Burkhart, M., Strasser, M., Many, D., and Dimitropoulos,
X. (2010). Sepia: Privacy-preserving aggregation of
multi-domain network events and statistics. Network,
1(101101).
CISPE (2019). CISPE Handbook. https://cispe.cloud/. Ac-
cessed July 2019.
Coats, B. and Acharya, S. (2014). Leveraging the cloud for
electronic health record access. Perspectives in health
information management, 11(Winter).
De Capitani di Vimercati, S., Erbacher, R. F., Foresti, S.,
Jajodia, S., Livraga, G., and Samarati, P. (2013). En-
cryption and fragmentation for data confidentiality in
the cloud. In Foundations of Security Analysis and
Design VII, pages 212–243. Springer.
Ganapathy, S. et al. (2019). A secured storage and privacy-
preserving model using crt for providing security on
cloud and iot-based applications. Computer Networks,
151:181–190.
Huang, Q., Yang, Y., and Shen, M. (2017). Secure and ef-
ficient data collaboration with hierarchical attribute-
based encryption in cloud computing. Future Gener-
ation Computer Systems, 72:239–249.
Microsoft (2019). Azure Information Protection.
https://docs.microsoft.com/en-us/azure/information-
protection/what-is-information-protection. Accessed
July 2019.
Nickel, J. (2019). Mastering Identity and Access Manage-
ment with Microsoft Azure: Empower users by man-
aging and protecting identities and data. Packt Pub-
lishing Ltd.
Pasquier, T., Bacon, J., Singh, J., and Eyers, D. (2016).
Data-centric access control for cloud computing. In
Proceedings of the 21st ACM on Symposium on Ac-
cess Control Models and Technologies, pages 81–88.
ACM.
Pedersen, T. P. (1991). A threshold cryptosystem without a
trusted party. In Workshop on the Theory and Applica-
tion of of Cryptographic Techniques, pages 522–526.
Springer.
Puthal, D., Wu, X., Nepal, S., Ranjan, R., and Chen, J.
(2017). Seen: A selective encryption method to en-
sure confidentiality for big sensing data streams. IEEE
Transactions on Big Data.
Rios, E., Iturbe, E., Larrucea, X., Rak, M., Mallouli, W.,
Dominiak, J., Munt
´
es, V., Matthews, P., and Gonzalez,
L. (2019). Service level agreement-based gdpr com-
pliance and security assurance in (multi) cloud-based
systems. IET Software.
Rittinghouse, J. W. and Ransome, J. F. (2017). Cloud com-
puting: implementation, management, and security.
CRC press.
Rushe, D. (2019). Cryptocurrency investors locked out of
$190m after exchange founder dies. The Guardian.
Sajid, A. and Abbas, H. (2016). Data privacy in cloud-
assisted healthcare systems: state of the art and future
challenges. Journal of medical systems, 40(6):155.
Singh, A. and Chatterjee, K. (2017). Cloud security issues
and challenges: A survey. Journal of Network and
Computer Applications, 79:88–115.
Singh, K. and Batten, L. (2017). Aggregating privatized
medical data for secure querying applications. Future
Generation Computer Systems, 72:250–263.
Song, D., Shi, E., Fischer, I., and Shankar, U. (2012). Cloud
data protection for the masses. Computer, 45(1):39–
45.
Sood, S. K. (2012). A combined approach to ensure data
security in cloud computing. Journal of Network and
Computer Applications, 35(6):1831–1838.
Subashini, S. and Kavitha, V. (2011). A survey on security
issues in service delivery models of cloud comput-
ing. Journal of network and computer applications,
34(1):1–11.
Vu, Q. H., Colombo, M., Asal, R., Sajjad, A., El-Moussa,
F. A., and Dimitrakos, T. (2015). Secure cloud stor-
age: a framework for data protection as a service in
the multi-cloud environment. In 2015 IEEE Con-
ference on Communications and Network Security
(CNS), pages 638–642. IEEE.
Xie, H., Yang, Y. R., Krishnamurthy, A., Liu, Y. G., and Sil-
berschatz, A. (2008). P4p: Provider portal for applica-
tions. In ACM SIGCOMM Computer Communication
Review, volume 38, pages 351–362. ACM.
Y
¨
uksel, B., K
¨
upc¸
¨
u, A., and
¨
Ozkasap,
¨
O. (2017). Research
issues for privacy and security of electronic health ser-
vices. Future Generation Computer Systems, 68:1–13.
Zuo, C., Shao, J., Liu, J. K., Wei, G., and Ling, Y. (2017).
Fine-grained two-factor protection mechanism for
data sharing in cloud storage. IEEE Transactions on
Information Forensics and Security, 13(1):186–196.
ICISSP 2020 - 6th International Conference on Information Systems Security and Privacy
368