{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T14:00:24Z","timestamp":1762869624668,"version":"3.41.0"},"reference-count":26,"publisher":"Elsevier","isbn-type":[{"type":"print","value":"9780128114322"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1016\/b978-0-12-809633-8.20379-8","type":"book-chapter","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T23:01:27Z","timestamp":1521154887000},"page":"265-271","source":"Crossref","is-referenced-by-count":0,"title":["The Challenge of Privacy in the Cloud"],"prefix":"10.1016","author":[{"given":"Francesco","family":"Buccafurri","sequence":"first","affiliation":[]},{"given":"Vincenzo","family":"De Angelis","sequence":"additional","affiliation":[]},{"given":"Gianluca","family":"Lax","sequence":"additional","affiliation":[]},{"given":"Serena","family":"Nicolazzo","sequence":"additional","affiliation":[]},{"given":"Antonino","family":"Nocera","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib1","doi-asserted-by":"crossref","unstructured":"Buccafurri, F., Lax, G., 2004. TLS: A tree-based DHT lookup service for highly dynamic networks. In: Proceedings of the On the Move to Meaningful Internet Systems 2004: CoopIS, DOA, and ODBASE, pp. 563\u2013580. Springer.","DOI":"10.1007\/978-3-540-30468-5_35"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib2","doi-asserted-by":"crossref","unstructured":"Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A., 2015. Accountability-preserving anonymous delivery of cloud services. In: Proceedings of the International Conference on Trust, Privacy and Security in Digital Business (TRUSTBUS 2015), pp. 124\u2013135. Springer.","DOI":"10.1007\/978-3-319-22906-5_10"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib3","doi-asserted-by":"crossref","unstructured":"Chaum, D., Van, E., 1991. Heyst group signatures. In: Proceedings of the Advances in Cryptology-EUROCRYPT 1991, pp. 257\u2013265. Springer.","DOI":"10.1007\/3-540-46416-6_22"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib4","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1145\/1805974.1805978","article-title":"Combining fragmentation and encryption to protect privacy in data storage","volume":"13","author":"Ciriani","year":"2010","journal-title":"ACM Transactions on Information and System Security"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib5","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P., 2004. Tor: The second-generation onion router. Technical Report DTIC Document.","DOI":"10.21236\/ADA465464"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib6","unstructured":"Di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P., 2007. Over-encryption: Management of access control evolution on outsourced data. In: Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 123\u2013134. VLDB endowment."},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib7","doi-asserted-by":"crossref","unstructured":"Di Vimercati, S.D.C., Foresti, S., Samarati, P., 2014. Selective and finegrained access to data in the cloud. In: Proceedings of the Secure Cloud Computing, pp.123\u2013148. Springer.","DOI":"10.1007\/978-1-4614-9278-8_6"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib8","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/978-0-387-27696-0_12","article-title":"Search on encrypted data","author":"Hacigu\u00a8mu\u00a8\u015f","year":"2007","journal-title":"Secure Data Management in Decentralized Systems"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib9","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.jnca.2016.05.010","article-title":"A survey of security issues for cloud computing","volume":"71","author":"Khan","year":"2016","journal-title":"Journal of Network and Computer Applications"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib10","doi-asserted-by":"crossref","unstructured":"Khan, S.M., Hamlen, K.W., 2012. Anonymouscloud: A data ownership privacy provider framework in cloud computing. In: Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 170\u2013176. IEEE.","DOI":"10.1109\/TrustCom.2012.94"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib11","unstructured":"Laurikainen, R., 2010. Secure and anonymous communication in the cloud. Aalto University School of Science and Technology. Department of Computer Science and Engineering, Tech. Rep. TKK-CSE-B10."},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib12","doi-asserted-by":"crossref","first-page":"131143","DOI":"10.1109\/TPDS.2012.97","article-title":"Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption","volume":"24","author":"Li","year":"2013","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib13","doi-asserted-by":"crossref","unstructured":"Lio\u00a8hr, H., Sadeghi, A.-R., Winandy, M., 2010. Securing the e-health cloud. In: Proceedings of the 1st ACM International Health Informatics Symposium, pp. 220\u2013229. ACM.","DOI":"10.1145\/1882992.1883024"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib14","doi-asserted-by":"crossref","unstructured":"Li, Z.-R., Chang, E.-C., Huang, K.-H., Lai, F., 2011. A secure electronic medical record sharing mechanism in the cloud computing platform. In: Proceedings of the 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE), pp. 98\u2013103. IEEE.","DOI":"10.1109\/ISCE.2011.5973792"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib15","doi-asserted-by":"crossref","unstructured":"Malina, L., Hajny, J., 2013. Efficient security solution for privacy-preserving cloud services. In: Proceedings of the 2013 IEEE 36th International Conference on Telecommunications and Signal Processing (TSP), pp. 23\u201327. IEEE.","DOI":"10.1109\/TSP.2013.6613884"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib16","unstructured":"Pardamean, B., Rumanda, R.R., 2011. Integrated model of cloud-based e-medical record for health care organizations. In: Proceedings of the 10th WSEAS International Conference on E-Activities, pp. 157\u2013162."},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib17","article-title":"Enforcing role-based access control for secure data storage in cloud using authentication and encryption techniques","volume":"6","author":"Pritam","year":"2016","journal-title":"Journal of Network Communications and Emerging Technologies"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib18","doi-asserted-by":"crossref","unstructured":"Radwan, A.S., Abdel-Hamid, A.A., Hanafy, Y., 2012. Cloud-based service for secure electronic medical record exchange. In: Proceedings of the 2012 22nd International Conference on Computer Theory and Applications (ICCTA), pp. 94\u2013103. IEEE.","DOI":"10.1109\/ICCTA.2012.6523553"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib19","doi-asserted-by":"crossref","unstructured":"Riahla, M.A., Tamine, K., Gaborit, P., 2012. A protocol for file sharing, anonymous and confidential, adapted to p2p networks. In: Proceedings of the 2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), pp. 549\u2013557. IEEE.","DOI":"10.1109\/SETIT.2012.6481971"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib20","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1016\/S0140-6736(10)62234-9","article-title":"Sharing research data to improve public health","volume":"377","author":"Walport","year":"2011","journal-title":"The Lancet"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib21","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/TSC.2011.24","article-title":"Toward secure and dependable storage services in cloud computing","volume":"5","author":"Wang","year":"2012","journal-title":"IEEE Transactions on Services Computing"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib22","first-page":"12","article-title":"Sharing health data for better outcomes on PatientsLikeMe","author":"Wicks","year":"2010","journal-title":"Journal of Medical Internet Research"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib23","unstructured":"Xie, M., Wang, H., Yin, J., Meng, X., 2007. Integrity auditing of outsourced data. In: Proceedings of the 33rd International conference on Very large Data Bases, pp. 782\u2013793. VLDB Endowment."},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib24","doi-asserted-by":"crossref","unstructured":"Xu, Z., Min, R., Hu, Y., 2003. Hieras: A Dht based hierarchical p2p routing algorithm. In: Proceedings of the 2003 International Conference on Parallel Processing, pp. 187\u2013194. IEEE.","DOI":"10.1109\/ICPP.2003.1240580"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib25","doi-asserted-by":"crossref","unstructured":"Yang, C.-T., Chen, L.-T., Chou, W.-L., Wang, K.-C., 2010. Implementation of a medical image file accessing system on cloud computing. In: Proceedings of the 2010 IEEE 13th International Conference on Computational Science and Engineering (CSE), pp. 321\u2013326. IEEE.","DOI":"10.1109\/CSE.2010.48"},{"key":"10.1016\/B978-0-12-809633-8.20379-8_bib26","doi-asserted-by":"crossref","unstructured":"Zhang, R., Liu, L., 2010. Security models and requirements for healthcare application clouds. In: Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD), pp. 268\u2013275. IEEE.","DOI":"10.1109\/CLOUD.2010.62"}],"container-title":["Encyclopedia of Bioinformatics and Computational Biology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780128096338203798?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780128096338203798?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T20:45:45Z","timestamp":1751489145000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780128096338203798"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9780128114322"],"references-count":26,"URL":"https:\/\/doi.org\/10.1016\/b978-0-12-809633-8.20379-8","relation":{},"subject":[],"published":{"date-parts":[[2019]]}}}