Vehicle Silhouettes | 18 | 846 | 4 |
Fig. 2Analysis of window sizes on SVM
Fig. 3Analysis of knowledge accuracy. a Decision Tree, b Native Bayes, c SVM
Fig. 4Analysis of PIL values
Fig. 5Analysis of DR values
Fig. 6Analysis of execution time. a Data protection, b data recovery
| Input: | A window size |
| Output: | The protected data |
|
| Let |
|
| Let |
|
| For ( |
| Let | |
|
| |
| If | |
| Else If | |
|
| |
| If | |
| If | |
| Else If | |
|
| Save |
| Input: | The window size |
| Output: | The original streaming data |
|
| Let |
|
| Let |
|
| For ( |
| Let | |
|
| |
| If | |
| Else If | |
| Else If | |
| Else If | |
| Else If | |
|
|
|