๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Preserving Privacy in Data Outsourcing

โœ Scribed by Sara Foresti (auth.)


Publisher
Springer US
Year
2011
Tongue
English
Leaves
194
Series
Advances in Information Security 51
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

โœฆ Table of Contents


Front Matter....Pages i-xv
Introduction....Pages 1-7
Overview of the State of the Art....Pages 9-30
Selective Encryption to Enforce Access Control....Pages 31-84
Combining Fragmentation and Encryption to Protect Data Privacy....Pages 85-134
Distributed Query Processing under Safely Composed Permissions....Pages 135-169
Conclusions....Pages 171-174
Back Matter....Pages 175-180

โœฆ Subjects


Systems and Data Security; Data Encryption; Data Structures, Cryptology and Information Theory; Information Storage and Retrieval; Database Management


๐Ÿ“œ SIMILAR VOLUMES


Preserving Privacy in Data Outsourcing
โœ Sara Foresti (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2011 ๐Ÿ› Springer US ๐ŸŒ English

<p><P>Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive d

Privacy Preserving Data Mining
โœ Jaideep Vaidya, Yu Michael Zhu, Christopher W. Clifton (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› Springer US ๐ŸŒ English

<p><P>Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium

Privacy Preserving Data Mining
โœ Jaideep Vaidya, Chris Clifton, Michael Zhu ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Springer ๐ŸŒ English

Privacy and security concerns restrict the sharing of data. There are both legal and commercial reasons to forbid the release of data. Privacy preserving data mining has come to be seen as a solution to this problem. Privacy preserving data mining implies the "mining" of knowledge from distributed d

Privacy Preserving Data Mining
โœ Vladan Devedzic ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Springer ๐ŸŒ English

<P>Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium Ac

HCI Challenges and Privacy Preservation
โœ Daphne Lopez, M.A. Saleem Durai ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› IGI Global ๐ŸŒ English

Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Secu