Cargando…

Preserving Privacy in Data Outsourcing

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Foresti, Sara (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer US : Imprint: Springer, 2011.
Edición:1st ed. 2011.
Colección:Advances in Information Security, 99
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-1-4419-7659-8
003 DE-He213
005 20220118212339.0
007 cr nn 008mamaa
008 101013s2011 xxu| s |||| 0|eng d
020 |a 9781441976598  |9 978-1-4419-7659-8 
024 7 |a 10.1007/978-1-4419-7659-8  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Foresti, Sara.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Preserving Privacy in Data Outsourcing  |h [electronic resource] /  |c by Sara Foresti. 
250 |a 1st ed. 2011. 
264 1 |a New York, NY :  |b Springer US :  |b Imprint: Springer,  |c 2011. 
300 |a XV, 180 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Advances in Information Security,  |x 2512-2193 ;  |v 99 
505 0 |a Introduction -- Related work -- Selective encryption to enforce access control -- Combining fragmentation and encryption to protect data privacy -- Distributed query processing under safely composed permissions -- Conclusions. 
520 |a Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release. Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book. Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book. 
650 0 |a Data protection. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 0 |a Information storage and retrieval systems. 
650 0 |a Database management. 
650 1 4 |a Data and Information Security. 
650 2 4 |a Cryptology. 
650 2 4 |a Data Structures and Information Theory. 
650 2 4 |a Information Storage and Retrieval. 
650 2 4 |a Database Management. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781441976581 
776 0 8 |i Printed edition:  |z 9781461426998 
776 0 8 |i Printed edition:  |z 9781441976604 
830 0 |a Advances in Information Security,  |x 2512-2193 ;  |v 99 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-1-4419-7659-8  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)