Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions

I Gupta, AK Singh, CN Lee, R Buyya - IEEE Access, 2022 - ieeexplore.ieee.org
A large number of researchers, academia, government sectors, and business enterprises
are adopting the cloud environment due to the least upfront capital investment, maximum …

[PDF][PDF] 大数据安全与隐私保护

冯登国, 张敏, 李昊 - 2014 - cjc.ict.ac.cn
摘要大数据(Big Data) 已成为学术界和产业界的研究热点, 正影响着人们日常生活,
工作习惯及思考方式. 但是目前大数据在收集, 存储和使用过程中面临着诸多安全风险 …

A survey of big data security and privacy preserving

W Fang, XZ Wen, Y Zheng, M Zhou - IETE Technical Review, 2017 - Taylor & Francis
Nowadays, big data has become ubiquitous. Big data contains great value and chance.
However, big data also brings many security risks and privacy-preserving problems. Security …

Data leakage detection

P Papadimitriou, H Garcia-Molina - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
We study the following problem: A data distributor has given sensitive data to a set of
supposedly trusted agents (third parties). Some of the data are leaked and found in an …

Fingerprinting relational databases: Schemes and specialties

Y Li, V Swarup, S Jajodia - IEEE Transactions on Dependable …, 2005 - ieeexplore.ieee.org
In this paper, we present a technique for fingerprinting relational data by extending Agrawal
et al.'s watermarking scheme. The primary new capability provided by our scheme is that …

Watermarking relational databases using optimization-based techniques

M Shehab, E Bertino, A Ghafoor - IEEE transactions on …, 2007 - ieeexplore.ieee.org
Proving ownership rights on outsourced relational databases is a crucial issue in today's
internet-based application environments and in many content distribution applications. In …

Privacy and ownership preserving of outsourced medical data

E Bertino, BC Ooi, Y Yang… - … Conference on Data …, 2005 - ieeexplore.ieee.org
The demand for the secondary use of medical data is increasing steadily to allow for the
provision of better quality health care. Two important issues pertaining to this sharing of data …

Privacy preserving decision tree learning over multiple parties

F Emekçi, OD Sahin, D Agrawal, A El Abbadi - Data & Knowledge …, 2007 - Elsevier
Data mining over multiple data sources has emerged as an important practical problem with
applications in different areas such as data streams, data-warehouses, and bioinformatics …

On the properties of non-media digital watermarking: a review of state of the art techniques

AS Panah, R Van Schyndel, T Sellis, E Bertino - IEEE Access, 2016 - ieeexplore.ieee.org
Over the last 25 years, there has been much work on multimedia digital watermarking. In this
domain, the primary limitation to watermark strength has been in its visibility. For multimedia …

A new robust approach for reversible database watermarking with distortion control

D Hu, D Zhao, S Zheng - IEEE Transactions on Knowledge and …, 2018 - ieeexplore.ieee.org
Nowadays information is crucial in many fields such as medicine, science and business,
where databases are used effectively for information sharing. However, the databases face …