Return to Article Details Data Protection based on Searchable Encryption and Anonymization Techniques Download Download PDF