|
| Methods | Authors | Contributions | Computing paradigm | Support for service composition | Support for semantic |
|
Computing process oriented privacy protection d | Modeling and verification | Hamadi et al. [13] | Conceptual modeling of privacy-aware web service | Service computing | ✗ | ✓ |
Guermouche et al. [14] | Privacy-aware web service protocol replaceability | Service computing | ✗ | ✓ |
Mokhtari et al. [15] | Verification of privacy timed properties | Service computing | ✗ | ✗ |
LinYuan et al. [16] | Minimal privacy authorization in web services collaboration | Service computing | ✓ | ✗ |
Matching | Barth et al. [17] | Privacy and utility in business processes | Service computing | ✓ | ✓ |
Wei et al. [18] | Privacy-protection policy for pervasive computing | Pervasive computing | ✗ | ✓ |
Our work | Outsourcing service orientedprivacy conflict detection Method in cloud computing | Cloud Computing | ✓ | ✓ |
Negotiation |
Zhu and Zhou [19] |
Role-based collaboration and its kernel mechanisms | N/A | N/A | ✗ |
El-Khatib [20] | A privacy negotiation protocol for web services | Service Computing | ✗ | ✗ |
Zhang and Fen [21] |
Parsimonious semantic trust negotiation | N/A | N/A | ✓ |
Disclosure | Kolter et al. [22] | Visualizing past personal data disclosures | Service computing | ✗ | ✗ |
LinYuan et al.[23] |
Analysis of the minimal privacy disclosure | Service computing | ✓ | ✗ |
Risk |
Yu et al. [24] | Modeling and measuring privacy risks | Service computing | ✓ | ✗ |
Hong et al. [25] | Privacy risk models | Ubiquitous computing | ✗ | ✓ |
|
Data oriented privacy protection | Obfuscation |
Weiwei and Zhihong [26] | A mixed mode data obfuscation method AENDO | N/A | N/A | ✗ |
Bakken et al. [27] | Anonymity and desensitization of usable data sets | N/A | N/A | ✗ |
Encryption | Bao et al. [28] | An efficient and practical scheme for privacy protection in the e-commerce of digital goods | N/A | N/A | ✗ |
Gilburd et al. [29] | k-TTP: a new privacy model for large-scale distributed environments | N/A | N/A | ✗ |
Anonymity |
Ye et al. [30] | Anonymizing classification data using rough set theory | N/A | N/A | ✗ |
Sweeney [31] | Achieving k-anonymity privacy protection using generalization and suppression | N/A | N/A | ✗ |
|