Preserving Privacy in Data Outsourcing

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, t...

Full description

Bibliographic Details
Main Author: Foresti, Sara
Format: eBook
Language:English
Published: New York, NY Springer US 2011, 2011
Edition:1st ed. 2011
Series:Advances in Information Security
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03525nmm a2200397 u 4500
001 EB000362567
003 EBX01000000000000000215619
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9781441976598 
100 1 |a Foresti, Sara 
245 0 0 |a Preserving Privacy in Data Outsourcing  |h Elektronische Ressource  |c by Sara Foresti 
250 |a 1st ed. 2011 
260 |a New York, NY  |b Springer US  |c 2011, 2011 
300 |a XV, 180 p  |b online resource 
505 0 |a Introduction -- Related work -- Selective encryption to enforce access control -- Combining fragmentation and encryption to protect data privacy -- Distributed query processing under safely composed permissions -- Conclusions 
653 |a Cryptography 
653 |a Information Storage and Retrieval 
653 |a Data Structures and Information Theory 
653 |a Database Management 
653 |a Information storage and retrieval systems 
653 |a Information theory 
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Data structures (Computer science) 
653 |a Cryptology 
653 |a Data and Information Security 
653 |a Database management 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Advances in Information Security 
028 5 0 |a 10.1007/978-1-4419-7659-8 
856 4 0 |u https://doi.org/10.1007/978-1-4419-7659-8?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release. Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book. Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondarytext or reference book