๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications

โœ Scribed by Wen Ming Liu; Lingyu Wang


Publisher
Springer
Year
2016
Tongue
English
Leaves
142
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic strategy independent of data utility measures and syntactic privacy properties before discussing an extended approach to improve the efficiency. Next, the book explores privacy-preserving traffic padding in Web applications, first via a model to quantify privacy and cost and then by introducing randomness to provide background knowledge-resistant privacy guarantee. Finally, the book considers privacy-preserving smart metering by proposing a light-weight approach to simultaneously preserving users' privacy and ensuring billing accuracy. Designed for researchers and professionals, this book is also suitable for advanced-level students interested in privacy, algorithms, or web applications.


๐Ÿ“œ SIMILAR VOLUMES


Preserving Privacy Against Side-Channel
โœ Wen Ming Liu, Lingyu Wang (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p>This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic

Introduction to Privacy-Preserving Data
โœ Benjamin C.M. Fung, Ke Wang, Ada Wai-Chee Fu, Philip S. Yu ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› Chapman and Hall/CRC ๐ŸŒ English

Gaining access to high-quality data is a vital necessity in knowledge-based decision making. But data in its raw form often contains sensitive information about individuals. Providing solutions to this problem, the methods and tools of privacy-preserving data publishing enable the publication of use

Privacy Preserving Data Mining
โœ Jaideep Vaidya, Yu Michael Zhu, Christopher W. Clifton (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› Springer US ๐ŸŒ English

<p><P>Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium

Privacy Preserving Data Mining
โœ Jaideep Vaidya, Chris Clifton, Michael Zhu ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Springer ๐ŸŒ English

Privacy and security concerns restrict the sharing of data. There are both legal and commercial reasons to forbid the release of data. Privacy preserving data mining has come to be seen as a solution to this problem. Privacy preserving data mining implies the "mining" of knowledge from distributed d

Privacy Preserving Data Mining
โœ Vladan Devedzic ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Springer ๐ŸŒ English

<P>Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium Ac