Preserving Privacy in Data Outsourcing : by Sara Foresti Springer 2011 ISBN - 13 : 978 - 0 - 387 - 87968 - 0

نویسندگان

  • Sara Foresti
  • Jothi Rangasamy
چکیده

This book presents the author’s collective research publications on methods to securely outsource data. Secure data outsourcing has become a hot topic of research since its widespread use in multimedia sharing, health care and financial systems. This book is particularly useful to the readers who are interested in doing research related to secure data outsourcing in order to gain a deeper knowledge in analysing the security properties that should be considered when the data is stored by the honest but curious server.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

k -Anonymous Data Mining: A Survey

Data mining technology has attracted significant interest as a means of identifying patterns and trends from large collections of data. It is however evident that the collection and analysis of data that include personal information may violate the privacy of the individuals to whom information refers. Privacy protection in data mining is then becoming a crucial issue that has captured the atte...

متن کامل

An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing

Data outsourcing is emerging today as a successful solution for organizations looking for a cost-effective way to make their data available for on-line querying. To protect outsourced data from unauthorized accesses, even from the (honest but curious) host server, data are encrypted and indexes associated with them enable the server to execute queries without the need of accessing cleartext. Cu...

متن کامل

Measuring Inference Exposure in Outsourced Encrypted Databases

Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where an encrypted client’s database is stored at an external service provider. Existing proposals for querying encrypted databases are based on the association, with each encrypted tuple, of additional indexing information obtained from the plaintext values of attributes that can be ...

متن کامل

Chapter 5.1 – Protecting Data in Outsourcing Scenarios

Goal of this chapter is to describe the main solutions being devised for protecting data confidentiality and integrity in outsourcing scenarios. In particular, we illustrate approaches that guarantee data confidentiality by applying encryption or a combination of encryption and fragmentation. We then focus on approaches that aim at guaranteeing data integrity in storage and in query computation...

متن کامل

Private Data Analysis via Output Perturbation - A Rigorous Approach to Constructing Sanitizers and Privacy Preserving Algorithms

We describe output perturbation techniques that allow for a provable, rigorous sense of individual privacy. Examples where the techniques are effective span from basic statistical computations to sophisticated machine learning algorithms.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013