{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T22:22:00Z","timestamp":1768083720680,"version":"3.49.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319623856","type":"print"},{"value":"9783319623863","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-62386-3_13","type":"book-chapter","created":{"date-parts":[[2017,6,28]],"date-time":"2017-06-28T03:54:51Z","timestamp":1498622091000},"page":"261-283","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A New Mechanism to Preserving Data Confidentiality in Cloud Database Scenarios"],"prefix":"10.1007","author":[{"suffix":"Jr.","given":"Eliseu C.","family":"Branco","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 Maria","family":"Monteiro","sequence":"additional","affiliation":[]},{"given":"Roney","family":"Reis","sequence":"additional","affiliation":[]},{"given":"Javam C.","family":"Machado","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,29]]},"reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/978-3-642-04444-1_27","volume-title":"Computer Security \u2013 ESORICS 2009","author":"V Ciriani","year":"2009","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Keep a few: outsourcing data while maintaining confidentiality. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 440\u2013455. Springer, Heidelberg (2009). doi:\n                    10.1007\/978-3-642-04444-1_27"},{"key":"13_CR2","unstructured":"Clarke, R.: Introduction to dataveillance and information privacy, and definition of terms (1999)"},{"key":"13_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20317-6","volume-title":"Privacy and Identity Management for Life","author":"J Camenisch","year":"2011","unstructured":"Camenisch, J., Fischer-H\u00fcbner, S., Rannenberg, K.: Privacy and Identity Management for Life. Springer, Heidelberg (2011). doi:\n                    10.1007\/978-3-642-20317-6"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/SURV.2012.060912.00182","volume":"15","author":"X Zhifeng","year":"2013","unstructured":"Zhifeng, X., Yang, X.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutor. 15, 843\u2013859 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"22:1","DOI":"10.1145\/1805974.1805978","volume":"13","author":"V Ciriani","year":"2010","unstructured":"Ciriani, V., Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Syst. Secur. 13, 22:1\u201322:33 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Samarati, P., di Vimercati, S.D.C.: Data protection in outsourcing scenarios: issues and directions. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ASIACCS 2010, pp. 1\u201314. ACM (2010)","DOI":"10.1145\/1755688.1755690"},{"key":"13_CR7","unstructured":"Joseph, N.M., Daniel, E., Vasanthi, N.A.: Article: survey on privacy-preserving methods for storage in cloud computing. In: IJCA Proceedings on Amrita International Conference of Women in Computing - 2013 AICWIC, pp. 1\u20134 (2013). (Full text available)"},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/1053283.1053289","volume":"8","author":"A Ceselli","year":"2005","unstructured":"Ceselli, A., Damiani, E., Vimercati, S.D.C.D., Jajodia, S., Paraboschi, S., Samarati, P.: Modeling and assessing inference exposure in encrypted databases. ACM Trans. Inf. Syst. Secur. (TISSEC) 8, 119\u2013152 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"13_CR9","volume-title":"The Encyclopedia Logic","author":"G Hegel","year":"1991","unstructured":"Hegel, G.: The Encyclopedia Logic, vol. 1. Hackett, Indianapolis (1991). (Geraets, T.F., Suchting, W.A., Harris, H.S. (trans.))"},{"key":"13_CR10","unstructured":"Barbay, J., Navarro, G.: Compressed representations of permutations, and applications (2009). arXiv preprint: \n                    arXiv:0902.1038"},{"key":"13_CR11","unstructured":"Resch, J.K., Plank, J.S.: AONT-RS: blending security and performance in dispersed storage systems. In: Proceedings of FAST-2011: 9th Usenix Conference on File and Storage Technologies, February 2011"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-642-16825-3_8","volume-title":"Advances in Information and Computer Security","author":"L Wiese","year":"2010","unstructured":"Wiese, L.: Horizontal fragmentation for data outsourcing with formula-based confidentiality constraints. In: Echizen, I., Kunihiro, N., Sasaki, R. (eds.) IWSEC 2010. LNCS, vol. 6434, pp. 101\u2013116. Springer, Heidelberg (2010). doi:\n                    10.1007\/978-3-642-16825-3_8"},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"C Ning","year":"2014","unstructured":"Ning, C., Cong, W., Ming, L., Kui, R., Wenjing, L.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25, 222\u2013233 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems*. Bell Syst. Tech. J. 28, 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Okman, L., Gal-Oz, N., Gonen, Y., Gudes, E., Abramov, J.: Security issues in NoSQL databases. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 541\u2013547 (2011)","DOI":"10.1109\/TrustCom.2011.70"},{"key":"13_CR16","unstructured":"Aggarwal, C.C.: On k-anonymity and the curse of dimensionality. In: Proceedings of the 31st International Conference on Very Large Data Bases, pp. 901\u2013909. VLDB Endowment (2005)"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Xu, X., Xiong, L., Liu, J.: Database fragmentation with confidentiality constraints: a graph search approach. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, pp. 263\u2013270. ACM (2015)","DOI":"10.1145\/2699026.2699121"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Krishna, R., Sayi, T., Mukkamala, R., Baruah, P.K.: Efficient privacy-preserving data distribution in outsourced environments: a fragmentation-based approach. In: Proceedings of the International Conference on Advances in Computing, Communications and Informatics, ICACCI 2012, pp. 589\u2013595. ACM (2012)","DOI":"10.1145\/2345396.2345492"},{"key":"13_CR19","doi-asserted-by":"publisher","first-page":"1594","DOI":"10.14778\/2536258.2536270","volume":"6","author":"T Rekatsinas","year":"2013","unstructured":"Rekatsinas, T., Deshpande, A., Machanavajjhala, A.: SPARSI: partitioning sensitive data amongst multiple adversaries. Proc. VLDB Endow. 6, 1594\u20131605 (2013)","journal-title":"Proc. VLDB Endow."},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-319-06320-1_4","volume-title":"Information Security Practice and Experience","author":"P Samarati","year":"2014","unstructured":"Samarati, P.: Data security and privacy in the cloud. In: Huang, X., Zhou, J. (eds.) ISPEC 2014. LNCS, vol. 8434, pp. 28\u201341. Springer, Cham (2014). doi:\n                    10.1007\/978-3-319-06320-1_4"}],"container-title":["Lecture Notes in Business Information Processing","Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-62386-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T12:53:51Z","timestamp":1580302431000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-62386-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319623856","9783319623863"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-62386-3_13","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"29 June 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICEIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Enterprise Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 April 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iceis2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iceis.org\/?y=2016","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}