{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:58:06Z","timestamp":1773154686656,"version":"3.50.1"},"reference-count":170,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"POSEIDON H2020 Project","award":["786713 H2020-DS-2016-2017\/DS-08-2017"],"award-info":[{"award-number":["786713 H2020-DS-2016-2017\/DS-08-2017"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3049599","type":"journal-article","created":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T09:08:18Z","timestamp":1610010498000},"page":"10473-10497","source":"Crossref","is-referenced-by-count":15,"title":["Privacy in the Cloud: A Survey of Existing Solutions and Research Challenges"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2306-2242","authenticated-orcid":false,"given":"Paulo","family":"Silva","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1615-2925","authenticated-orcid":false,"given":"Edmundo","family":"Monteiro","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5079-8327","authenticated-orcid":false,"given":"Paulo","family":"Simoes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45427-6_23"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/2209249.2209263"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-014-0010-4"},{"key":"ref39","year":"2009","journal-title":"Plastics&#x2014;Determination of Fracture Toughness&#x2014;Linear Elastic Fracture Mechanics (LEFM) Approach"},{"key":"ref38","author":"cimpanu","year":"2020","journal-title":"Microsoft Discloses Security Breach of Customer Support Database"},{"key":"ref33","first-page":"24","article-title":"How to break anonymity of the netflix prize dataset","volume":"5","author":"narayanan","year":"2006","journal-title":"CoRR"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1038\/449644a"},{"key":"ref31","author":"reuters","year":"2018","journal-title":"Invasion of Privacy"},{"key":"ref30","first-page":"189","author":"robison","year":"2018","journal-title":"Digitizing Privacy"},{"key":"ref37","year":"2019","journal-title":"Losing face Two more cases of third-party Facebook app data exposure"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3191268"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2018.032501749"},{"key":"ref34","first-page":"1231","article-title":"Corporate directors&#x2019; and officers&#x2019; cybersecurity standard of care: The yahoo data breach","volume":"66","author":"trautman","year":"2016","journal-title":"Am UL Rev"},{"key":"ref28","author":"polettini","year":"2003","journal-title":"A Note on The Individual Risk of Disclosure"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592668"},{"key":"ref29","author":"drake","year":"2019","journal-title":"Four Types Invasion Privacy"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.32"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"key":"ref21","author":"daintith","year":"2019","journal-title":"Dictionary of Computing"},{"key":"ref24","author":"cragin","year":"2007","journal-title":"An Educational Program on Data Curation"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/13645570701622231"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2013.12.002"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/1456441.1456453"},{"key":"ref25","volume":"173","author":"solove","year":"2009","journal-title":"Understanding Privacy"},{"key":"ref50","year":"2018","journal-title":"Clarifying Lawful Overseas Use of Data Act or the CLOUD Act"},{"key":"ref51","author":"moon","year":"2018","journal-title":"President Signs Overseas Data Access Bill Into Law"},{"key":"ref154","year":"2019","journal-title":"Risk-based De-identification Software and Services for HIPAA Compliance"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v067.i04"},{"key":"ref156","first-page":"356","author":"sweeney","year":"1998","journal-title":"Datafly a system for providing anonymity in medical data"},{"key":"ref155","first-page":"83","author":"poulis","year":"2015","journal-title":"SECRETA A Tool for Anonymizing Relational Transaction and RT-Datasets"},{"key":"ref150","article-title":"Algorithms and tools for anonymization of the Internet traffic","author":"farah","year":"2013"},{"key":"ref152","first-page":"111","author":"prasser","year":"2015","journal-title":"Putting Statistical Disclosure Control into Practice The ARX data Anonymization Tool"},{"key":"ref151","author":"plonka","year":"2003","journal-title":"IP2anonIP"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2617331"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575265"},{"key":"ref148","first-page":"280","article-title":"Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptography-based scheme","author":"xu","year":"2002","journal-title":"Proc 10th IEEE Int Conf Netw Protocols"},{"key":"ref149","author":"kristoff","year":"2019","journal-title":"IP Anonymous&#x2014;Perl Port of Crypto-PAn to Provide Anonymous IP Addresses"},{"key":"ref59","author":"schneier","year":"2013","journal-title":"Attacking Tor how the NSA targets users' online anonymity"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75551-7_12"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280687"},{"key":"ref56","article-title":"Readiness Analysis for the Adoption and Evolution of Privacy Enhancing Technologies","author":"hansen","year":"2015"},{"key":"ref55","author":"gibbs","year":"2015","journal-title":"The Guardian&#x2014;What is &#x2019;Safe Harbour&#x2019; Why Did EUCJ Just Declare it Invalid?"},{"key":"ref54","year":"2000","journal-title":"Safe Harbor Privacy Principles"},{"key":"ref53","year":"2014","journal-title":"Protecting Data and Privacy in the Cloud"},{"key":"ref52","first-page":"88","article-title":"Regulation (EU) 2016\/ 679 OF the European parliament and of the council - of 27 apr. 2016&#x2014;On the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/EC (gen","volume":"59","author":"parliament","year":"2016","journal-title":"Off J Eur Union"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIM.2018.8847000"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1145\/1743546.1743559"},{"key":"ref166","first-page":"35","article-title":"Modern information retrieval: A brief overview","volume":"24","author":"singhal","year":"2001","journal-title":"IEEE Data Eng Bull"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.4018\/jdwm.2009070101"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1145\/3172869"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6097253"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2892150"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2017.136"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2017.28"},{"key":"ref4","year":"2019","journal-title":"Cracking and Hacking Encryption Algorithms Sheds"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2637166.2637237"},{"key":"ref6","author":"lee","year":"2013","journal-title":"NSA-Proof Encryption Exists Why Doesn&#x2019;t Anyone Use It?&#x2014;The Washington Post"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629604"},{"key":"ref159","year":"2019","journal-title":"R What is R"},{"key":"ref8","first-page":"420","article-title":"Fully homomorphic encryption with relatively small key and ciphertext sizes","author":"smart","year":"2010","journal-title":"Public Key Cryptography"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1005817.1005840"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/382780.382781"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-01131-7_45"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2745139"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.027"},{"key":"ref45","author":"code","year":"1999","journal-title":"Title V of the Gramm-Leach-Bliley Act&#x2019;s (GLBA)"},{"key":"ref48","author":"greenleaf","year":"2012","journal-title":"Data Privacy Enforcement in Taiwan Macau and China"},{"key":"ref47","author":"sergey","year":"2018","journal-title":"Data Protection in Russian Federation Overview&#x2014;Practical Law"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.14778\/3231751.3231757"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IHTC.2017.8058174"},{"key":"ref44","year":"2019","journal-title":"FDIC Privacy Act Issues under Gramm-Leach-Bliley"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref127","first-page":"18","article-title":"Survey of classification techniques in data mining","volume":"1","author":"phyu","year":"2009","journal-title":"Proc Int Multi Conf Eng Comput Sci"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-12-66"},{"key":"ref125","first-page":"79","article-title":"Estimation of identification disclosure risk in microdata","volume":"14","author":"chen","year":"1998","journal-title":"J Offic Statist"},{"key":"ref124","first-page":"499","article-title":"Applying pitman&#x2019;s sampling formula to microdata disclosure risk assessment","volume":"17","author":"hoshino","year":"2001","journal-title":"J Offic Statist"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(79)90044-8"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6235"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.e4483"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250908"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.066138"},{"key":"ref70","first-page":"284","article-title":"Anonimytext: Anonimization of unstructured documents","author":"p\u00e9rez-la\u00ednez","year":"2008","journal-title":"Proc Int Conf Knowl Discovery Inf Retri"},{"key":"ref76","first-page":"157","author":"chen","year":"2008","journal-title":"A Survey of Multiplicative Perturbation for Privacy-Preserving DataMining"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/1882471.1882478"},{"key":"ref77","article-title":"Multiplicative noise for masking continuous data","author":"kim","year":"2003"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25955-8_12"},{"key":"ref133","first-page":"361","article-title":"Estimating the re-identification risk per record in microdata","volume":"14","author":"skinner","year":"1998","journal-title":"J Offic Statist"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.23919\/ISTAFRICA.2017.8102366"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1979.4766909"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/0378-3758(82)90058-1"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTD.2009.206"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-008-0119-9"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078847"},{"key":"ref135","author":"becker","year":"2009","journal-title":"Measuring Privacy Risk in Online Social Networks Web 2 0 Security and Privacy"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2016.32"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1086\/220229"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665959"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812166"},{"key":"ref62","first-page":"1","article-title":"A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management","volume":"34","author":"pfitzmann","year":"2010","journal-title":"Technical U Dresden"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1540276.1540279"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0028071"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2015.7237310"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2906310"},{"key":"ref65","author":"goulden","year":"2004","journal-title":"Combinatorial Enumeration"},{"key":"ref141","author":"star","year":"2015","journal-title":"Open Anonymizer"},{"key":"ref66","first-page":"63","article-title":"Flaim: A multi-level anonymization framework for computer and network logs","author":"slagell","year":"2006","journal-title":"Proc 20th Conf Large Install Syst Admin"},{"key":"ref142","year":"2015","journal-title":"Anon Tool"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1049\/el:19810070"},{"key":"ref143","first-page":"1","article-title":"Canine: A combined conversion and anonymization tool for processing netflows for security","volume":"21","author":"li","year":"2005","journal-title":"Proc 10th Int Conf Telecommun Syst Model Anal"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.07.035"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550306"},{"key":"ref2","author":"dunn","year":"2018","journal-title":"Uber Data Breach Aided by Lack Multi-Factor Authentication"},{"key":"ref69","first-page":"531","article-title":"The boundary between privacy and utility in data publishing","author":"rastogi","year":"2007","journal-title":"Proc Int Conf On Very Large Data Bases"},{"key":"ref145","first-page":"19","article-title":"SCRUB-PA: A multi-level multi-dimensional anonymization tool for process accounting","volume":"4","author":"luo","year":"2006","journal-title":"CoRR"},{"key":"ref1","author":"kirk","year":"2014","journal-title":"JP Morgan Chase Says Breach Affected 83M Customers"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.5120\/20421-2721"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/560484"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"ref107","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/B978-0-12-800161-5.00002-5","article-title":"Chapter two&#x2014;A survey on zero-knowledge proofs","volume":"94","author":"li","year":"2014","journal-title":"Advances in Computers"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401904"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/22145.22178"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75248-6_9"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98113-0_11"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376666"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214086"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350255"},{"key":"ref103","first-page":"325","article-title":"Secure multiparty computation Goes live","author":"bogetoft","year":"2009","journal-title":"Financial Cryptography Data Security"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-557-3.ch189"},{"key":"ref111","article-title":"Enhancing cloud security using data anonymization","author":"sedayao","year":"2012"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1145\/1667067.1667071"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2959948"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/2937754"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2546"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2716"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247554"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"ref11","author":"gantz","year":"2012","journal-title":"THE DIGITAL UNIVERSE in 2020 Big Data Bigger Digital Shadows and Biggest Growth in the Far East"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1111\/j.1748-720X.1997.tb01885.x"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3168389"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3182658"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101889"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.04.011"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2600258"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3042530"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2906153"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3294052.3322188"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.jnca.2016.09.002","article-title":"A survey on cloud computing security: Issues, threats, and solutions","volume":"75","author":"singh","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref84","first-page":"46","article-title":"Data privacy protection&#x2014;Concealing text and audio with a dna-inspired algorithm","author":"silva","year":"2018","journal-title":"Proc 12th Int Conf Auto Infrastruct Manage Secur"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2945367"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.07.006"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15838-4_17"},{"key":"ref114","article-title":"Federated optimization:Distributed optimization beyond the datacenter","author":"kone\u00e4n\u00fd","year":"2015","journal-title":"arXiv 1511 03575"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/CCEM.2014.7015496"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9163027"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2010.07.001"},{"key":"ref115","article-title":"Federated optimization: Distributed machine learning for on-device intelligence","author":"kone\u00e4n\u00fd","year":"2016","journal-title":"arXiv 1610 02527"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2929409"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/1857947.1857950"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2991416"},{"key":"ref122","article-title":"Billion-scale federated learning on mobile clients: A submodel design with tunable privacy","author":"niu","year":"2020","journal-title":"Proc 26th Annu Int Conf Mobile Comput Netw"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775089"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5_2"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09316301.pdf?arnumber=9316301","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:56:01Z","timestamp":1639770961000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9316301\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":170,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3049599","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}