2017
DOI: 10.1016/j.comcom.2017.06.012
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving data outsourcing in the cloud via semantic data splitting

Abstract: Even though cloud computing provides many intrinsic benefits (e.g., cost savings, availability, scalability, etc.), privacy concerns related to the lack of control over the storage and management of the outsourced (confidential) data still prevent many customers from migrating to the cloud. In this respect, several privacy-protection mechanisms based on a prior encryption of the data to be outsourced have been proposed. Data encryption offers robust security, but at the cost of hampering the efficiency of the … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(17 citation statements)
references
References 29 publications
0
17
0
Order By: Relevance
“…Furthermore, the key coefficients are multiplied with partial data matrix of i/p data as specified in Equation (5).…”
Section: Constructing Retrievable Databasementioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, the key coefficients are multiplied with partial data matrix of i/p data as specified in Equation (5).…”
Section: Constructing Retrievable Databasementioning
confidence: 99%
“…In addition, the cloud platform permits users to store, edit and recover a huge quantity of data. Owing to extensive appliances offered by cloud paradigm, private firms, and official firms access the cloud platforms for varied applications 4,5 …”
Section: Introductionmentioning
confidence: 99%
“…Semantically-grounded splitting mechanism is well-suited for unstructured data such as textual data, it can provide keyword search for online document, email, and messaging applications. For example, a recent work by [59] automatically detects and splits the sets of textual entities that may disclose sensitive information by analysing the semantics they convey and their semantic dependencies. Attribute-level splitting such as vertical splitting [2] is very useful for statistical databases because usually is the combination of several risky attributes that may lead to personal re-identification.…”
Section: Related Workmentioning
confidence: 99%
“…The Proposed Scheme. To verify the integrity for shared data efficiently [15,[25][26][27][28][29][30], our scheme is designed to achieve the following goals.…”
Section: System Architecturementioning
confidence: 99%