Efficient computation on oblivious RAMs
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
Journal of the ACM (JACM)
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Privacy Preserving Data Mining
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Hiding Association Rules by Using Confidence and Support
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Transforming data to satisfy privacy constraints
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Disclosure Limitation of Sensitive Rules
KDEX '99 Proceedings of the 1999 Workshop on Knowledge and Data Engineering Exchange
Privacy preserving frequent itemset mining
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
IEEE Transactions on Knowledge and Data Engineering
State-of-the-art in privacy preserving data mining
ACM SIGMOD Record
Order preserving encryption for numeric data
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
On k-anonymity and the curse of dimensionality
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Personalization technologies: a process-oriented perspective
Communications of the ACM - The digital society
A Framework for Evaluating Privacy Preserving Data Mining Algorithms*
Data Mining and Knowledge Discovery
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Power strips, prophylactics, and privacy, oh my!
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Anatomy: simple and effective privacy preservation
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Privacy-enhanced personalization
Communications of the ACM
Auditing to keep online storage services honest
HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems
Proceedings of the fourth international conference on Communities and technologies
On the tradeoff between privacy and utility in data publishing
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
A Survey on Privacy Preserving Data Mining
DBTA '09 Proceedings of the 2009 First International Workshop on Database Technology and Applications
Computing arbitrary functions of encrypted data
Communications of the ACM
A Privacy Manager for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures
DASC '09 Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
How Internet Users' Privacy Concerns Have Evolved since 2002
IEEE Security and Privacy
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
Content cloaking: preserving privacy with Google Docs and other web applications
Proceedings of the 2010 ACM Symposium on Applied Computing
Privacy-preserving public auditing for data storage security in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
Empirical models of privacy in location sharing
Proceedings of the 12th ACM international conference on Ubiquitous computing
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
SRDS '10 Proceedings of the 2010 29th IEEE Symposium on Reliable Distributed Systems
Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
A comprehensive framework for secure query processing on relational data in the cloud
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Scrutable adaptation: because we can and must
AH'06 Proceedings of the 4th international conference on Adaptive Hypermedia and Adaptive Web-Based Systems
Slicing: A New Approach for Privacy Preserving Data Publishing
IEEE Transactions on Knowledge and Data Engineering
Information driven evaluation of data hiding algorithms
DaWaK'05 Proceedings of the 7th international conference on Data Warehousing and Knowledge Discovery
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
PersonisJ: mobile, client-side user modelling
UMAP'10 Proceedings of the 18th international conference on User Modeling, Adaptation, and Personalization
The HybrEx model for confidentiality and privacy in cloud computing
HotCloud'11 Proceedings of the 3rd USENIX conference on Hot topics in cloud computing
Communications of the ACM
Revisiting the computational practicality of private information retrieval
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
User Modeling and User-Adapted Interaction
A privacy preserving authorisation system for the cloud
Journal of Computer and System Sciences
Privacy Preserving Access Control with Authentication for Securing Data in Clouds
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing
TRUSTCOM '12 Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
Management and search of private data on storage clouds
Proceedings of the Workshop on Secure and Dependable Middleware for Cloud Monitoring and Management
Hi-index | 0.00 |
With advancements in hardware and software capabilities, cloud computing has evolved into a widely utilized paradigm for pay per use and robust computation. An unparalleled repository of user sensitive data that resides on the cloud poses severe threat to the privacy of individuals. Users authenticate, store and perform computations on their data using cloud services. From the cloud's perspective, it gathers additional user data via ubiquitous devices, mines this information to offer personalized services like recommendations and disseminates the results. However, the interactions between the cloud and user at each stage of this pipeline development is limited by privacy concerns. In recent years, much work has been done on designing privacy preserving approaches for improving cloud security and the trust network. A wide array of data mining, cryptography and information hiding techniques have been applied to cater to different aspects of providing risk free work environment in the cloud. Given the lack of management of this information, a systematic investigation is required to structurally organize the topics studied. This paper aims to clearly portray the stringent and urgent need for applying privacy preserving approaches to the cloud and highlight the relevant work that has been done along these lines. The key objective is to identify important areas of user-cloud interaction and demonstrate a survey on the state of the art algorithms that have led to improved cloud privacy in these areas The focus is on exploring criteria for the impact of such approaches on user cloud interaction. An understanding of the research issues associated with these sensitive areas of cloud computing may enable us to better leverage benefits of the cloud and reflect on future possibilities of exploration.