{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T04:38:17Z","timestamp":1747802297377,"version":"3.41.0"},"publisher-location":"New York, NY","reference-count":46,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781493920914"},{"type":"electronic","value":"9781493920921"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-1-4939-2092-1_34","type":"book-chapter","created":{"date-parts":[[2015,3,16]],"date-time":"2015-03-16T09:30:47Z","timestamp":1426498247000},"page":"1029-1043","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy in Data Centers: A Survey of Attacks and Countermeasures"],"prefix":"10.1007","author":[{"given":"Luis Javier","family":"Garc\u00eda Villalba","sequence":"first","affiliation":[]},{"given":"Alejandra Guadalupe","family":"Silva Trujillo","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Portela","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,17]]},"reference":[{"issue":"3","key":"34_CR1","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MSP.2013.66","volume":"11","author":"B. Krishnamurthy","year":"2013","unstructured":"Krishnamurthy, B.: Privacy and Online Social Networks: Can Colorless Green Ideas Sleep Furiously? IEEE Security Privacy 11(3) (May 2013) 14\u201320","journal-title":"IEEE Security Privacy"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Dey, R., Jelveh, Z., Ross, K.: Facebook Users Have Become Much More Private: A Large-Scale Study. In: IEEE International Conference on Pervasive Computing and Communications Workshops. (19\u201323 March 2012) 346\u2013352","DOI":"10.1109\/PerComW.2012.6197508"},{"issue":"3","key":"34_CR3","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1089\/cpb.2008.0226","volume":"12","author":"E. Christofides","year":"2013","unstructured":"Christofides, E., Desmarais, A.M.S.: Information Disclosure and Control on Facebook: Are They Two Sides of the Same Coin or Two Different Processes? CyberPsychology & Behavior 12(3) (June 2013) 341\u2013345","journal-title":"CyberPsychology & Behavior"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information Revelation and Privacy in Online Social Networks. In: 2005 ACM Workshop on Privacy in the Electronic Society, ACM (2005) 71\u201380","DOI":"10.1145\/1102199.1102214"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Goldberg, I., Wagner, D., Brewer, E.: Privacy-enhancing technologies for the Internet. In: IEEE Compcon'97. (February 23\u201326 1997) 103\u2013109","DOI":"10.21236\/ADA385546"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Goldberg, I.: Privacy-Enhancing Technologies for the Internet, II: Five Years Later. In: Second International Workshop on Privacy Enhancing Technologies. (April 14\u201315 2003) 1\u201312","DOI":"10.1007\/3-540-36467-6_1"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Goldberg, I.: Privacy Enhancing Technologies for the Internet III: Ten Years Later. In: Digital Privacy: Theory, Technologies and Practices, Auerbach Publications (December 2007) 3\u201318","DOI":"10.1201\/9781420052183.ch1"},{"key":"34_CR8","unstructured":"Westin, A.F.: Privacy and Freedom. The Bodley Head Ltd (1997)"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"R. Gellman, P.D.: Online Privacy: A Reference Handbook. ABC-CLIO (2011)","DOI":"10.5040\/9798400693366"},{"issue":"4","key":"34_CR10","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1145\/1053291.1053295","volume":"48","author":"B. Berendt","year":"2005","unstructured":"Berendt, B., G\u00fcnther, O., Spiekermann, S.: Privacy in e-Commerce: Stated Preferences vs. Actual Behavior. Communications of the ACM 48(4) (April 2005) 101\u2013106","journal-title":"Communications of the ACM"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-Anonymizing Social Networks. In: IEEE Symposium on Security and Privacy, Washington, DC, USA, IEEE Computer Society (2009) 173\u2013187","DOI":"10.1109\/SP.2009.22"},{"key":"34_CR12","unstructured":"Commission, E.: Privacy Enhancing Technologies (PETs): The Existing Legal Framework (May 2007)"},{"key":"34_CR13","unstructured":"Fritsch, L.: State of the Art of Privacy-Enhancing Technology (PET). Technical report, Norsk Regnesentral, Norwegian Computing Center (2007)"},{"key":"34_CR14","unstructured":"Group, M.: Privacy Enhancing Technologies\". Technical report, Ministry of Science, Technology and Innovation (March 2005)"},{"issue":"1","key":"34_CR15","first-page":"35","volume":"3","author":"C. Adams","year":"2006","unstructured":"Adams, C.: A Classification for Privacy Techniques. University of Ottawa Law & Technology Journal 3(1) (July 2006) 35\u201352","journal-title":"University of Ottawa Law & Technology Journal"},{"key":"34_CR16","unstructured":"Pfitzmann, A., Hansen, M.: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management: A Consolidated Proposal for Terminology. http:\/\/dud.inf.tu-dresden.de\/Anon_Terminology.shtml (February 2008) v0.31."},{"issue":"3","key":"34_CR17","doi-asserted-by":"publisher","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"D.J. Solove","year":"2006","unstructured":"Solove, D.J.: A Classification for Privacy Techniques. University of Pennsylvania Law Review 154(3) (January 2006) 477\u2013560","journal-title":"University of Pennsylvania Law Review"},{"key":"34_CR18","unstructured":"Diaz, C., G\u00fcrses, S.: Understanding the Landscape of Privacy Technologies. In: The 13th International Conference on Information Security (Information Security Summit). (2012) 1\u20136"},{"issue":"2","key":"34_CR19","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D.L. Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of ACM 24(2) (February 1981) 84\u201390","journal-title":"Communications of ACM"},{"issue":"1","key":"34_CR20","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M.K. Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1) (November 1998) 66\u201392","journal-title":"ACM Transactions on Information and System Security"},{"issue":"3","key":"34_CR21","doi-asserted-by":"crossref","first-page":"213","DOI":"10.3233\/JCS-2002-10302","volume":"10","author":"B.N. Levine","year":"2002","unstructured":"Levine, B.N., Shields, C.: Hordes: A Multicast Based Protocol for Anonymity. Journal of Computer Security 10(3) (September 2002) 213\u2013240","journal-title":"Journal of Computer Security"},{"key":"34_CR22","unstructured":"Gulcu, C., Tsudik, G.: Mixing Email with Babel. In: Symposium on Network and Distributed System Security, Washington, DC, USA, IEEE Computer Society (1996) 1\u201315"},{"key":"34_CR23","doi-asserted-by":"crossref","unstructured":"Berthold, O., Federrath, H., Kopsell, S.: Web MIXes: A System for Anonymous and Unobservable Internet Access. In: International Workshop On Designing Privacy Enhancing Technologies: Design Issues In Anonymity And Unobservability, Springer-Verlag New York, Inc. (2001) 115\u2013129","DOI":"10.1007\/3-540-44702-4_7"},{"key":"34_CR24","doi-asserted-by":"crossref","unstructured":"Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: First International Workshop on Information Hiding, London, UK, UK, Springer-Verlag (May 30 - June 1 1996) 137\u2013150","DOI":"10.1007\/3-540-61996-8_37"},{"key":"34_CR25","unstructured":"Back, A., Goldberg, I., Shostack, A.: Freedom Systems 2.1 Security Issues and Analysis (May 2001)"},{"key":"34_CR26","unstructured":"Back, A., Goldberg, I., Shostack, A.: I2P (2003)"},{"key":"34_CR27","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-generation Onion Router. In: 13th Conference on USENIX Security Symposium - Volume\u00a013, Berkeley, CA, USA, USENIX Association (2004) 21\u201321","DOI":"10.21236\/ADA465464"},{"key":"34_CR28","doi-asserted-by":"crossref","unstructured":"Loesing, K.: Privacy-Enhancing Technologies for Private Services. PhD thesis, University of Bamberg (2009)","DOI":"10.20378\/irb-204"},{"issue":"1","key":"34_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1592451.1592456","volume":"42","author":"M. Edman","year":"2009","unstructured":"Edman, M., Yener, B.: On Anonymity in an Electronic Society: A Survey of Anonymous Communication Systems. ACM Computing Surveys 42(1) (December 2009) 1\u201335","journal-title":"ACM Computing Surveys"},{"issue":"1","key":"34_CR30","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/1672308.1672325","volume":"40","author":"T. Benson","year":"2010","unstructured":"Benson, T., Anand, A., Akella, A., Zhang, M.: Understanding Data Center Traffic Characteristics. ACM SIGCOMM Computer Communication Review 40(1) (January 2010) 92\u201399","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"34_CR31","doi-asserted-by":"crossref","unstructured":"Pang, R., Allman, M., Bennett, M., Lee, J., Paxson, V., Tierney, B.: A First Look at Modern Enterprise Traffic. In: 5th ACM SIGCOMM Conference on Internet Measurement, Berkeley, CA, USA, USENIX Association (October 19-21 2005) 2\u20132","DOI":"10.1145\/1330107.1330110"},{"key":"34_CR32","doi-asserted-by":"crossref","unstructured":"Guha, S., Chandrashekar, J., Taft, N., Papagiannaki, K.: How Healthy Are Today\u2019s Enterprise Networks? In: 8th ACM SIGCOMM Conference on Internet Measurement, New York, NY, USA, ACM (October 20-22 2008) 145\u2013150","DOI":"10.1145\/1452520.1452538"},{"key":"34_CR33","doi-asserted-by":"crossref","unstructured":"Kandula, S., Sengupta, S., Greenberg, A., Patel, P., Chaiken, R.: The Nature of Data Center Traffic: Measurements & Analysis. In: 9th ACM SIGCOMM Conference on Internet Measurement Conference, New York, NY, USA, ACM (November 4-6 2009) 202\u2013208","DOI":"10.1145\/1644893.1644918"},{"key":"34_CR34","unstructured":"Greenberg, A., Maltz, D.A.: What Goes Into a Data Center? (2009)"},{"key":"34_CR35","unstructured":"Balakrishnan, M.: Reliable Communication for Datacenters. PhD thesis, Cornell University (September 2008)"},{"key":"34_CR36","doi-asserted-by":"crossref","unstructured":"Raymond, J.F.: Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems. In: International Workshop On Design Issues In Anonymity And Unobservability, Springer-Verlag New York, Inc. (July 25-26 2000) 10\u201329","DOI":"10.1007\/3-540-44702-4_2"},{"key":"34_CR37","doi-asserted-by":"crossref","unstructured":"Kedogan, D., Agrawal, D., Penz, S.: Limits of Anonymity in Open Environments. In: 5th International Workshop on Information Hiding, London, UK, UK, Springer-Verlag (October 7\u20139 2002) 53\u201369","DOI":"10.1007\/3-540-36415-3_4"},{"issue":"6","key":"34_CR38","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MSECP.2003.1253565","volume":"1","author":"D. Agrawal","year":"2003","unstructured":"Agrawal, D., Kesdogan, D.: Measuring Anonymity: The Disclosure Attack. IEEE Security Privacy 1(6) (2003) 27\u201334","journal-title":"IEEE Security Privacy"},{"key":"34_CR39","doi-asserted-by":"crossref","unstructured":"Danezis, G.: Statistical Disclosure Attacks: Traffic Confirmation in Open Environments. In: IFIP Advances in Information and Communication Technology, Kluwer (2003) 421\u2013426","DOI":"10.1007\/978-0-387-35691-4_40"},{"key":"34_CR40","doi-asserted-by":"crossref","unstructured":"Danezis, G., Serjantov, A.: Statistical Disclosure or Intersection Attacks on Anonymity Systems. In: 6th Information Hiding Workshop. (May 23\u201325 2004) 293\u2013308","DOI":"10.1007\/978-3-540-30114-1_21"},{"key":"34_CR41","doi-asserted-by":"crossref","unstructured":"Mathewson, N., Dingledine, R.: Practical Traffic Analysis: Extending and Resisting Statistical Disclosure. In: 4th International Conference on Privacy Enhancing Technologies. (May 23-25 2004) 17\u201334","DOI":"10.1007\/11423409_2"},{"key":"34_CR42","doi-asserted-by":"crossref","unstructured":"Danezis, G., Diaz, C., Troncoso, C.: Two-sided Statistical Disclosure Attack. In: 7th International Conference on Privacy Enhancing Technologies, Berlin, Heidelberg, Springer-Verlag (June 20\u201322 2007) 30\u201344","DOI":"10.1007\/978-3-540-75551-7_3"},{"key":"34_CR43","first-page":"185","volume":"174","author":"R. Brigham","year":"2005","unstructured":"Brigham, R., Harary, F., Violin, E., Yellen, J.: Perfect-Matching Preclusion. Congressus Numerantium 174 (2005) 185\u2013192","journal-title":"Congressus Numerantium"},{"key":"34_CR44","first-page":"2632","volume":"410","author":"J.H. Park","year":"2009","unstructured":"Park, J.H., Son, S.H.: Conditional Matching Preclusion for Hypercube-like Interconnection Networks. Theoretical Computer Science 410(27\u201329) (June 2009) 2632\u20132640","journal-title":"Computer Science"},{"key":"34_CR45","doi-asserted-by":"crossref","unstructured":"Danezis, G., Troncoso, C.: Vida: How to use Bayesian Inference to De-anonymize Persistent Communications. In: 9th International Symposium of Privacy Enhancing Technologies, Springer Berlin Heidelberg (August 5-7 2009) 56\u201372","DOI":"10.1007\/978-3-642-03168-7_4"},{"key":"34_CR46","doi-asserted-by":"crossref","unstructured":"Al-Ameen, M., Gatz, C., Wright, M.: SDA-2H: Understanding the Value of Background Cover Against Statistical Disclosure. In: 14th International Conference on Computer and Information Technology. (December 22-24 2011) 196\u2013201","DOI":"10.1109\/ICCITechn.2011.6164783"}],"container-title":["Handbook on Data Centers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4939-2092-1_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T00:24:35Z","timestamp":1747787075000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4939-2092-1_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9781493920914","9781493920921"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-1-4939-2092-1_34","relation":{},"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}