2019
DOI: 10.1108/el-05-2019-0127
|View full text |Cite
|
Sign up to set email alerts
|

A privacy protection approach for XML-based archives management in a cloud environment

Abstract: Purpose The security of archival privacy data in the cloud has become the main obstacle to the application of cloud computing in archives management. To this end, aiming at XML archives, this paper aims to present a privacy protection approach that can ensure the security of privacy data in the untrusted cloud, without compromising the system availability. Design/methodology/approach The basic idea of the approach is as follows. First, the privacy data before being submitted to the cloud should be strictly e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 21 publications
0
15
0
Order By: Relevance
“…Promoting the values of Pancasila for Elementary Schools through interactive learning media basically focuses on the goal of mastering skills as a citizen in accordance with the values of Pancasila. [32] states that in today's digital era, data security is a major obstacle in ensuring security. As stated in the statement, the interactive learning media expected a change in the learning perspective of students in terms of Pancasila values for elementary schools.…”
Section: Resultsmentioning
confidence: 99%
“…Promoting the values of Pancasila for Elementary Schools through interactive learning media basically focuses on the goal of mastering skills as a citizen in accordance with the values of Pancasila. [32] states that in today's digital era, data security is a major obstacle in ensuring security. As stated in the statement, the interactive learning media expected a change in the learning perspective of students in terms of Pancasila values for elementary schools.…”
Section: Resultsmentioning
confidence: 99%
“…Traditional security measures such as identity verification and access control can prevent unwanted users from accessing data, but they can't stop internal cloud users from accessing and revealing sensitive information [327]. As such, there are some research focuses on this privacy issues within different domain such as digital library [328], [329], cloud computing [330], [327], e-commerce [331], and so on. Therefore, inclusion of privacy issue in combinatorial t-way testing strategy domain is what is more welcome.…”
Section: Discussionmentioning
confidence: 99%
“…The supply chain vendor selection problem [50], the dry port location selection challenge in China [51], the thermal power plant location selection problem [52], the solar power plant location selection problem [53], and the wind power plant location selection problem [54] have all recently been solved by utilizing the fuzzy AHP method. Recently, some researchers have utilized neutrosophic functions for applications like scheduling [55][56][57][58] and for security enhancement [59][60][61][62][63][64][65][66]. Pairwise comparisons in fuzzy AHP are made using linguistic variables, which are represented as triangular numbers.…”
Section: Methodsmentioning
confidence: 99%