000 03996nam a22005175i 4500
001 u371991
003 SIRSI
005 20160812080159.0
007 cr nn 008mamaa
008 101013s2011 xxu| s |||| 0|eng d
020 _a9781441976598
_9978-1-4419-7659-8
040 _cMX-MeUAM
050 4 _aQA76.9.A25
082 0 4 _a005.8
_223
100 1 _aForesti, Sara.
_eauthor.
245 1 0 _aPreserving Privacy in Data Outsourcing
_h[recurso electrónico] /
_cby Sara Foresti.
264 1 _aBoston, MA :
_bSpringer US,
_c2011.
300 _aXV, 180 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x1568-2633 ;
_v51
505 0 _aIntroduction -- Related work -- Selective encryption to enforce access control -- Combining fragmentation and encryption to protect data privacy -- Distributed query processing under safely composed permissions -- Conclusions.
520 _aPrivacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release. Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book. Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.
650 0 _aComputer science.
650 0 _aData protection.
650 0 _aData structures (Computer science).
650 0 _aData encryption (Computer science).
650 0 _aDatabase management.
650 0 _aInformation storage and retrieval systems.
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aData Encryption.
650 2 4 _aData Structures, Cryptology and Information Theory.
650 2 4 _aInformation Storage and Retrieval.
650 2 4 _aDatabase Management.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781441976581
830 0 _aAdvances in Information Security,
_x1568-2633 ;
_v51
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-1-4419-7659-8
596 _a19
942 _cLIBRO_ELEC
999 _c199871
_d199871