Preserving Privacy in Data Outsourcing : by Sara Foresti Springer 2011 ISBN - 13 : 978 - 0 - 387 - 87968 - 0
نویسندگان
چکیده
This book presents the author’s collective research publications on methods to securely outsource data. Secure data outsourcing has become a hot topic of research since its widespread use in multimedia sharing, health care and financial systems. This book is particularly useful to the readers who are interested in doing research related to secure data outsourcing in order to gain a deeper knowledge in analysing the security properties that should be considered when the data is stored by the honest but curious server.
منابع مشابه
k -Anonymous Data Mining: A Survey
Data mining technology has attracted significant interest as a means of identifying patterns and trends from large collections of data. It is however evident that the collection and analysis of data that include personal information may violate the privacy of the individuals to whom information refers. Privacy protection in data mining is then becoming a crucial issue that has captured the atte...
متن کاملAn Experimental Evaluation of Multi-Key Strategies for Data Outsourcing
Data outsourcing is emerging today as a successful solution for organizations looking for a cost-effective way to make their data available for on-line querying. To protect outsourced data from unauthorized accesses, even from the (honest but curious) host server, data are encrypted and indexes associated with them enable the server to execute queries without the need of accessing cleartext. Cu...
متن کاملMeasuring Inference Exposure in Outsourced Encrypted Databases
Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where an encrypted client’s database is stored at an external service provider. Existing proposals for querying encrypted databases are based on the association, with each encrypted tuple, of additional indexing information obtained from the plaintext values of attributes that can be ...
متن کاملChapter 5.1 – Protecting Data in Outsourcing Scenarios
Goal of this chapter is to describe the main solutions being devised for protecting data confidentiality and integrity in outsourcing scenarios. In particular, we illustrate approaches that guarantee data confidentiality by applying encryption or a combination of encryption and fragmentation. We then focus on approaches that aim at guaranteeing data integrity in storage and in query computation...
متن کاملPrivate Data Analysis via Output Perturbation - A Rigorous Approach to Constructing Sanitizers and Privacy Preserving Algorithms
We describe output perturbation techniques that allow for a provable, rigorous sense of individual privacy. Examples where the techniques are effective span from basic statistical computations to sophisticated machine learning algorithms.
متن کامل