{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:20:39Z","timestamp":1771467639378,"version":"3.50.1"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030222765","type":"print"},{"value":"9783030222772","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_2","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:02:28Z","timestamp":1577793748000},"page":"43-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An Investigation Study of Privacy Preserving in Cloud Computing Environment"],"prefix":"10.1007","author":[{"given":"Ahmed M.","family":"Manasrah","sequence":"first","affiliation":[]},{"given":"M. A.","family":"Shannaq","sequence":"additional","affiliation":[]},{"given":"M. A.","family":"Nasir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"issue":"3","key":"2_CR1","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/j.jksuci.2015.12.006","volume":"29","author":"AM Manasrah","year":"2016","unstructured":"Manasrah, A. M., Smadi, T., & ALmomani, A. (2016). A variable service broker routing policy for data center selection in cloud analyst. Journal of King Saud University-Computer and Information Sciences, 29(3), 365\u2013377.","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCC.2015.2462361","volume":"99","author":"H Zhang","year":"2015","unstructured":"Zhang, H., et al. (2015). Towards privacy preserving publishing of set-valued data on hybrid cloud. Cloud Computing, IEEE Transactions on, 99, 1\u20131.","journal-title":"Cloud Computing, IEEE Transactions on"},{"key":"2_CR3","unstructured":"Wagle, D. M. (2014). Comparative study of privacy preservation and access control of cloud data. International Journal of Engineering Research & Technology (IJERT), 3(11), 165\u2013174."},{"issue":"9","key":"2_CR4","doi-asserted-by":"publisher","first-page":"2268","DOI":"10.1109\/TKDE.2013.68","volume":"26","author":"M Nabeel","year":"2014","unstructured":"Nabeel, M., & Bertino, E. (2014). Privacy preserving delegated access control in public clouds. Knowledge and Data Engineering, IEEE Transactions on, 26(9), 2268\u20132280.","journal-title":"Knowledge and Data Engineering, IEEE Transactions on"},{"issue":"2","key":"2_CR5","first-page":"159","volume":"3","author":"MA AlSudiari","year":"2012","unstructured":"AlSudiari, M. A., & Vasista, T. (2012). Cloud computing and privacy regulations: An exploratory study on issues and implications. Advanced Computing, 3(2), 159.","journal-title":"Advanced Computing"},{"issue":"4","key":"2_CR6","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.hlpt.2013.09.003","volume":"2","author":"JJ Seddon","year":"2013","unstructured":"Seddon, J. J., & Currie, W. L. (2013). Cloud computing and trans-border health data: Unpacking US and EU healthcare regulation and compliance. Health Policy and Technology, 2(4), 229\u2013241.","journal-title":"Health Policy and Technology"},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.cose.2013.12.002","volume":"42","author":"X Dong","year":"2014","unstructured":"Dong, X., et al. (2014). Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Computers & Security, 42, 151\u2013164.","journal-title":"Computers & Security"},{"key":"2_CR8","unstructured":"Joseph, N. M., Daniel, E., & Vasanthi, N. (2013). Survey on privacy-preserving methods for storage in cloud computing. In: Amrita International Conference of Women in Computing."},{"issue":"3","key":"2_CR9","first-page":"133","volume":"3","author":"S Jogade","year":"2014","unstructured":"Jogade, S., Sharma, R., & Kadam, R. (2014). Partitioning data and domain integrity checking for storage-improving cloud storage security using data partitioning technique. International Journal of Emerging Research in Management & Technology, 3(3), 133\u2013137.","journal-title":"International Journal of Emerging Research in Management & Technology"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Chen, F., & Liu, A. X. (2014). Privacy and integrity preserving multi-dimensional range queries for cloud computing. In Networking Conference, 2014 IFIP. IEEE.","DOI":"10.1109\/IFIPNetworking.2014.6857083"},{"issue":"1","key":"2_CR11","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s10707-012-0156-9","volume":"17","author":"W-S Ku","year":"2013","unstructured":"Ku, W.-S., et al. (2013). A query integrity assurance scheme for accessing outsourced spatial databases. GeoInformatica, 17(1), 97\u2013124.","journal-title":"GeoInformatica"},{"issue":"4","key":"2_CR12","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1109\/TKDE.2011.267","volume":"25","author":"L Hu","year":"2013","unstructured":"Hu, L., et al. (2013). Spatial query integrity with Voronoi neighbors. Knowledge and Data Engineering, IEEE Transactions on, 25(4), 863\u2013876.","journal-title":"Knowledge and Data Engineering, IEEE Transactions on"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Naruchitparames, J., & G\u00fcne\u015f, M. H. (2011). Enhancing data privacy and integrity in the cloud. In High Performance Computing and Simulation (HPCS), 2011 International Conference on. IEEE.","DOI":"10.1109\/HPCSim.2011.5999856"},{"key":"2_CR14","unstructured":"Song, D. X., Wagner, D., & Perrig, A. (2000). Practical techniques for searches on encrypted data. In Security and Privacy, 2000. S&P 2000. Proceedings 2000 IEEE Symposium on. IEEE."},{"key":"2_CR15","unstructured":"Goh, E.-J. (2003). Secure indexes for efficient searching on encrypted compressed data (Technical report 2003\/216, Cryptology ePrint archive, 2003). \nhttp:\/\/eprint.iacr.org\/2003\/216"},{"key":"2_CR16","volume-title":"Applied cryptography and network security","author":"Y-C Chang","year":"2005","unstructured":"Chang, Y.-C., & Mitzenmacher, M. (2005). Privacy preserving keyword searches on remote encrypted data. In Applied cryptography and network security. Berlin: Springer."},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Curtmola, R., et al. (2006) Searchable symmetric encryption: Improved definitions and efficient constructions. In Proceedings of the 13th ACM Conference on Computer and Communications Security. ACM.","DOI":"10.1145\/1180405.1180417"},{"key":"2_CR18","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/978-3-642-17373-8_33","volume-title":"Advances in cryptology-ASIACRYPT 2010","author":"M Chase","year":"2010","unstructured":"Chase, M., & Kamara, S. (2010). Structured encryption and controlled disclosure. In Advances in cryptology-ASIACRYPT 2010 (pp. 577\u2013594). Berlin: Springer."},{"key":"2_CR19","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-642-15546-8_7","volume-title":"Secure data management","author":"P Liesdonk van","year":"2010","unstructured":"van Liesdonk, P., et al. (2010). Computationally efficient searchable symmetric encryption. In Secure data management (pp. 87\u2013100). Berlin: Springer."},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-642-32946-3_21","volume-title":"Financial cryptography and data security","author":"K Kurosawa","year":"2012","unstructured":"Kurosawa, K., & Ohtaki, Y. (2012). UC-secure searchable symmetric encryption. In Financial cryptography and data security (pp. 285\u2013298). Berlin: Springer."},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Canetti, R. (2001). Universally composable security: A new paradigm for cryptographic protocols. In Foundations of Computer Science, 2001. Proceedings. 42nd IEEE Symposium on. IEEE.","DOI":"10.1109\/SFCS.2001.959888"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C., & Roeder, T. (2012). Dynamic searchable symmetric encryption. In Proceedings of the 2012 ACM Conference on Computer and Communications Security. ACM.","DOI":"10.1145\/2382196.2382298"},{"key":"2_CR23","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-642-39884-1_22","volume-title":"Financial cryptography and data security","author":"S Kamara","year":"2013","unstructured":"Kamara, S., & Papamanthou, C. (2013). Parallel and dynamic searchable symmetric encryption. In Financial cryptography and data security (pp. 258\u2013274). Berlin: Springer."},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Li, J., et al. (2010). Fuzzy keyword search over encrypted data in cloud computing. In INFOCOM, 2010 Proceedings IEEE. IEEE.","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"2_CR25","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-642-10772-6_8","volume-title":"Information systems security","author":"M Adjedj","year":"2009","unstructured":"Adjedj, M., et al. (2009). Biometric identification over encrypted data made feasible. In Information systems security (pp. 86\u2013100). Berlin: Springer."},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Kuzu, M., Islam, M. S., & Kantarcioglu, M. (2012). Efficient similarity search over encrypted data. In Data Engineering (ICDE), 2012 IEEE 28th International Conference on. IEEE.","DOI":"10.1109\/ICDE.2012.23"},{"issue":"4","key":"2_CR27","first-page":"61","volume":"3","author":"J Wang","year":"2012","unstructured":"Wang, J., et al. (2012). A new efficient verifiable fuzzy keyword search scheme. JoWUA, 3(4), 61\u201371.","journal-title":"JoWUA"},{"key":"2_CR28","unstructured":"Lu, Y. (2012). Privacy-preserving logarithmic-time search on encrypted data in cloud. In NDSS."},{"key":"2_CR29","volume-title":"Advances in cryptology-Eurocrypt 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., et al. (2004). Public key encryption with keyword search. In Advances in cryptology-Eurocrypt 2004. Berlin: Springer."},{"key":"2_CR30","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-540-74143-5_30","volume-title":"Advances in cryptology-CRYPTO 2007","author":"M Bellare","year":"2007","unstructured":"Bellare, M., Boldyreva, A., & O\u2019Neill, A. (2007). Deterministic and efficiently searchable encryption. In Advances in cryptology-CRYPTO 2007 (pp. 535\u2013552). Berlin: Springer."},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Shi, E., et al. (2007). Multi-dimensional range query over encrypted data. In SP\u201907, IEEE Symposium on. IEEE.","DOI":"10.1109\/SP.2007.29"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Liu, Q., Wang, G., & Wu, J. (2009). An efficient privacy preserving keyword search scheme in cloud computing. In Computational Science and Engineering, 2009. CSE\u201909. International Conference on. IEEE.","DOI":"10.1109\/CSE.2009.66"},{"issue":"3","key":"2_CR33","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1016\/j.jnca.2011.03.010","volume":"35","author":"Q Liu","year":"2012","unstructured":"Liu, Q., Wang, G., & Wu, J. (2012). Secure and privacy preserving keyword searching for cloud storage services. Journal of Network and Computer Applications, 35(3), 927\u2013933.","journal-title":"Journal of Network and Computer Applications"},{"key":"2_CR34","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-540-78967-3_9","volume-title":"Advances in cryptology\u2013EUROCRYPT 2008","author":"J Katz","year":"2008","unstructured":"Katz, J., Sahai, A., & Waters, B. (2008). Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Advances in cryptology\u2013EUROCRYPT 2008 (pp. 146\u2013162). Berlin: Springer."},{"key":"2_CR35","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/978-3-642-13013-7_23","volume-title":"Public key cryptography\u2013PKC 2010","author":"N Attrapadung","year":"2010","unstructured":"Attrapadung, N., & Libert, B. (2010). Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation. In Public key cryptography\u2013PKC 2010 (pp. 384\u2013402). Berlin: Springer."}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:02:49Z","timestamp":1577793769000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_2","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}