{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:26:17Z","timestamp":1743056777283,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319168852"},{"type":"electronic","value":"9783319168869"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16886-9_15","type":"book-chapter","created":{"date-parts":[[2015,4,20]],"date-time":"2015-04-20T11:51:57Z","timestamp":1429530717000},"page":"144-153","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Addressing Privacy in Cloud Computing Environment"],"prefix":"10.1007","author":[{"given":"Mangqoba V.","family":"Shabalala","sequence":"first","affiliation":[]},{"given":"Paul","family":"Tarwireyi","sequence":"additional","affiliation":[]},{"given":"Matthew O.","family":"Adigun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,21]]},"reference":[{"key":"15_CR1","unstructured":"Pearson, J., Logan, C., Reis, D., Taveras, L., Koerner, D.: Answers to Healthcare Leaders\u2019 Cloud Questions (2014)"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-642-23447-7_7","volume-title":"Information and Communication on Technology for the Fight against Global Warming","author":"DS Allison","year":"2011","unstructured":"Allison, D.S., Capretz, M.A.: Furthering the growth of cloud computing by providing privacy as a service. In: Kranzlm\u00fcller, D., Toja, A.M. (eds.) ICT-GLOW 2011. LNCS, vol. 6868, pp. 64\u201378. Springer, Heidelberg (2011)"},{"issue":"1","key":"15_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"15_CR4","unstructured":"Hogan Lovells.: Cloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns (2010). https:\/\/www.cisco.com\/web\/about\/doing_business\/legal\/privacy_compliance\/docs\/CloudPrimer.pdf"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Lenk, A., Klems, M., Nimis, J., Tai, S., Sandholm, T.: What\u2019s inside the cloud? An architectural map of the cloud landscape. In: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, CLOUD 2009. pp. 23\u201331 (2009)","DOI":"10.1109\/CLOUD.2009.5071529"},{"key":"15_CR6","unstructured":"Regard, H,: OECD guidelines governing the protection of privacy and transborder flows of personal data (2013). http:\/\/www.oecd.org\/sti\/ieconomy\/2013-oecd-privacy-guidelines.pdf. Accessed 20 March 2014"},{"key":"15_CR7","unstructured":"Reed, A., Rezek, C., Simmonds, P.: Security Guidance for Critical Areas of Focus in Cloud Computing V3.0. Cloud Security Alliance (2011)"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-642-20898-0_15","volume-title":"Future Internet Assembly","author":"R Glott","year":"2011","unstructured":"Glott, R., Husmann, E., Sadeghi, A.-R., Schunter, M.: Trustworthy clouds underpinning the future internet. In: Domingue, J., et al. (eds.) Future Internet Assembly. LNCS, vol. 6656, pp. 209\u2013221. Springer, Heidelberg (2011)"},{"key":"15_CR9","unstructured":"Lovrek, I., Lovric, T., Lucic, D.: Regulatory aspects of cloud computing. In: 2012 20th International Conference on Software Telecommunications and Computer Networks (SoftCOM), pp. 1\u20137. IEEE (2012)"},{"key":"15_CR10","unstructured":"Ngugi, B., Dardick, G.: Security and Privacy Assurance in Advancing Technologies, 30 November 2010"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Kandukuri, B.R., Patturi, V.R., Rakshit, A.: Cloud security issues. In: 2009 IEEE International Conference on Services Computing, pp. 517\u2013520 (2009)","DOI":"10.1109\/SCC.2009.84"},{"key":"15_CR12","unstructured":"Prince, B.: IBM Discovers Encryption Scheme That Could Improve Cloud Security, Spam Filtering. http:\/\/www.eweek.com\/c\/a\/Security\/IBM-Uncovers-Encryption-Scheme-That-Could-Improve-Cloud-Security-Spam-Filtering-135413\/"},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2010.115","volume":"9","author":"B Grobauer","year":"2011","unstructured":"Grobauer, B., Walloschek, T., St\u00f6cker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9, 50\u201357 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"De Oliveira, A.S., Sendor, J., Garaga, A., Jenatton, K.: Monitoring personal data transfers in the cloud. In: Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom, pp. 347\u2013354 (2013)","DOI":"10.1109\/CloudCom.2013.52"},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/s00145-014-9177-x","volume":"28","author":"Y Lindell","year":"2014","unstructured":"Lindell, Y., Pinkas, B.: An efficient protocol for secure two-party computation in the presence of malicious adversaries. J. Cryptol. 28, 312\u2013350 (2014)","journal-title":"J. Cryptol."},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science, Sfcs 1982 (1982)","DOI":"10.1109\/SFCS.1982.38"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Munt\u00e9s-Mulero, V., Nin, J.: Privacy and anonymization for very large datasets. In: Proceeding of the 18th ACM Conference on Information and Knowledge Management - CIKM 2009, p. 2117 (2009)","DOI":"10.1145\/1645953.1646333"},{"key":"15_CR18","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2013","unstructured":"Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62, 362\u2013375 (2013)","journal-title":"IEEE Trans. Comput."},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: privacy-aware data storage and processing in cloud computing architectures. In: 8th IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2009, pp. 711\u2013716 (2009)","DOI":"10.1109\/DASC.2009.139"},{"key":"15_CR20","series-title":"The International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/1-4020-8143-X_19","volume-title":"Security and Protection in Information Processing Systems","author":"M Abadi","year":"2004","unstructured":"Abadi, M.: Trusted computing, trusted third parties, and verified communications. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) Future Internet Assembly. IFIP, vol. 147, pp. 291\u2013308. Springer, Heidelberg (2004)"},{"key":"15_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-642-10665-1_9","volume-title":"Cloud Computing","author":"S Pearson","year":"2009","unstructured":"Pearson, S., Shen, Y., Mowbray, M.: A privacy manager for cloud computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 90\u2013106. Springer, Heidelberg (2009)"},{"key":"15_CR22","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s11227-010-0425-z","volume":"61","author":"M Mowbray","year":"2012","unstructured":"Mowbray, M., Pearson, S., Shen, Y.: Enhancing privacy in cloud computing via policy-based obfuscation. J. Supercomput. 61, 267\u2013291 (2012)","journal-title":"J. Supercomput."},{"key":"15_CR23","doi-asserted-by":"crossref","first-page":"613","DOI":"10.2307\/25750694","volume":"34","author":"CL Anderson","year":"2010","unstructured":"Anderson, C.L., Agarwal, R.: Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions. MIS Q. 34, 613\u2013615 (2010)","journal-title":"MIS Q."},{"key":"15_CR24","volume-title":"Cloud Security and Privacy","author":"T Mather","year":"2009","unstructured":"Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy. O\u2019Reilly, Sebastopol (2009)"},{"key":"15_CR25","first-page":"194","volume":"189","author":"J Brooke","year":"1996","unstructured":"Brooke, J.: SUS-A quick and dirty usability scale. Usability Eval. Ind. 189, 194 (1996)","journal-title":"Usability Eval. Ind."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","e-Infrastructure and e-Services for Developing Countries"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16886-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T09:10:17Z","timestamp":1676452217000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16886-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319168852","9783319168869"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16886-9_15","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}