This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic str
Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications
โ Scribed by Wen Ming Liu, Lingyu Wang (auth.)
- Publisher
- Springer International Publishing
- Year
- 2016
- Tongue
- English
- Leaves
- 154
- Series
- Advances in Information Security 68
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic strategy independent of data utility measures and syntactic privacy properties before discussing an extended approach to improve the efficiency. Next, the book explores privacy-preserving traffic padding in Web applications, first via a model to quantify privacy and cost and then by introducing randomness to provide background knowledge-resistant privacy guarantee. Finally, the book considers privacy-preserving smart metering by proposing a light-weight approach to simultaneously preserving users' privacy and ensuring billing accuracy. Designed for researchers and professionals, this book is also suitable for advanced-level students interested in privacy, algorithms, or web applications.
โฆ Table of Contents
Front Matter....Pages i-xiii
Introduction....Pages 1-6
Related Work....Pages 7-16
Data Publishing: Trading Off Privacy with Utility Through the k-Jump Strategy....Pages 17-44
Data Publishing: A Two-Stage Approach to Improving Algorithm Efficiency....Pages 45-70
Web Applications: k-Indistinguishable Traffic Padding....Pages 71-97
Web Applications: Background-Knowledge Resistant Random Padding....Pages 99-123
Smart Metering: Inferences of Appliance Status from Fine-Grained Readings....Pages 125-132
The Big Picture: A Generic Model of Side-Channel Leaks....Pages 133-142
โฆ Subjects
Systems and Data Security;Data Encryption;Information Systems and Communication Service;Computer Communication Networks
๐ SIMILAR VOLUMES
Gaining access to high-quality data is a vital necessity in knowledge-based decision making. But data in its raw form often contains sensitive information about individuals. Providing solutions to this problem, the methods and tools of privacy-preserving data publishing enable the publication of use
<p><P>Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium
Privacy and security concerns restrict the sharing of data. There are both legal and commercial reasons to forbid the release of data. Privacy preserving data mining has come to be seen as a solution to this problem. Privacy preserving data mining implies the "mining" of knowledge from distributed d
<P>Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium Ac