Preserving Privacy in Data Outsourcing : Advances in Information Security - Sara Foresti

Preserving Privacy in Data Outsourcing

By: Sara Foresti

Hardcover | 13 October 2010

At a Glance

Hardcover


$187.31

or 4 interest-free payments of $46.83 with

 or 

Aims to ship in 7 to 10 business days

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

Other Editions and Formats

Paperback

Published: 1st December 2012

More in Data Encryption

Cybercrime : An Encyclopedia of Digital Crime - Nancy E. Marion

RRP $59.99

$49.25

18%
OFF
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Guide to Computer Forensics and Investigations : 7th Edition - Christopher Steuart
Hackers & Painters - Paul Graham

RRP $47.50

$26.50

44%
OFF
Network Security Assessment : Know Your Network : 3rd Edition - Chris Mcnab
Management of Information Security : 6th edition - Michael E. Whitman

RRP $144.95

$119.75

17%
OFF
Principles of Information Security : 7th edition - Michael E. Whitman

RRP $159.95

$130.75

18%
OFF
There's No Such Thing as Crypto Crime : An Investigative Handbook - Nick Furneaux
Blockchain : Blueprint for a New Economy - Melanie Swan

RRP $66.50

$30.75

54%
OFF
Intelligence-Driven Incident Response : Outwitting the Adversary - Rebekah Brown
Mastering Ethereum : Building Smart Contracts and Dapps - Andreas Antonopoulos
Programming Bitcoin : Learn How to Program Bitcoin from Scratch - Jimmy Song