SlideShare a Scribd company logo
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-
Effective Privacy Preserving of Intermediate Data Sets in Cloud
ABSTRACT:
Cloud computing provides massive computation power and storage capacity which enable
users to deploy computation and data-intensive applications without infrastructure
investment. Along the processing of such applications, a large volume of intermediate data
sets will be generated, and often stored to save the cost of recomputing them. However,
preserving the privacy of intermediate data sets becomes a challenging problem because
adversaries may recover privacy-sensitive information by analyzing multiple intermediate data
sets. Encrypting ALL data sets in cloud is widely adopted in existing approaches to address this
challenge. But we argue that encrypting all intermediate data sets are neither efficient nor
cost-effective because it is very time consuming and costly for data-intensive applications to
en/decrypt data sets frequently while performing any operation on them. In this paper, we
propose a novel upper bound privacy leakage constraint-based approach to identify which
intermediate data sets need to be encrypted and which do not, so that privacy-preserving cost
can be saved while the privacy requirements of data holders can still be satisfied. Evaluation
results demonstrate that the privacy-preserving cost of intermediate data sets can be
significantly reduced with our approach over existing ones where all data sets are encrypted.
EXISTING SYSTEM:
The privacy concerns caused by retaining intermediate data sets in cloud are important but
they are paid little attention. Storage and computation services in cloud are equivalent from
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
an economical perspective because they are charged in proportion to their usage. Thus, cloud
users can store valuable intermediate data sets selectively when processing original data sets
in data intensive applications like medical diagnosis, in order to curtail the overall expenses by
avoiding frequent recomputation to obtain these data sets. Such scenarios are quite common
because data users often reanalyze results, conduct new analysis on intermediate data sets, or
share some intermediate results with others for collaboration. Without loss of generality, the
notion of intermediate data set herein refers to intermediate and resultant data sets.
However, the storage of intermediate data enlarges attack surfaces so that privacy
requirements of data holders are at risk of being violated. Usually, intermediate data sets in
cloud are accessed and processed by multiple parties, but rarely controlled by original data set
holders. This enables an adversary to collect intermediate data sets together and menace
privacy-sensitive information from them, bringing considerable economic loss or severe social
reputation impairment to data owners. But, little attention has been paid to such a cloud-
specific privacy issue.
DISADVANTAGES OF EXISTING SYSTEM:
Existing technical approaches for preserving the privacy of data sets stored in cloud mainly
include encryption and anonymization. On one hand, encrypting all data sets, a
straightforward and effective approach, is widely adopted in current research.
However, processing on encrypted data sets efficiently is quite a challenging task, because
most existing applications only run on unencrypted data sets. Although recent progress has
been made in homomorphic encryption which theoretically allows performing computation on
encrypted data sets, applying current algorithms are rather expensive due to their inefficiency
On the other hand, partial information of data sets, e.g., aggregate information, is required to
expose to data users in most cloud applications like data mining and analytics. In such cases,
data sets are Anonymized rather than encrypted to ensure both data utility and privacy
preserving. Current privacy-preserving techniques like generalization can withstand most
privacy attacks on one single data set, while preserving privacy for multiple data sets is still a
challenging problem
PROPOSED SYSTEM:
Encrypting all intermediate data sets will lead to high overhead and low efficiency when they
are frequently accessed or processed. As such, we propose to encrypt part of intermediate
data sets rather than all for reducing privacy-preserving cost.
In this paper, we propose a novel approach to identify which intermediate data sets need to
be encrypted while others do not, in order to satisfy privacy requirements given by data
holders. A tree structure is modeled from generation relationships of intermediate data sets to
analyze privacy propagation of data sets.
As quantifying joint privacy leakage of multiple data sets efficiently is challenging, we exploit
an upper bound constraint to confine privacy disclosure. Based on such a constraint, we model
the problem of saving privacy-preserving cost as a constrained optimization problem. This
problem is then divided into a series of sub-problems by decomposing privacy leakage
constraints. Finally, we design a practical heuristic algorithm accordingly to identify the data
sets that need to be encrypted.
ADVANTAGES OF PROPOSED SYSTEM:
The major contributions of our research are threefold.
First, we formally demonstrate the possibility of ensuring privacy leakage requirements
without encrypting all intermediate data sets when encryption is incorporated with
anonymization to preserve privacy.
Second, we design a practical heuristic algorithm to identify which data sets need to be
encrypted for preserving privacy while the rest of them do not.
Third, experiment results demonstrate that our approach can significantly reduce privacy-
preserving cost over existing approaches, which is quite beneficial for the cloud users
who utilize cloud services in a pay-as-you-go fashion.
ARCHITECTURE:
ALGORITHM USED:
Algorithm 1: Privacy-Preserving Cost Reducing Heuristic
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
• Operating system : – Windows XP.
• Coding Language: ASP.NET, C#.Net.
• Data Base : SQL Server 2005
REFERENCE:
Xuyun Zhang, Chang Liu, Surya Nepal, Suraj Pandey, and Jinjun Chen, “A Privacy Leakage Upper
Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data
Sets in Cloud”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO.
6, JUNE 2013.
CLOUING
DOMAIN: WIRELESS NETWORK PROJECTS

More Related Content

DOCX
A privacy leakage upper bound constraint based approach for cost-effective pr...
DOCX
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
PDF
A scalabl e and cost effective framework for privacy preservation over big d...
PDF
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
PPTX
Secure sensitive data sharing on a big data platform
PDF
Secure sensitive data sharing on a big data platform
PDF
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
PDF
Iaetsd secured and efficient data scheduling of intermediate data sets
A privacy leakage upper bound constraint based approach for cost-effective pr...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT A privacy leakage upper bound con...
A scalabl e and cost effective framework for privacy preservation over big d...
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
Iaetsd secured and efficient data scheduling of intermediate data sets

What's hot (18)

PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
PDF
C017421624
PDF
Ijarcet vol-2-issue-3-951-956
DOCX
cooperative caching for efficient data access in disruption tolerant networks
PDF
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
PDF
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
PDF
IJARCCE 20
PDF
Privacy preserving and delegated access control for cloud applications
PDF
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTION
PPTX
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
PDF
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
PPTX
Access Control & Encryption In Cloud Environments
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
PDF
IRJET- A Study of Privacy Preserving Data Mining and Techniques
PDF
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
PPTX
Tees an efficient search scheme over
PPTX
Final 1st
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
C017421624
Ijarcet vol-2-issue-3-951-956
cooperative caching for efficient data access in disruption tolerant networks
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Privacy Preserving Distributed Association Rule Mining Algorithm for Vertical...
IJARCCE 20
Privacy preserving and delegated access control for cloud applications
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTION
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
Access Control & Encryption In Cloud Environments
Privacy preserving multi-keyword ranked search over encrypted cloud data
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
Tees an efficient search scheme over
Final 1st
Ad

Viewers also liked (20)

PPTX
2015 QM Annual Conference Selfie Contest
PDF
Viisi askelta tehokkaampaan e myyntiin - knowit - tony virtanen
PDF
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
PDF
Opera Mediaworks Russia Sales (Oct 2013) | AddInApp
PDF
CE_LOGO_HIGH RES
ODP
Patrimonio
PDF
Understanding Experiential Function of Language
PDF
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
PDF
Jeans
PPTX
Presentacion de power point de libro
PDF
Taller 5 de Sensibilización - Blog Marketing (Carlos Bravo Sánchez)
PDF
Open Access and Open Data: what do I need to know (and do)?
PPTX
Voorbeeld1
PDF
What is the role of print in the multimedia pack?
PPTX
Changing the Role of Agriculture: Moving Beyond Production in the 21st Century
PPTX
Electronic fuel injection system
PDF
Adaptation and Implementation Challenges for Housing First
PPTX
ZooTic
PDF
ARCE DOCUMENTO FINAL CENTROS
PDF
Diptico semana-prev
2015 QM Annual Conference Selfie Contest
Viisi askelta tehokkaampaan e myyntiin - knowit - tony virtanen
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
Opera Mediaworks Russia Sales (Oct 2013) | AddInApp
CE_LOGO_HIGH RES
Patrimonio
Understanding Experiential Function of Language
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
Jeans
Presentacion de power point de libro
Taller 5 de Sensibilización - Blog Marketing (Carlos Bravo Sánchez)
Open Access and Open Data: what do I need to know (and do)?
Voorbeeld1
What is the role of print in the multimedia pack?
Changing the Role of Agriculture: Moving Beyond Production in the 21st Century
Electronic fuel injection system
Adaptation and Implementation Challenges for Housing First
ZooTic
ARCE DOCUMENTO FINAL CENTROS
Diptico semana-prev
Ad

Similar to DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constraint based approach for cost-effective privacy preserving of intermediate data sets in cloud (20)

PPTX
FINAL REVIEW.pptx
PDF
International Journal of Engineering Research and Development
PDF
50120140507005
PDF
50120140507005 2
PDF
Improved deduplication with keys and chunks in HDFS storage providers
PDF
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
PDF
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
PDF
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
PDF
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
PDF
Efficient technique for privacy preserving publishing of set valued data on c...
PDF
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
PDF
Improving Data Storage Security in Cloud using Hadoop
PDF
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
PDF
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
PDF
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
PDF
Cloud java titles adrit solutions
PDF
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
PDF
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
FINAL REVIEW.pptx
International Journal of Engineering Research and Development
50120140507005
50120140507005 2
Improved deduplication with keys and chunks in HDFS storage providers
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
International Journal of Computational Engineering Research(IJCER)
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
Efficient technique for privacy preserving publishing of set valued data on c...
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Improving Data Storage Security in Cloud using Hadoop
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
Cloud java titles adrit solutions
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage

More from IEEEGLOBALSOFTTECHNOLOGIES (20)

DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Machine learning based COVID-19 study performance prediction
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Big Data Technologies - Introduction.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
KodekX | Application Modernization Development
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation theory and applications.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
Network Security Unit 5.pdf for BCA BBA.
Understanding_Digital_Forensics_Presentation.pptx
Electronic commerce courselecture one. Pdf
Machine learning based COVID-19 study performance prediction
The AUB Centre for AI in Media Proposal.docx
NewMind AI Weekly Chronicles - August'25 Week I
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Encapsulation_ Review paper, used for researhc scholars
Big Data Technologies - Introduction.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KodekX | Application Modernization Development
20250228 LYD VKU AI Blended-Learning.pptx
Empathic Computing: Creating Shared Understanding
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
sap open course for s4hana steps from ECC to s4
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation theory and applications.pdf
cuic standard and advanced reporting.pdf
Advanced methodologies resolving dimensionality complications for autism neur...

DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constraint based approach for cost-effective privacy preserving of intermediate data sets in cloud

  • 1. A Privacy Leakage Upper Bound Constraint-Based Approach for Cost- Effective Privacy Preserving of Intermediate Data Sets in Cloud ABSTRACT: Cloud computing provides massive computation power and storage capacity which enable users to deploy computation and data-intensive applications without infrastructure investment. Along the processing of such applications, a large volume of intermediate data sets will be generated, and often stored to save the cost of recomputing them. However, preserving the privacy of intermediate data sets becomes a challenging problem because adversaries may recover privacy-sensitive information by analyzing multiple intermediate data sets. Encrypting ALL data sets in cloud is widely adopted in existing approaches to address this challenge. But we argue that encrypting all intermediate data sets are neither efficient nor cost-effective because it is very time consuming and costly for data-intensive applications to en/decrypt data sets frequently while performing any operation on them. In this paper, we propose a novel upper bound privacy leakage constraint-based approach to identify which intermediate data sets need to be encrypted and which do not, so that privacy-preserving cost can be saved while the privacy requirements of data holders can still be satisfied. Evaluation results demonstrate that the privacy-preserving cost of intermediate data sets can be significantly reduced with our approach over existing ones where all data sets are encrypted. EXISTING SYSTEM: The privacy concerns caused by retaining intermediate data sets in cloud are important but they are paid little attention. Storage and computation services in cloud are equivalent from GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. an economical perspective because they are charged in proportion to their usage. Thus, cloud users can store valuable intermediate data sets selectively when processing original data sets in data intensive applications like medical diagnosis, in order to curtail the overall expenses by avoiding frequent recomputation to obtain these data sets. Such scenarios are quite common because data users often reanalyze results, conduct new analysis on intermediate data sets, or share some intermediate results with others for collaboration. Without loss of generality, the notion of intermediate data set herein refers to intermediate and resultant data sets. However, the storage of intermediate data enlarges attack surfaces so that privacy requirements of data holders are at risk of being violated. Usually, intermediate data sets in cloud are accessed and processed by multiple parties, but rarely controlled by original data set holders. This enables an adversary to collect intermediate data sets together and menace privacy-sensitive information from them, bringing considerable economic loss or severe social reputation impairment to data owners. But, little attention has been paid to such a cloud- specific privacy issue. DISADVANTAGES OF EXISTING SYSTEM: Existing technical approaches for preserving the privacy of data sets stored in cloud mainly include encryption and anonymization. On one hand, encrypting all data sets, a straightforward and effective approach, is widely adopted in current research. However, processing on encrypted data sets efficiently is quite a challenging task, because most existing applications only run on unencrypted data sets. Although recent progress has been made in homomorphic encryption which theoretically allows performing computation on encrypted data sets, applying current algorithms are rather expensive due to their inefficiency On the other hand, partial information of data sets, e.g., aggregate information, is required to expose to data users in most cloud applications like data mining and analytics. In such cases, data sets are Anonymized rather than encrypted to ensure both data utility and privacy preserving. Current privacy-preserving techniques like generalization can withstand most privacy attacks on one single data set, while preserving privacy for multiple data sets is still a challenging problem PROPOSED SYSTEM: Encrypting all intermediate data sets will lead to high overhead and low efficiency when they are frequently accessed or processed. As such, we propose to encrypt part of intermediate data sets rather than all for reducing privacy-preserving cost. In this paper, we propose a novel approach to identify which intermediate data sets need to be encrypted while others do not, in order to satisfy privacy requirements given by data
  • 3. holders. A tree structure is modeled from generation relationships of intermediate data sets to analyze privacy propagation of data sets. As quantifying joint privacy leakage of multiple data sets efficiently is challenging, we exploit an upper bound constraint to confine privacy disclosure. Based on such a constraint, we model the problem of saving privacy-preserving cost as a constrained optimization problem. This problem is then divided into a series of sub-problems by decomposing privacy leakage constraints. Finally, we design a practical heuristic algorithm accordingly to identify the data sets that need to be encrypted. ADVANTAGES OF PROPOSED SYSTEM: The major contributions of our research are threefold. First, we formally demonstrate the possibility of ensuring privacy leakage requirements without encrypting all intermediate data sets when encryption is incorporated with anonymization to preserve privacy. Second, we design a practical heuristic algorithm to identify which data sets need to be encrypted for preserving privacy while the rest of them do not. Third, experiment results demonstrate that our approach can significantly reduce privacy- preserving cost over existing approaches, which is quite beneficial for the cloud users who utilize cloud services in a pay-as-you-go fashion. ARCHITECTURE: ALGORITHM USED: Algorithm 1: Privacy-Preserving Cost Reducing Heuristic
  • 4. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. SOFTWARE REQUIREMENTS: • Operating system : – Windows XP. • Coding Language: ASP.NET, C#.Net. • Data Base : SQL Server 2005 REFERENCE: Xuyun Zhang, Chang Liu, Surya Nepal, Suraj Pandey, and Jinjun Chen, “A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 6, JUNE 2013.