Privacy-preserving data outsourcing in the cloud via semantic data splitting
Tài liệu tham khảo
Cloud Security Alliance, Cloud usage: risks and opportunities report, in, September 2014.
European Network and Information Security Agency, Cloud computing. Benefits, risks and recommendations for information security. Revision B, in: L. Dupré, T. Haeberlen (Eds.), December 2012.
E. Ramirez, J. Brill, M.K. Ohlhausen, J.D. Wright, T. McSweeny, Data Brokers: A call for transparency and accountability, in, federal trade commission, May 2014.
Battistoni, 2016, CURE—Towards enforcing a reliable timeline for cloud forensics: model, architecture, and experiments, Comput. Commun., 91-92, 29, 10.1016/j.comcom.2016.03.024
Gentry, 2012, Fully homomorphic encryption with polylog overhead, 465
Li, 2011, Authorized private keyword search over encrypted data in cloud computing, 383
Li, 2014, Privacy-preserving data utilization in hybrid clouds, Future Gen. Comput. Syst., 30, 98, 10.1016/j.future.2013.06.011
Fan, 2013, Controllable privacy preserving search based on symmetric predicate encryption in cloud storage, Future Gen. Comput. Syst., 29, 1716, 10.1016/j.future.2012.05.005
Chen, 2010, On securing untrusted clouds with cryptography, 109
Zissis, 2012, Cryptographic dysfunctionality-a survey on user perceptions of digital certificates, 80
Rouse, 2014, What is a multi-cloud strategy?
Yang, 2015, A hybrid solution for privacy preserving medical data sharing in the cloud environment, Future Gen. Comput. Syst., 43-44, 74, 10.1016/j.future.2014.06.004
Dev, 2012, An approach to protect the privacy of cloud data from data mining based attacks, 1106
Aggarwal, 2005, Two can keep a secret: a distributed architecture for secure database services, 186
Wei, 2013, Data privacy protection using multiple cloud storages
Ciriani, 2007, Fragmentation and encryption to enforce privacy in data storage, 171
Ganapathy, 2012, Distributing data for secure database services, Trans. Data Privacy, 5, 253
Bier, 2009, The rules of redaction: identify, protect, review (and repeat), IEEE Secur. Privacy Mag., 7, 46, 10.1109/MSP.2009.183
Staddon, 2007, Web-based inference detection
Anandan, 2012, L.Si, t-plausibility: generalizing words to desensitize text, Trans. Data Privacy, 5, 505
Sánchez, 2013, Automatic general-purpose sanitization of textual documents, IEEE Trans. Inf. Forensics Secur., 8, 853, 10.1109/TIFS.2013.2239641
Sánchez, 2013, Minimizing the disclosure risk of semantic correlations in document sanitization, Inf. Sci., 249, 110, 10.1016/j.ins.2013.06.042
Sánchez, 2014, Utility-preserving sanitization of semantically correlated terms in textual documents, Inf. Sci., 279, 77, 10.1016/j.ins.2014.03.103
Sánchez, 2016, C-sanitized: a privacy model for document redaction and sanitization, J. Assoc. Inf. Sci. Technol., 67, 148, 10.1002/asi.23363
Sánchez, 2017, Toward sensitive document release with privacy guarantees, Eng. Appl. Artif. Intell., 59, 23, 10.1016/j.engappai.2016.12.013
P. Samarati, L. Sweeney, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, in, SRI International Report, 1998.
Samarati, 2001, Protecting respondents' identities in microdata release, IEEE Trans. Knowl. Data Eng., 13, 1010, 10.1109/69.971193
Chakaravarthy, 2008, Efficient techniques for document sanitization, 843
Dwork, 2006, Differential privacy, 1
Viejo, 2016, Enforcing transparent access to private content in social networks by means of automatic sanitization, Expert Syst. Appl., 62, 148, 10.1016/j.eswa.2016.06.026
Imran-Daud, 2016, Privacy-driven access control in social networks by means of automatic semantic annotation, Comput. Commun., 76, 12, 10.1016/j.comcom.2016.01.001
Department of Health and Human Services, The health insurance portability and accountability act of 1996, in, 2000.
Terry, 2007, 681
U.S. Department of Health & Human Services, Health information privacy, in, 2015.
Department for a Healthy New York, New York state confidentiality law, in, 2013.
Legal Information Institute, Privacy protection for filings made with the court, in, 2013.
The European Parliament and the Council of the EU, Data protection directive 95/46/EC, in, 1995.
Resnik, 1995, Using information content to evalutate semantic similarity in a taxonomy, 448
Turney, 2001, Mining the web for synonyms: PMI-IR versus LSA on TOEFL, 491
Hundepool, 2013
Domingo-Ferrer, 2005, Ordinal, continuous and heterogeneous k-anonymity through microaggregation, Data Mining Knowl. Discov., 11, 195, 10.1007/s10618-005-0007-5
Domingo-Ferrer, 2016
Brinkman, 2006, A lucky dip as a secure data store
Curtmola, 2011, Searchable symmetric encryption: improved definitions and efficient constructions, J. Comput. Secur., 19, 895, 10.3233/JCS-2011-0426
Ballard, 2005, Achieving efficient conjunctive keyword searches over encrypted data, 414
Cash, 2013, Highly-scalable searchable symmetric encryption with support for boolean queries, 353
Sánchez, 2014, Utility-preserving privacy protection of textual healthcare documents, J. Biomed. Inform., 52, 189, 10.1016/j.jbi.2014.06.008