Protecting sensitive data in the cloud-to-edge continuum: The FogProtect approach.
Dhouha AyedPaul-Andrei DraganEdith FélixZoltán Ádám MannEliot E. SalantRobert SeidlAnestis SidiropoulosSteve TaylorRicardo VitorinoPublished in: CCGRID (2022)
Keyphrases
- sensitive data
- protection mechanisms
- privacy preservation
- privacy preserving
- unauthorized access
- data storage
- information security
- smart card
- sensitive information
- data protection
- security concerns
- third party
- data sharing
- confidential data
- data confidentiality
- cloud computing
- privacy protection
- malicious users
- data privacy
- personal data
- encrypted data
- database
- business intelligence
- access control
- data management