[go: up one dir, main page]

Domingo-Ferrer et al., 2020 - Google Patents

Outsourcing analyses on privacy-protected multivariate categorical data stored in untrusted clouds

Domingo-Ferrer et al., 2020

View PDF
Document ID
872681256844540497
Author
Domingo-Ferrer J
Sanchez D
Ricci S
Munoz-Batista M
Publication year
Publication venue
Knowledge and Information Systems

External Links

Snippet

Outsourcing data storage and computation to the cloud is appealing due to the cost savings it entails. However, when the data to be outsourced contain private information, appropriate protection mechanisms should be implemented by the data controller. Data splitting, which …
Continue reading at crises-deim.urv.cat (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Similar Documents

Publication Publication Date Title
Vaidya et al. Privacy-preserving data mining: Why, how, and when
Li et al. Toward privacy-assured and searchable cloud data storage services
Pramanik et al. Privacy preserving big data analytics: A critical analysis of state‐of‐the‐art
US7500111B2 (en) Querying encrypted data in a relational database system
Xie et al. Achieving privacy-preserving online diagnosis with outsourced SVM in internet of medical things environment
Park et al. Privacy Preserving k‐Nearest Neighbor for Medical Diagnosis in e‐Health Cloud
Hua et al. CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud
Chida et al. Implementation and evaluation of an efficient secure computation system using ‘R’for healthcare statistics
Le et al. Privacy preserving jaccard similarity by cloud-assisted for classification
Sui et al. A privacy-preserving approach for multimodal transaction data integrated analysis
Kulkarni et al. Optimized key generation-based privacy preserving data mining model for secure data publishing
Abdel Wahab et al. DARM: a privacy-preserving approach for distributed association rules mining on horizontally-partitioned data
Bibal Benifa et al. Privacy based data publishing model for cloud computing environment
Śmietanka et al. Federated learning for privacy-preserving data access
Pozi et al. A Kernel Density Estimation Method to Generate Synthetic Shifted Datasets in Privacy-Preserving Task.
George et al. Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud
Fugkeaw et al. SSF-CDW: achieving scalable, secure, and fast OLAP query for encrypted cloud data warehouse
Domingo-Ferrer et al. Outsourcing analyses on privacy-protected multivariate categorical data stored in untrusted clouds
Zhou et al. Privacy-preserving image retrieval with multi-modal query
Ricci et al. Privacy-preserving cloud-based statistical analyses on sensitive categorical data
Torra et al. Data privacy: A survey of results
Lin et al. A Privacy‐Preserving Intelligent Medical Diagnosis System Based on Oblivious Keyword Search
Nagendra Prabhu et al. Fractional-ant lion optimization algorithm for privacy protection in cloud with MapReduce framework
Kavitha et al. A survey on Homomorphic encryption in cloud security
Banerjee et al. A generic and distributed privacy preserving classification method with a worst-case privacy guarantee