Domingo-Ferrer et al., 2020 - Google Patents
Outsourcing analyses on privacy-protected multivariate categorical data stored in untrusted cloudsDomingo-Ferrer et al., 2020
View PDF- Document ID
- 872681256844540497
- Author
- Domingo-Ferrer J
- Sanchez D
- Ricci S
- Munoz-Batista M
- Publication year
- Publication venue
- Knowledge and Information Systems
External Links
Snippet
Outsourcing data storage and computation to the cloud is appealing due to the cost savings it entails. However, when the data to be outsourced contain private information, appropriate protection mechanisms should be implemented by the data controller. Data splitting, which …
- 238000004450 types of analysis 0 title abstract description 29
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Vaidya et al. | Privacy-preserving data mining: Why, how, and when | |
| Li et al. | Toward privacy-assured and searchable cloud data storage services | |
| Pramanik et al. | Privacy preserving big data analytics: A critical analysis of state‐of‐the‐art | |
| US7500111B2 (en) | Querying encrypted data in a relational database system | |
| Xie et al. | Achieving privacy-preserving online diagnosis with outsourced SVM in internet of medical things environment | |
| Park et al. | Privacy Preserving k‐Nearest Neighbor for Medical Diagnosis in e‐Health Cloud | |
| Hua et al. | CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud | |
| Chida et al. | Implementation and evaluation of an efficient secure computation system using ‘R’for healthcare statistics | |
| Le et al. | Privacy preserving jaccard similarity by cloud-assisted for classification | |
| Sui et al. | A privacy-preserving approach for multimodal transaction data integrated analysis | |
| Kulkarni et al. | Optimized key generation-based privacy preserving data mining model for secure data publishing | |
| Abdel Wahab et al. | DARM: a privacy-preserving approach for distributed association rules mining on horizontally-partitioned data | |
| Bibal Benifa et al. | Privacy based data publishing model for cloud computing environment | |
| Śmietanka et al. | Federated learning for privacy-preserving data access | |
| Pozi et al. | A Kernel Density Estimation Method to Generate Synthetic Shifted Datasets in Privacy-Preserving Task. | |
| George et al. | Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud | |
| Fugkeaw et al. | SSF-CDW: achieving scalable, secure, and fast OLAP query for encrypted cloud data warehouse | |
| Domingo-Ferrer et al. | Outsourcing analyses on privacy-protected multivariate categorical data stored in untrusted clouds | |
| Zhou et al. | Privacy-preserving image retrieval with multi-modal query | |
| Ricci et al. | Privacy-preserving cloud-based statistical analyses on sensitive categorical data | |
| Torra et al. | Data privacy: A survey of results | |
| Lin et al. | A Privacy‐Preserving Intelligent Medical Diagnosis System Based on Oblivious Keyword Search | |
| Nagendra Prabhu et al. | Fractional-ant lion optimization algorithm for privacy protection in cloud with MapReduce framework | |
| Kavitha et al. | A survey on Homomorphic encryption in cloud security | |
| Banerjee et al. | A generic and distributed privacy preserving classification method with a worst-case privacy guarantee |