{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:50:17Z","timestamp":1742986217248,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":13,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811631498"},{"type":"electronic","value":"9789811631504"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-3150-4_19","type":"book-chapter","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T12:03:10Z","timestamp":1624276990000},"page":"215-226","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Privacy Data Protection Model Based on Random Projection Technology"],"prefix":"10.1007","author":[{"given":"Wen","family":"Shen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qian","family":"Guo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hui","family":"Zhu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kejian","family":"Tang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shaohui","family":"Zhan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhiguo","family":"Hao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,6,22]]},"reference":[{"issue":"6","key":"19_CR1","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1136\/medethics-2011-100014","volume":"38","author":"A Conti","year":"2012","unstructured":"Conti, A., Delbon, P., Laffranchi, L., Paganelli, C., De. Ferrari, F.: Hiv-positive status and preservation of privacy: a recent decision from the italian data protection authority on the procedure of gathering personal patient data in the dental office. J. Med. Ethics 38(6), 386\u2013388 (2012)","journal-title":"J. Med. Ethics"},{"issue":"005","key":"19_CR2","first-page":"62","volume":"039","author":"H Ming","year":"2012","unstructured":"Ming, H., Guohua, C., Wenhui, L., et al.: Research on cloud data storage security and privacy protection strategies in the Internet of Things environment. Comput. Sci. 039(005), 62\u201365 (2012)","journal-title":"Comput. Sci."},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Jiang, L., Guo, D.: Dynamic encrypted data sharing scheme based on conditional proxy broadcast re-encryption for cloud storage. IEEE Access 1 (2017)","DOI":"10.1109\/ACCESS.2017.2726584"},{"issue":"1","key":"19_CR4","first-page":"229","volume":"52","author":"L Yahui","year":"2015","unstructured":"Yahui, L., Tieying, Z., Xiaolong, J., et al.: Personal privacy protection in the era of big data. Comput. Res. Dev. 52(1), 229\u2013247 (2015)","journal-title":"Comput. Res. Dev."},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Tchernykh, A., Babenko, M., Chervyakov, N., et al.: AC-RRNS: anti-collusion secured data sharing scheme for cloud storage. Int. J. Approx. Reason. 102, 60\u201373 (2018)","DOI":"10.1016\/j.ijar.2018.07.010"},{"issue":"9","key":"19_CR6","doi-asserted-by":"publisher","first-page":"3209","DOI":"10.1007\/s00024-017-1755-z","volume":"175","author":"U Halik","year":"2018","unstructured":"Halik, U., Smaczy\u0144ski, M.: Geovisualisation of relief in a virtual reality system on the basis of low-level aerial imagery. Pure Appl. Geophys. 175(9), 3209\u20133221 (2018)","journal-title":"Pure Appl. Geophys."},{"key":"19_CR7","first-page":"28","volume":"08","author":"J Lan Lihui","year":"2010","unstructured":"Lan Lihui, J., Shiguang, J.H., et al.: A review of privacy protection research in data publishing. Comput. Appl. Res. 08, 28\u201333 (2010)","journal-title":"Comput. Appl. Res."},{"key":"19_CR8","first-page":"55","volume":"6","author":"T Xinling","year":"2014","unstructured":"Xinling, T., Zhixiao, H.: The paradox of \u201cpublic data opening\u201d and \u201cpersonal privacy protection.\u201d News Univ. 6, 55\u201361 (2014)","journal-title":"News Univ."},{"issue":"9","key":"19_CR9","doi-asserted-by":"publisher","first-page":"2609","DOI":"10.1109\/TC.2014.2375190","volume":"64","author":"C Liu","year":"2015","unstructured":"Liu, C., Ranjan, R., Yang, C., et al.: MuR-DPA: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans. Comput. 64(9), 2609\u20132622 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"19_CR10","first-page":"63","volume":"5","author":"W Xuehui","year":"2015","unstructured":"Xuehui, W., Xin, Z.: Exploration on the integration and protection of public-private law of privacy rights\u2014from the perspective of \u201cbig data era\u201d personal information privacy. Hebei Law 5, 63\u201371 (2015)","journal-title":"Hebei Law"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"None: On the orthogonal transformation used for structural comparisons. Acta Crystallograph. Sec. A Found. Crystallography 45(2), 208\u2013210 (2010)","DOI":"10.1107\/S0108767388010128"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Comon, P.: Independent component analysis, a new concept?. Signal Process. 36(3), 287\u2013314 (1994)","DOI":"10.1016\/0165-1684(94)90029-9"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Johnson, W.:  Extensions of lipshitz mapping into hilbert space. Contemporary Math. p. 26 (1984)","DOI":"10.1090\/conm\/026\/737400"}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-3150-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T12:12:11Z","timestamp":1624277531000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-3150-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811631498","9789811631504"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-3150-4_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"22 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"153","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}