
Chapter 15
Secure Outsourcing of Data
Analysis
Jun Sakuma
CONTENTS
15.1 Utilization of Personal Data in the Cloud .......................................... 358
15.1.1 Cloud and personal data .................................................. 358
15.1.2 Stakeholder .............................................................. 358
15.1.3 Privacy-enhancing technologies for t he cloud .............................. 359
15.2 Anonymization ................................................................... 360
15.2.1 Personal identifiable information .......................................... 360
15.2.2 Personal data anonymity in the cloud ...................................... ...