๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications

โœ Scribed by Wen Ming Liu, Lingyu Wang (auth.)


Publisher
Springer International Publishing
Year
2016
Tongue
English
Leaves
154
Series
Advances in Information Security 68
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic strategy independent of data utility measures and syntactic privacy properties before discussing an extended approach to improve the efficiency. Next, the book explores privacy-preserving traffic padding in Web applications, first via a model to quantify privacy and cost and then by introducing randomness to provide background knowledge-resistant privacy guarantee. Finally, the book considers privacy-preserving smart metering by proposing a light-weight approach to simultaneously preserving users' privacy and ensuring billing accuracy. Designed for researchers and professionals, this book is also suitable for advanced-level students interested in privacy, algorithms, or web applications.

โœฆ Table of Contents


Front Matter....Pages i-xiii
Introduction....Pages 1-6
Related Work....Pages 7-16
Data Publishing: Trading Off Privacy with Utility Through the k-Jump Strategy....Pages 17-44
Data Publishing: A Two-Stage Approach to Improving Algorithm Efficiency....Pages 45-70
Web Applications: k-Indistinguishable Traffic Padding....Pages 71-97
Web Applications: Background-Knowledge Resistant Random Padding....Pages 99-123
Smart Metering: Inferences of Appliance Status from Fine-Grained Readings....Pages 125-132
The Big Picture: A Generic Model of Side-Channel Leaks....Pages 133-142

โœฆ Subjects


Systems and Data Security;Data Encryption;Information Systems and Communication Service;Computer Communication Networks


๐Ÿ“œ SIMILAR VOLUMES


Preserving Privacy Against Side-Channel
โœ Wen Ming Liu; Lingyu Wang ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› Springer ๐ŸŒ English

This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic str

Introduction to Privacy-Preserving Data
โœ Benjamin C.M. Fung, Ke Wang, Ada Wai-Chee Fu, Philip S. Yu ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› Chapman and Hall/CRC ๐ŸŒ English

Gaining access to high-quality data is a vital necessity in knowledge-based decision making. But data in its raw form often contains sensitive information about individuals. Providing solutions to this problem, the methods and tools of privacy-preserving data publishing enable the publication of use

Privacy Preserving Data Mining
โœ Jaideep Vaidya, Yu Michael Zhu, Christopher W. Clifton (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› Springer US ๐ŸŒ English

<p><P>Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium

Privacy Preserving Data Mining
โœ Jaideep Vaidya, Chris Clifton, Michael Zhu ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Springer ๐ŸŒ English

Privacy and security concerns restrict the sharing of data. There are both legal and commercial reasons to forbid the release of data. Privacy preserving data mining has come to be seen as a solution to this problem. Privacy preserving data mining implies the "mining" of knowledge from distributed d

Privacy Preserving Data Mining
โœ Vladan Devedzic ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Springer ๐ŸŒ English

<P>Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium Ac