2Itani W, Kayssi A, Chehab A. Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures, Proceedings of the 8th IEEE International Conference on Dependable, Autonomic and Secure Computing. Chengdu, China: IEEE Computer Society, 2009: 711-716.
3Roy I, Ramadan H, Setty S, et al. Airavat: Security and privacy for map reduce, Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation. San Jose, USA: USENIX Association Berkeley, 2010: 297-312.
4Mowbray M, Pearson S. A client-based privacy manager for cloud computing, Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, New York, USA: Association for Computing Machinery, 2009.
5Creese S, Hopkins P, Pearson S, et al. Data protection-aw are design for cloud services, Proceedings of the 1st International Conference on Cloud Computing. Lecture Notes in Computer Science. Beijing, China: Springer, 2009: 119-130.
6L. Cheung and C. Newport. Provably Secure Ciphertext Policy ABE, In Proc. of CCS' 07, New York, NY, USA, 2007.456-465.