2020
DOI: 10.1007/s11277-020-07320-3
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Based Data Publishing Model for Cloud Computing Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 37 publications
0
4
0
Order By: Relevance
“…By anonymizing and encrypting an individual's personal information using solid passwords, companies can reduce the risk of external attacks. According www.ijacsa.thesai.org to [13], these encryption protocols can help a company manage its security measures while meeting regulatory requirements. The use of data handling procedures is also essential in this case.…”
Section: E Protecting Data and Meeting Regulations: Balancing Privacy...mentioning
confidence: 99%
“…By anonymizing and encrypting an individual's personal information using solid passwords, companies can reduce the risk of external attacks. According www.ijacsa.thesai.org to [13], these encryption protocols can help a company manage its security measures while meeting regulatory requirements. The use of data handling procedures is also essential in this case.…”
Section: E Protecting Data and Meeting Regulations: Balancing Privacy...mentioning
confidence: 99%
“…Bibal Benifa and Venifa Mini 19 introduced a Genetic Gray Wolf Optimization method for the preservation of private documents and maintaining the sensitive records of patients which are stored in the cloud platform. The protected records are selected for publication thus, the data are secured against the attackers who forged to view the sensitive documents.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In 2020, Bibal et al 25 have employed k‐anonymization model for upgrading the privacy strategies in cloud storages. Along with this, the GGWO model was deployed that decided the data to be published depending on the data conserved for confidentiality purposes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Nevertheless, cluster similarity was formulated only for arithmetical data. GGWO algorithm used in Reference 25 offers minimal information losses with high utility, but it needs to exploit varied datasets for publishing phase.…”
Section: Literature Reviewmentioning
confidence: 99%