{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:16:15Z","timestamp":1742955375195,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319625935"},{"type":"electronic","value":"9783319625942"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-62594-2_14","type":"book-chapter","created":{"date-parts":[[2017,7,18]],"date-time":"2017-07-18T21:13:38Z","timestamp":1500412418000},"page":"273-293","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards a Framework for Privacy-Preserving Data Sharing in Portable Clouds"],"prefix":"10.1007","author":[{"given":"Clemens","family":"Zeidler","sequence":"first","affiliation":[]},{"given":"Muhammad Rizwan","family":"Asghar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,20]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Capitani, D., di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Pelosi, G., Samarati, P.: Preserving confidentiality of security policies in data outsourcing. In: WPES 2008, pp. 75\u201384 (2008)","DOI":"10.1145\/1456403.1456417"},{"key":"14_CR2","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/j.clsr.2009.03.001","volume":"25","author":"A Joint","year":"2009","unstructured":"Joint, A., Baker, E., Eccles, E.: Hey, you, get off of that cloud? Comput. Law Secur. Rev. 25, 270\u2013274 (2009)","journal-title":"Comput. Law Secur. Rev."},{"key":"14_CR3","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53, 50\u201358 (2010)","journal-title":"Commun. ACM"},{"key":"14_CR4","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1109\/MCOM.2011.6094017","volume":"49","author":"S Chaves De","year":"2011","unstructured":"De Chaves, S., Uriarte, R., Westphall, C.: Toward an architecture for monitoring private clouds. Commun. Mag. 49, 130\u2013137 (2011). IEEE","journal-title":"Commun. Mag."},{"key":"14_CR5","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MIC.2013.19","volume":"17","author":"B Satzger","year":"2013","unstructured":"Satzger, B., Hummer, W., Inzinger, C., Leitner, P., Dustdar, S.: Winds of change: from vendor lock-in to the meta cloud. IEEE Internet Comput. 17, 69\u201373 (2013)","journal-title":"IEEE Internet Comput."},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fc\u015f, H., Iyer, B., Mehrotra, S.: Ensuring the integrity of encrypted databases in the database-as-a-service model. In: Data and Applications Security XVII, vol. 142, pp. 61\u201374 (2004)","DOI":"10.1007\/1-4020-8070-0_5"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Asghar, M.R., Ion, M., Russello, G., Crispo, B.: Securing data provenance in the cloud. In: Open Problems in Network Security. LNCS, vol. 7039, pp. 145\u2013160 (2012)","DOI":"10.1007\/978-3-642-27585-2_12"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Asghar, M.R., Russello, G., Crispo, B., Ion, M.: Supporting complex queries and access policies for multi-user encrypted databases. In: CCSW 2013, pp. 77\u201388 (2013)","DOI":"10.1145\/2517488.2517492"},{"key":"14_CR9","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1109\/TPDS.2013.154","volume":"25","author":"L Ferretti","year":"2014","unstructured":"Ferretti, L., Colajanni, M., Marchetti, M.: Distributed, concurrent, and independent access to encrypted cloud databases. Parallel Distrib. Syst. 25, 437\u2013446 (2014)","journal-title":"Parallel Distrib. Syst."},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Josefsson, S.: PKCS#5: password-based key derivation function 2 (PBKDF2) test vectors. Technical report (2011)","DOI":"10.17487\/rfc6070"},{"key":"14_CR11","unstructured":"Asghar, M.R.: Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments. Ph.D. thesis, University of Trento (2013)"},{"key":"14_CR12","unstructured":"Garfinkel, S.: PGP: pretty good privacy (1995)"},{"key":"14_CR13","unstructured":"Burr, W.E., Nazario, N.A., Polk, W.T.: A proposed federal PKI using X.509 v3 certificates. NIST (1996)"},{"key":"14_CR14","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"R Sandhu","year":"1994","unstructured":"Sandhu, R., Samarati, P.: Access control: principle and practice. Commun. Mag. 32, 40\u201348 (1994). IEEE","journal-title":"Commun. Mag."},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Zhao, G., Rong, C., Li, J., Zhang, F., Tang, Y.: Trusted data sharing over untrusted cloud storage providers. In: Cloud Computing Technology and Science (CloudCom), pp. 97\u2013103 (2010)","DOI":"10.1109\/CloudCom.2010.36"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Ward, C., Aravamudan, N., Bhattacharya, K., Cheng, K., Filepp, R., Kearney, R., Peterson, B., Shwartz, L., Young, C.: Workload migration into clouds challenges, experiences, opportunities. In: Cloud Computing (CLOUD), pp. 164\u2013171 (2010)","DOI":"10.1109\/CLOUD.2010.84"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Khajeh-Hosseini, A., Sommerville, I., Bogaerts, J., Teregowda, P.: Decision support tools for cloud migration in the enterprise. In: Cloud Computing (CLOUD), pp. 541\u2013548 (2011)","DOI":"10.1109\/CLOUD.2011.59"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Stefanov, E., van Dijk, M., Shi, E., Fletcher, C., Ren, L., Yu, X., Devadas, S.: Path ORAM: an extremely simple oblivious ram protocol. In: CCS 2013, pp. 299\u2013310 (2013)","DOI":"10.1145\/2508859.2516660"},{"key":"14_CR19","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM 43, 431\u2013473 (1996)","journal-title":"J. ACM"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Gong, X., Kiyavash, N., Borisov, N.: Fingerprinting websites using remote traffic analysis. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 684\u2013686 (2010)","DOI":"10.1145\/1866307.1866397"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Cabrera, L.F., Jones, M.B., Theimer, M.: Herald: achieving a global event notification service. In: 2001 Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, pp. 87\u201392. IEEE (2001)","DOI":"10.1109\/HOTOS.2001.990066"},{"key":"14_CR22","doi-asserted-by":"crossref","first-page":"1277","DOI":"10.14778\/1454159.1454167","volume":"1","author":"BF Cooper","year":"2008","unstructured":"Cooper, B.F., Ramakrishnan, R., Srivastava, U., Silberstein, A., Bohannon, P., Jacobsen, H.A., Puz, N., Weaver, D., Yerneni, R.: Pnuts: Yahoo!\u2019s hosted data serving platform. Proc. VLDB Endow. 1, 1277\u20131288 (2008)","journal-title":"Proc. VLDB Endow."},{"key":"14_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1007\/978-3-642-35170-9_24","volume-title":"Middleware 2012","author":"P Pal","year":"2012","unstructured":"Pal, P., Lauer, G., Khoury, J., Hoff, N., Loyall, J.: P3S: a privacy preserving publish-subscribe middleware. In: Narasimhan, P., Triantafillou, P. (eds.) Middleware 2012. LNCS, vol. 7662, pp. 476\u2013495. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-35170-9_24"},{"key":"14_CR24","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/s11633-014-0776-7","volume":"11","author":"JF Zhao","year":"2014","unstructured":"Zhao, J.F., Zhou, J.T.: Strategies and methods for cloud migration. Int. J. Autom. Comput. 11, 143\u2013152 (2014)","journal-title":"Int. J. Autom. Comput."},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Menzel, M., Ranjan, R.: CloudGenius: decision support for web server cloud migration. In: WWW 2012, pp. 979\u2013988 (2012)","DOI":"10.1145\/2187836.2187967"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Ng, W.S., Ooi, B.C., Tan, K.L., Zhou, A.: PeerDB: a P2P-based system for distributed data sharing. In: Data Engineering, pp. 633\u2013644 (2003)","DOI":"10.1109\/ICDE.2003.1260827"},{"key":"14_CR27","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"8","author":"H Takabi","year":"2010","unstructured":"Takabi, H., Joshi, J.B., Ahn, G.J.: Security and privacy challenges in cloud computing environments. Secur. Priv. 8, 24\u201331 (2010)","journal-title":"Secur. Priv."},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Khan, S., Hamlen, K.: Anonymouscloud: a data ownership privacy provider framework in cloud computing. In: Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 170\u2013176 (2012)","DOI":"10.1109\/TrustCom.2012.94"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Zarandioon, S., Yao, D., Ganapathy, V.: K2C: cryptographic cloud storage with lazy revocation and anonymous access. In: Security and Privacy in Communication Networks, vol. 96, pp. 59\u201376 (2012)","DOI":"10.1007\/978-3-642-31909-9_4"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Bessani, A., Correia, M., Quaresma, B., Andr\u00e9, F., Sousa, P.: Depsky: Dependable and Secure Storage in a Cloud-of-clouds. In: EuroSys 2011, pp. 31\u201346 (2011)","DOI":"10.1145\/1966445.1966449"},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Butoi, A., Tomai, N.: Secret sharing scheme for data confidentiality preserving in a public-private hybrid cloud storage approach. In: UCC 2014, pp. 992\u2013997 (2014)","DOI":"10.1109\/UCC.2014.163"},{"key":"14_CR32","doi-asserted-by":"crossref","first-page":"1182","DOI":"10.1109\/TPDS.2012.331","volume":"24","author":"X Liu","year":"2013","unstructured":"Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. Parallel Distrib. Syst. 24, 1182\u20131191 (2013)","journal-title":"Parallel Distrib. Syst."},{"key":"14_CR33","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29, 38\u201347 (1996)","journal-title":"Computer"},{"key":"14_CR34","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.cose.2011.05.006","volume":"30","author":"G Wang","year":"2011","unstructured":"Wang, G., Liu, Q., Wu, J., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30, 320\u2013331 (2011)","journal-title":"Comput. Secur."},{"key":"14_CR35","doi-asserted-by":"crossref","unstructured":"Farb, M., Lin, Y.H., Kim, T.H.J., McCune, J., Perrig, A.: Safeslinger: Easy-to-use and secure public-key exchange. In: MobiCom 2013, pp. 417\u2013428 (2013)","DOI":"10.1145\/2500423.2500428"},{"key":"14_CR36","doi-asserted-by":"crossref","unstructured":"Asghar, M.R., Ion, M., Russello, G., Crispo, B.: ESPOON: enforcing encrypted security policies in outsourced environments. In: The Sixth International Conference on Availability, Reliability and Security, pp. 99\u2013108. IEEE Computer Society (2011)","DOI":"10.1109\/ARES.2011.23"},{"key":"14_CR37","doi-asserted-by":"crossref","unstructured":"Asghar, M.R., Russello, G., Crispo, B.: E-GRANT: enforcing encrypted dynamic security constraints in the cloud. In: Future Internet of Things and Cloud (FiCloud), pp. 135\u2013144 (2015). Special Track on Security, Privacy and Trust","DOI":"10.1109\/FiCloud.2015.43"},{"key":"14_CR38","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1016\/j.cose.2012.11.010","volume":"35","author":"RA Muhammad","year":"2013","unstructured":"Muhammad, R.A., Mihaela, I., Giovanni, R., Bruno, C.: ESPOON $$_{ERBAC}$$ : enforcing security policies in outsourced environments. Comput. Secur. (COSE) 35, 2\u201324 (2013). Elsevier","journal-title":"Comput. Secur. (COSE)"},{"key":"14_CR39","doi-asserted-by":"crossref","unstructured":"Raymond, J-F.:Traffic analysis: protocols, attacks, design issues, and open problems. In: Designing Privacy Enhancing Technologies, pp. 10\u201329. Springer (2001)","DOI":"10.1007\/3-540-44702-4_2"}],"container-title":["Communications in Computer and Information Science","Cloud Computing and Services Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-62594-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,30]],"date-time":"2019-09-30T17:01:42Z","timestamp":1569862902000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-62594-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319625935","9783319625942"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-62594-2_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}