{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T10:06:37Z","timestamp":1743156397643,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031624872"},{"type":"electronic","value":"9783031624889"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-62488-9_2","type":"book-chapter","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T05:12:16Z","timestamp":1717650736000},"page":"17-30","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Federated Clouds: A New Metric for\u00a0Measuring the\u00a0Quality of\u00a0Data Anonymization"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-6101-9995","authenticated-orcid":false,"given":"Youssoupha","family":"Gaye","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5748-446X","authenticated-orcid":false,"given":"Maissa","family":"Mbaye","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3452-4174","authenticated-orcid":false,"given":"Dame","family":"Diongue","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3320-7887","authenticated-orcid":false,"given":"Ousmane","family":"Dieng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Emmanuel","family":"Adetiba","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5646-7385","authenticated-orcid":false,"given":"Joke A.","family":"Badejo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,6,7]]},"reference":[{"issue":"1","key":"2_CR1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6487","volume":"34","author":"A Abbasi","year":"2022","unstructured":"Abbasi, A., Mohammadi, B.: A clustering-based anonymization approach for privacy-preserving in the healthcare cloud. Concurrency Comput. Pract. Exper. 34(1), e6487 (2022)","journal-title":"Concurrency Comput. Pract. Exper."},{"key":"2_CR2","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-030-95630-1_6","volume-title":"Informatics and Intelligent Applications","author":"E Adetiba","year":"2022","unstructured":"Adetiba, E., et al.: FEDGEN Testbed: a federated genomics private cloud infrastructure for precision medicine and artificial intelligence research. In: Misra, S., Oluranti, J., Dama\u0161evi\u010dius, R., Maskeliunas, R. (eds.) ICIIA 2021. CCIS, vol. 1547, pp. 78\u201391. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-95630-1_6"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Andrew, J., Karthikeyan, J., Jebastin, J.: Privacy preserving big data publication on cloud using Mondrian anonymization techniques and deep neural networks. In: 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), pp. 722\u2013727. IEEE (2019)","DOI":"10.1109\/ICACCS.2019.8728384"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Bernsmed, K., et al.: Thunder in the clouds: security challenges and solutions for federated clouds. In: 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, pp. 113\u2013120. IEEE (2012)","DOI":"10.1109\/CloudCom.2012.6427547"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.future.2020.04.012","volume":"110","author":"I Blanquer","year":"2020","unstructured":"Blanquer, I., et al.: Federated and secure cloud services for building medical image classifiers on an intercontinental infrastructure. Futur. Gener. Comput. Syst. 110, 119\u2013134 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Brasileiro, F., Brito, A., Blanquer, I.: Atmosphere: Adaptive, trustworthy, manageable, orchestrated, secure, privacy-assuring, hybrid ecosystem for resilient cloud computing. In: 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSNW), pp. 51\u201352. IEEE (2018)","DOI":"10.1109\/DSN-W.2018.00025"},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.comcom.2019.04.011","volume":"140","author":"J Domingo-Ferrer","year":"2019","unstructured":"Domingo-Ferrer, J., et al.: Privacy-preserving cloud computing on sensitive data: a survey of methods, products and challenges. Comput. Commun. 140, 38\u201360 (2019)","journal-title":"Comput. Commun."},{"issue":"3\u20134","key":"2_CR8","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends\u00ae Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends\u00ae Theor. Comput. Sci."},{"issue":"1","key":"2_CR9","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.future.2011.05.022","volume":"28","author":"AJ Ferrer","year":"2012","unstructured":"Ferrer, A.J., et al.: OPTIMIS: a holistic approach to cloud service provisioning. Future Gener. Comput. Syst. 28(1), 66\u201377 (2012)","journal-title":"Future Gener. Comput. Syst."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"George, R.S., Sabitha, S.: Data anonymization and integrity checking in cloud computing. In: 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1\u20135. IEEE (2013)","DOI":"10.1109\/ICCCNT.2013.6726813"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond kanonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering, pp. 106\u2013115. IEEE (2006)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., et al.: l-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Disc. Data (TKDD) 1(1), 3-es (2007)","DOI":"10.1145\/1217299.1217302"},{"issue":"4","key":"2_CR13","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1147\/JRD.2009.5429058","volume":"53","author":"B Rochwerger","year":"2009","unstructured":"Rochwerger, B., et al.: The reservoir model and architecture for open federated cloud computing. IBM J. Res. Dev. 53(4), 4 (2009)","journal-title":"IBM J. Res. Dev."},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Rosa, M., et al.: Bionimbuz: a federated cloud platform for bioinformatics applications. In: 2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), pp. 548\u2013555. IEEE (2016)","DOI":"10.1109\/BIBM.2016.7822580"},{"key":"2_CR15","unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression (1998)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Silva, H., et al.: A re-identification risk-based anonymization framework for data analytics platforms. In: 2018 14th European Dependable Computing Conference (EDCC), pp. 101\u2013106. IEEE (2018)","DOI":"10.1109\/EDCC.2018.00026"},{"key":"2_CR17","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1016\/j.procs.2015.10.073","volume":"70","author":"H Taneja","year":"2015","unstructured":"Taneja, H., Singh, A.K., et al.: Preserving privacy of patients based on re-identification risk. Procedia Comput. Sci. 70, 448\u2013454 (2015)","journal-title":"Procedia Comput. Sci."},{"issue":"6","key":"2_CR18","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MCC.2018.064181122","volume":"5","author":"M Yang","year":"2018","unstructured":"Yang, M., et al.: Differentially private data sharing in a cloud federation with blockchain. IEEE Cloud Comput. 5(6), 69\u201379 (2018)","journal-title":"IEEE Cloud Comput."}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-62488-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T05:12:45Z","timestamp":1717650765000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-62488-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031624872","9783031624889"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-62488-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"7 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"UNet","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Ubiquitous Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Clermont-Ferrand","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"unet2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/unet-conf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}