{"id":"https://openalex.org/W4413679543","doi":"https://doi.org/10.1109/csr64739.2025.11130151","title":"Practical confidential data cleaning using trusted execution environments","display_name":"Practical confidential data cleaning using trusted execution environments","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413679543","doi":"https://doi.org/10.1109/csr64739.2025.11130151"},"language":"en","primary_location":{"id":"doi:10.1109/csr64739.2025.11130151","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130151","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043883509","display_name":"Anirban Basu","orcid":"https://orcid.org/0000-0001-5438-0959"},"institutions":[{"id":"https://openalex.org/I65143321","display_name":"Hitachi (Japan)","ror":"https://ror.org/02exqgm79","country_code":"JP","type":"company","lineage":["https://openalex.org/I65143321"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Anirban Basu","raw_affiliation_strings":["Hitachi, Ltd. Yokohama,Kanagawa,Japan"],"affiliations":[{"raw_affiliation_string":"Hitachi, Ltd. Yokohama,Kanagawa,Japan","institution_ids":["https://openalex.org/I65143321"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083154352","display_name":"Masayuki Yoshino","orcid":null},"institutions":[{"id":"https://openalex.org/I65143321","display_name":"Hitachi (Japan)","ror":"https://ror.org/02exqgm79","country_code":"JP","type":"company","lineage":["https://openalex.org/I65143321"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masayuki Yoshino","raw_affiliation_strings":["Hitachi, Ltd. Yokohama,Kanagawa,Japan"],"affiliations":[{"raw_affiliation_string":"Hitachi, Ltd. Yokohama,Kanagawa,Japan","institution_ids":["https://openalex.org/I65143321"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011302365","display_name":"Minako Toba","orcid":null},"institutions":[{"id":"https://openalex.org/I65143321","display_name":"Hitachi (Japan)","ror":"https://ror.org/02exqgm79","country_code":"JP","type":"company","lineage":["https://openalex.org/I65143321"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Minako Toba","raw_affiliation_strings":["Hitachi, Ltd. Yokohama,Kanagawa,Japan"],"affiliations":[{"raw_affiliation_string":"Hitachi, Ltd. Yokohama,Kanagawa,Japan","institution_ids":["https://openalex.org/I65143321"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5043883509"],"corresponding_institution_ids":["https://openalex.org/I65143321"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37832073,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"342","last_page":"349"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9860000014305115,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9860000014305115,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9639999866485596,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9362999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7566070556640625},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.7196661233901978},{"id":"https://openalex.org/keywords/trusted-platform-module","display_name":"Trusted Platform Module","score":0.550630509853363},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5412042737007141},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.4872511923313141},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.3973506689071655}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7566070556640625},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.7196661233901978},{"id":"https://openalex.org/C202775310","wikidata":"https://www.wikidata.org/wiki/Q1140366","display_name":"Trusted Platform Module","level":2,"score":0.550630509853363},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5412042737007141},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.4872511923313141},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.3973506689071655}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr64739.2025.11130151","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130151","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2044469685","https://openalex.org/W2049058890","https://openalex.org/W2122646361","https://openalex.org/W2419749112","https://openalex.org/W2437617937","https://openalex.org/W2797647106","https://openalex.org/W2913731660","https://openalex.org/W3045874819","https://openalex.org/W3046491668","https://openalex.org/W3184778778","https://openalex.org/W3196743233","https://openalex.org/W4241561347","https://openalex.org/W4385899733","https://openalex.org/W4391970032"],"related_works":["https://openalex.org/W2355956995","https://openalex.org/W2354645290","https://openalex.org/W2390768934","https://openalex.org/W2695299078","https://openalex.org/W2372678089","https://openalex.org/W1497930374","https://openalex.org/W2168345601","https://openalex.org/W2365715481","https://openalex.org/W2374998183","https://openalex.org/W104943326"],"abstract_inverted_index":{"Data":[0,54],"cleaning,":[1,55],"also":[2],"known":[3],"as":[4,34],"data":[5,8,40,77,87,98],"cleansing":[6],"or":[7],"scrubbing,":[9],"is":[10,24],"the":[11,35,38,43,48,92,97,114],"process":[12],"of":[13,37,47,96],"identifying":[14],"and":[15,19,31,45,60,74,94,110],"correcting":[16],"errors,":[17],"inconsistencies,":[18],"inaccuracies":[20],"in":[21,28,108],"datasets.":[22],"It":[23],"a":[25,84],"crucial":[26],"step":[27],"statistical":[29],"analysis":[30],"machine":[32],"learning":[33],"quality":[36],"input":[39],"directly":[41],"affects":[42],"reliability":[44],"validity":[46],"results":[49],"obtained":[50],"from":[51],"any":[52],"analysis.":[53],"when":[56],"outsourced,":[57],"poses":[58],"privacy":[59,73,93],"confidentiality":[61,75,95],"challenges.":[62],"To":[63],"address":[64],"these,":[65],"there":[66],"has":[67],"been":[68],"recent":[69],"research":[70],"focus":[71],"on":[72,119],"preserving":[76],"cleaning.":[78],"In":[79],"this":[80],"paper,":[81],"we":[82],"propose":[83],"practical":[85],"qualitative":[86],"cleaning":[88],"system":[89,107,118],"that":[90],"preserves":[91],"utilising":[99],"trusted":[100],"execution":[101],"environments.":[102],"We":[103],"have":[104],"implemented":[105],"our":[106],"Python":[109],"deployed":[111],"it":[112],"using":[113],"Gramine":[115],"library":[116],"operating":[117],"Intel":[120],"Software":[121],"Guard":[122],"Extensions":[123],"(SGX)":[124],"hardware.":[125]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
