{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T06:01:43Z","timestamp":1710914503181},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T00:00:00Z","timestamp":1586476800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T00:00:00Z","timestamp":1586476800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11277-020-07320-3","type":"journal-article","created":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T08:03:45Z","timestamp":1586505825000},"page":"2215-2241","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Privacy Based Data Publishing Model for Cloud Computing Environment"],"prefix":"10.1007","volume":"113","author":[{"given":"J. V.","family":"Bibal Benifa","sequence":"first","affiliation":[]},{"given":"G.","family":"Venifa Mini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,10]]},"reference":[{"key":"7320_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2019.11.005","author":"AAA Ari","year":"2019","unstructured":"Ari, A. A. A., et al. (2019). Enabling privacy and security in cloud of things: Architecture, applications, security and privacy challenges. Applied Computing and Informatics. https:\/\/doi.org\/10.1016\/j.aci.2019.11.005.","journal-title":"Applied Computing and Informatics"},{"issue":"6","key":"7320_CR2","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"8","author":"H Takabi","year":"2010","unstructured":"Takabi, H., Joshi, J. B. D., & Ahn, G.-J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security and Privacy,8(6), 24\u201331.","journal-title":"IEEE Security and Privacy"},{"key":"7320_CR3","doi-asserted-by":"publisher","first-page":"102427","DOI":"10.1016\/j.jisa.2019.102427","volume":"50","author":"S Thokchom","year":"2020","unstructured":"Thokchom, S., & Saikia, D. K. (2020). Privacy preserving integrity checking of shared dynamic cloud data with user revocation. Journal of Information Security and Applications,50, 102427.","journal-title":"Journal of Information Security and Applications"},{"issue":"3","key":"7320_CR4","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.icte.2018.10.002","volume":"5","author":"MK Kundalwal","year":"2019","unstructured":"Kundalwal, M. K., Chatterjee, K., & Singh, A. (2019). An improved privacy preservation technique in health-cloud. ICT Express,5(3), 167\u2013172.","journal-title":"ICT Express"},{"issue":"10","key":"7320_CR5","doi-asserted-by":"publisher","first-page":"1667","DOI":"10.1109\/TIFS.2014.2346023","volume":"9","author":"K Liang","year":"2014","unstructured":"Liang, K., et al. (2014). A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing. IEEE Transactions on Information Forensics and Security,9(10), 1667\u20131680.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7320_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.04.016","author":"JV Bibal-Benifa","year":"2018","unstructured":"Bibal-Benifa, J. V., & Dharma, D. (2018). A hybrid auto-scaler for resource scaling in cloud environment. Journal of Parallel and Distributed Computing. https:\/\/doi.org\/10.1016\/j.jpdc.2018.04.016.","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"7320_CR7","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks,76, 146\u2013164.","journal-title":"Computer Networks"},{"key":"7320_CR8","doi-asserted-by":"publisher","unstructured":"Raigoza, J., & Jituri, K. (2016). Evaluating performance of symmetric encryption algorithms. In 2016 international conference on computational science and computational intelligence (CSCI). https:\/\/doi.org\/10.1109\/csci.2016.0258.","DOI":"10.1109\/csci.2016.0258"},{"key":"7320_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77839-6_12","author":"NK Sehgal","year":"2018","unstructured":"Sehgal, N. K., & Bhatt, P. C. P. (2018). Future trends in cloud computing. Cloud Computing. https:\/\/doi.org\/10.1007\/978-3-319-77839-6_12.","journal-title":"Cloud Computing"},{"issue":"1","key":"7320_CR10","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.clsr.2017.05.021","volume":"34","author":"A Romanou","year":"2018","unstructured":"Romanou, A. (2018). The necessity of the implementation of privacy by design in sectors where data protection concerns arise. Computer Law and Security Review,34(1), 99\u2013110.","journal-title":"Computer Law and Security Review"},{"key":"7320_CR11","unstructured":"Rosario, B., & Hearst, M. A. (2014). Classifying semantic relations in bioscience texts. In Proceedings of the 42nd annual meeting of the association for computational linguistics (ACL 2004). Association for Computational Linguistics 2004. http:\/\/biotext.berkeley.edu\/dis_treat_data.html."},{"key":"7320_CR12","unstructured":"Twenty Newsgroup Dataset. https:\/\/archive.ics.uci.edu\/ml\/datasets\/Twenty+Newsgroups."},{"key":"7320_CR13","unstructured":"Reuters 21578 Dataset. https:\/\/archive.ics.uci.edu\/ml\/datasets\/Reuters-21578+Text+Categorization+Collection."},{"issue":"4","key":"7320_CR14","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/TSC.2011.39","volume":"5","author":"S Caton","year":"2012","unstructured":"Caton, S., Bubendorfer, K., Chard, K., & Rana, O. F. (2012). Social cloud computing: A vision for socially motivated resource sharing. IEEE Transactions on Services Computing,5(4), 551\u2013563.","journal-title":"IEEE Transactions on Services Computing"},{"issue":"6","key":"7320_CR15","doi-asserted-by":"publisher","first-page":"1182","DOI":"10.1109\/tpds.2012.331","volume":"24","author":"X Liu","year":"2013","unstructured":"Liu, X., Zhang, Y., Wang, B., & Yan, J. (2013). Mona: Secure multi-owner data sharing for dynamic groups in the cloud. IEEE Transactions on Parallel and Distributed Systems,24(6), 1182\u20131191. https:\/\/doi.org\/10.1109\/tpds.2012.331.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"2","key":"7320_CR16","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1109\/tpds.2013.112","volume":"25","author":"C-K Chu","year":"2014","unstructured":"Chu, C.-K., Chow, S. S. M., Tzeng, W.-G., Zhou, J., & Deng, R. H. (2014). Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Transactions on Parallel and Distributed Systems,25(2), 468\u2013477. https:\/\/doi.org\/10.1109\/tpds.2013.112.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"8","key":"7320_CR17","doi-asserted-by":"publisher","first-page":"2374","DOI":"10.1109\/tc.2015.2389959","volume":"65","author":"B Cui","year":"2016","unstructured":"Cui, B., Liu, Z., & Wang, L. (2016). Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage. IEEE Transactions on Computers,65(8), 2374\u20132385. https:\/\/doi.org\/10.1109\/tc.2015.2389959.","journal-title":"IEEE Transactions on Computers"},{"issue":"4","key":"7320_CR18","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1109\/TDSC.2012.26","volume":"9","author":"S Sundareswaran","year":"2012","unstructured":"Sundareswaran, S., Squicciarini, A. C., & Lin, D. (2012). Ensuring distributed accountability for data sharing in the cloud. IEEE Transactions on Dependable and Secure Computing,9(4), 556\u2013568.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"4","key":"7320_CR19","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1109\/tifs.2017.2774439","volume":"13","author":"J Shen","year":"2018","unstructured":"Shen, J., Zhou, T., Chen, X., Li, J., & Susilo, W. (2018). Anonymous and traceable group data sharing in cloud computing. IEEE Transactions on Information Forensics and Security,13(4), 912\u2013925. https:\/\/doi.org\/10.1109\/tifs.2017.2774439.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7320_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.knosys.2018.08.017","volume":"164","author":"SA Abdel Hameed","year":"2019","unstructured":"Abdel Hameed, S. A., Moussa, S. M., & Khalifa, M. E. (2019). Restricted sensitive attributes-based sequential anonymization (RSA-SA) approach for privacy-preserving data stream publishing. Knowledge-Based Systems,164, 1\u201320.","journal-title":"Knowledge-Based Systems"},{"issue":"3","key":"7320_CR21","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s11390-010-9333-1","volume":"25","author":"H Wang","year":"2010","unstructured":"Wang, H. (2010). Privacy-preserving data sharing in cloud computing. Journal of Computer Science and Technology,25(3), 401\u2013414. https:\/\/doi.org\/10.1007\/s11390-010-9333-1.","journal-title":"Journal of Computer Science and Technology"},{"key":"7320_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2017.2786247","author":"W Ding","year":"2017","unstructured":"Ding, W., Yan, Z., & Deng, R. (2017). Privacy-preserving data processing with flexible access control. IEEE Transactions on Dependable and Secure Computing. https:\/\/doi.org\/10.1109\/tdsc.2017.2786247.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"6","key":"7320_CR23","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1109\/tpds.2012.238","volume":"24","author":"X Zhang","year":"2013","unstructured":"Zhang, X., Liu, C., Nepal, S., Pandey, S., & Chen, J. (2013). A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate datasets in cloud. IEEE Transactions on Parallel and Distributed Systems,24(6), 1192\u20131202. https:\/\/doi.org\/10.1109\/tpds.2012.238.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"1","key":"7320_CR24","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TCC.2014.2299807","volume":"2","author":"B Wang","year":"2014","unstructured":"Wang, B., Li, B., & Li, H. (2014). Oruta: Privacy-preserving public auditing for shared data in the cloud. IEEE Transactions on Cloud Computing,2(1), 43\u201356. https:\/\/doi.org\/10.1109\/TCC.2014.2299807.","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"1","key":"7320_CR25","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/tce.2012.6170060","volume":"58","author":"R Sanchez","year":"2012","unstructured":"Sanchez, R., Almenares, F., Arias, P., Diaz-Sanchez, D., & Marin, A. (2012). Enhancing privacy and dynamic federation in IdM for consumer cloud computing. IEEE Transactions on Consumer Electronics,58(1), 95\u2013103. https:\/\/doi.org\/10.1109\/tce.2012.6170060.","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"2","key":"7320_CR26","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1109\/tmc.2011.32","volume":"11","author":"K Mehta","year":"2012","unstructured":"Mehta, K., Liu, D., & Wright, M. (2012). Protecting location privacy in sensor networks against a global eavesdropper. IEEE Transactions on Mobile Computing,11(2), 320\u2013336. https:\/\/doi.org\/10.1109\/tmc.2011.32.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"7320_CR27","unstructured":"Hassan, F., Domingo-Ferrer, J., & Soria-Comas, J. (2018). Anonymization of unstructured data via named-entity recognition. In International conference on modeling decisions for artificial intelligence (pp. 296\u2013305). Cham: Springer."},{"key":"7320_CR28","doi-asserted-by":"publisher","DOI":"10.1186\/2047-2501-2-3","author":"W Raghupathi","year":"2014","unstructured":"Raghupathi, W., & Raghupathi, V. (2014). Big data analytics in healthcare: Promise and potential. Health Information Science and Systems. https:\/\/doi.org\/10.1186\/2047-2501-2-3.","journal-title":"Health Information Science and Systems"},{"issue":"05","key":"7320_CR29","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/s021848850200165x","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L. (2002). Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems,10(05), 571\u2013588. https:\/\/doi.org\/10.1142\/s021848850200165x.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"issue":"1","key":"7320_CR30","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2013","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2013). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems,25(1), 222\u2013233.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"3","key":"7320_CR31","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.12785\/amis\/080321","volume":"8","author":"X Yang","year":"2014","unstructured":"Yang, X., Ma, T., Tang, M., & Tian, W. (2014). A survey of privacy preserving data publishing using generalization and suppression. Applied Mathematics and Information Sciences,8(3), 1103\u20131116.","journal-title":"Applied Mathematics and Information Sciences"},{"issue":"5\u20136","key":"7320_CR32","doi-asserted-by":"publisher","first-page":"1158","DOI":"10.1007\/s10618-014-0346-1","volume":"28","author":"S Hajian","year":"2014","unstructured":"Hajian, S., Domingo-Ferrer, J., & Orio, F. (2014). Generalization-based privacy preservation and discrimination prevention in data publishing and mining. Data Mining and Knowledge Discovery,28(5\u20136), 1158\u20131188.","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"1","key":"7320_CR33","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/s10618-011-0235-9","volume":"25","author":"B Kenig","year":"2012","unstructured":"Kenig, B., & Tassa, T. (2012). A practical approximation algorithm for optimal k-anonymity. Data Mining and Knowledge Discovery,25(1), 134\u2013168.","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"1","key":"7320_CR34","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s41019-017-0046-0","volume":"3","author":"N Singh","year":"2018","unstructured":"Singh, N., & Singh, A. K. (2018). Data privacy protection mechanisms in cloud. Data Science and Engineering,3(1), 24\u201339.","journal-title":"Data Science and Engineering"},{"issue":"10","key":"7320_CR35","doi-asserted-by":"publisher","first-page":"2298","DOI":"10.1109\/TIFS.2016.2532839","volume":"11","author":"J Hua","year":"2016","unstructured":"Hua, J., Tang, A., Fang, Y., Shen, Z., & Zhong, S. (2016). Privacy-preserving utility verification of the data published by non-interactive differentially private mechanisms. IEEE Transactions on Information Forensics and Security,11(10), 2298\u20132311.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"6","key":"7320_CR36","doi-asserted-by":"publisher","first-page":"1418","DOI":"10.1109\/TIFS.2017.2663337","volume":"12","author":"J Soria-Comas","year":"2017","unstructured":"Soria-Comas, J., Domingo-Ferrer, J., Sanchez, D., & Megias, D. (2017). Individual differential privacy: A utility-preserving formulation of differential privacy guarantees. IEEE Transactions on Information Forensics and Security,12(6), 1418\u20131429.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7320_CR37","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.jnca.2018.02.009","volume":"108","author":"P Kumar","year":"2018","unstructured":"Kumar, P., & Alphonse, P. J. A. (2018). Attribute based encryption in cloud computing: A survey, gap analysis, and future directions. Journal of Network and Computer Applications,108, 37\u201352.","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"7320_CR38","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s00236-010-0131-6","volume":"48","author":"KM Enamul","year":"2011","unstructured":"Enamul, K. M., Wang, H., & Bertino, E. (2011). Efficient systematic clustering method for k-anonymization. Acta Informatica,48(1), 51\u201366.","journal-title":"Acta Informatica"},{"issue":"2","key":"7320_CR39","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s10115-010-0354-4","volume":"28","author":"G Loukides","year":"2011","unstructured":"Loukides, G., Gkoulalas-Divanis, A., & Malin, B. (2011). COAT: Constraint-based anonymization of transactions. Knowledge and Information Systems,28(2), 251\u2013281.","journal-title":"Knowledge and Information Systems"},{"key":"7320_CR40","unstructured":"Centre for Advanced Computing and Research, Noorul Islam Centre for Higher Education. http:\/\/nichecloud.in\/."},{"issue":"2","key":"7320_CR41","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.jksuci.2016.06.001","volume":"30","author":"YR Kulkarni","year":"2018","unstructured":"Kulkarni, Y. R., & Murugan, T. S. (2018). C-mixture and multi-constraints based genetic algorithm for collaborative data publishing. Journal of King Saud University\u2014Computer and Information Sciences,30(2), 175\u2013184.","journal-title":"Journal of King Saud University\u2014Computer and Information Sciences"},{"key":"7320_CR42","unstructured":"Meyer-Baese A., & Schmid, V. (2014). In Pattern recognition and signal analysis in medical imaging (2nd edn)."},{"key":"7320_CR43","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili, S., Mirjalili, S. M., & Lewis, A. (2014). Grey wolf optimizer. Advances in Engineering Software,69, 46\u201361.","journal-title":"Advances in Engineering Software"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07320-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07320-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07320-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T23:05:38Z","timestamp":1618009538000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07320-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,10]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["7320"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07320-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,10]]},"assertion":[{"value":"10 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}