Privacy-preserving data outsourcing in the cloud via semantic data splitting

Computer Communications - Tập 110 - Trang 187-201 - 2017
David Sánchez1, Montserrat Batet2
1UNESCO Chair in Data Privacy, Department of Computer Science and Mathematics, Universitat Rovira i Virgili, Avda. Països Catalans, 26, 43007 Tarragona, Spain
2Internet Interdisciplinary Institute (IN3), Universitat Oberta de Catalunya, Avda. Carl Friedrich Gauss, 5, 08860 Castelldefels, Barcelona, Spain

Tài liệu tham khảo

Cloud Security Alliance, Cloud usage: risks and opportunities report, in, September 2014. European Network and Information Security Agency, Cloud computing. Benefits, risks and recommendations for information security. Revision B, in: L. Dupré, T. Haeberlen (Eds.), December 2012. E. Ramirez, J. Brill, M.K. Ohlhausen, J.D. Wright, T. McSweeny, Data Brokers: A call for transparency and accountability, in, federal trade commission, May 2014. Battistoni, 2016, CURE—Towards enforcing a reliable timeline for cloud forensics: model, architecture, and experiments, Comput. Commun., 91-92, 29, 10.1016/j.comcom.2016.03.024 Gentry, 2012, Fully homomorphic encryption with polylog overhead, 465 Li, 2011, Authorized private keyword search over encrypted data in cloud computing, 383 Li, 2014, Privacy-preserving data utilization in hybrid clouds, Future Gen. Comput. Syst., 30, 98, 10.1016/j.future.2013.06.011 Fan, 2013, Controllable privacy preserving search based on symmetric predicate encryption in cloud storage, Future Gen. Comput. Syst., 29, 1716, 10.1016/j.future.2012.05.005 Chen, 2010, On securing untrusted clouds with cryptography, 109 Zissis, 2012, Cryptographic dysfunctionality-a survey on user perceptions of digital certificates, 80 Rouse, 2014, What is a multi-cloud strategy? Yang, 2015, A hybrid solution for privacy preserving medical data sharing in the cloud environment, Future Gen. Comput. Syst., 43-44, 74, 10.1016/j.future.2014.06.004 Dev, 2012, An approach to protect the privacy of cloud data from data mining based attacks, 1106 Aggarwal, 2005, Two can keep a secret: a distributed architecture for secure database services, 186 Wei, 2013, Data privacy protection using multiple cloud storages Ciriani, 2007, Fragmentation and encryption to enforce privacy in data storage, 171 Ganapathy, 2012, Distributing data for secure database services, Trans. Data Privacy, 5, 253 Bier, 2009, The rules of redaction: identify, protect, review (and repeat), IEEE Secur. Privacy Mag., 7, 46, 10.1109/MSP.2009.183 Staddon, 2007, Web-based inference detection Anandan, 2012, L.Si, t-plausibility: generalizing words to desensitize text, Trans. Data Privacy, 5, 505 Sánchez, 2013, Automatic general-purpose sanitization of textual documents, IEEE Trans. Inf. Forensics Secur., 8, 853, 10.1109/TIFS.2013.2239641 Sánchez, 2013, Minimizing the disclosure risk of semantic correlations in document sanitization, Inf. Sci., 249, 110, 10.1016/j.ins.2013.06.042 Sánchez, 2014, Utility-preserving sanitization of semantically correlated terms in textual documents, Inf. Sci., 279, 77, 10.1016/j.ins.2014.03.103 Sánchez, 2016, C-sanitized: a privacy model for document redaction and sanitization, J. Assoc. Inf. Sci. Technol., 67, 148, 10.1002/asi.23363 Sánchez, 2017, Toward sensitive document release with privacy guarantees, Eng. Appl. Artif. Intell., 59, 23, 10.1016/j.engappai.2016.12.013 P. Samarati, L. Sweeney, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, in, SRI International Report, 1998. Samarati, 2001, Protecting respondents' identities in microdata release, IEEE Trans. Knowl. Data Eng., 13, 1010, 10.1109/69.971193 Chakaravarthy, 2008, Efficient techniques for document sanitization, 843 Dwork, 2006, Differential privacy, 1 Viejo, 2016, Enforcing transparent access to private content in social networks by means of automatic sanitization, Expert Syst. Appl., 62, 148, 10.1016/j.eswa.2016.06.026 Imran-Daud, 2016, Privacy-driven access control in social networks by means of automatic semantic annotation, Comput. Commun., 76, 12, 10.1016/j.comcom.2016.01.001 Department of Health and Human Services, The health insurance portability and accountability act of 1996, in, 2000. Terry, 2007, 681 U.S. Department of Health & Human Services, Health information privacy, in, 2015. Department for a Healthy New York, New York state confidentiality law, in, 2013. Legal Information Institute, Privacy protection for filings made with the court, in, 2013. The European Parliament and the Council of the EU, Data protection directive 95/46/EC, in, 1995. Resnik, 1995, Using information content to evalutate semantic similarity in a taxonomy, 448 Turney, 2001, Mining the web for synonyms: PMI-IR versus LSA on TOEFL, 491 Hundepool, 2013 Domingo-Ferrer, 2005, Ordinal, continuous and heterogeneous k-anonymity through microaggregation, Data Mining Knowl. Discov., 11, 195, 10.1007/s10618-005-0007-5 Domingo-Ferrer, 2016 Brinkman, 2006, A lucky dip as a secure data store Curtmola, 2011, Searchable symmetric encryption: improved definitions and efficient constructions, J. Comput. Secur., 19, 895, 10.3233/JCS-2011-0426 Ballard, 2005, Achieving efficient conjunctive keyword searches over encrypted data, 414 Cash, 2013, Highly-scalable searchable symmetric encryption with support for boolean queries, 353 Sánchez, 2014, Utility-preserving privacy protection of textual healthcare documents, J. Biomed. Inform., 52, 189, 10.1016/j.jbi.2014.06.008