Preserving Privacy in Data Outsourcing

by ;
Format: Hardcover
Pub. Date: 2010-11-15
Publisher(s): Springer-Verlag New York Inc
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $139.99

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:30 Days access
Downloadable:30 Days
$35.64
Online:60 Days access
Downloadable:60 Days
$47.52
Online:90 Days access
Downloadable:90 Days
$59.40
Online:120 Days access
Downloadable:120 Days
$71.28
Online:180 Days access
Downloadable:180 Days
$77.22
Online:1825 Days access
Downloadable:Lifetime Access
$118.80
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$77.22*

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release. Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book.Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

Table of Contents

Introductionp. 1
Motivationp. 1
Contribution of the Bookp. 4
Access Control Enforcementp. 4
Privacy Protectionp. 5
Safe Data Integrationp. 6
Organization of the Bookp. 7
Overview of the State of the Artp. 9
Introductionp. 9
Chapter Outlinep. 10
Basic Scenario and Data Organizationp. 11
Parties Involvedp. 11
Data Organizationp. 12
Interactionsp. 13
Querying Encrypted Datap. 15
Bucket-Based Approachp. 15
Hash-Based Approachp. 17
B+ Tree Approachp. 18
Order Preserving Encryption Approachesp. 20
Other Approachesp. 21
Evaluation of Inference Exposurep. 22
Integrity of Outsourced Datap. 24
Privacy Protection of Databasesp. 26
Access Control Enforcement in the Outsourcing Scenariop. 27
Safe Data Integrationp. 29
Chapter Summaryp. 30
Selective Encryption to Enforce Access Controlp. 31
Introductionp. 31
Chapter Outlinep. 33
Relational Modelp. 33
Basic Concepts and Notationp. 34
Access Control and Encryption Policiesp. 35
Access Control Policyp. 35
Encryption Policyp. 36
Token Managementp. 40
Minimal Encryption Policyp. 42
Vertices and Edges Selectionp. 45
Vertices Factorizationp. 47
A2E Algorithmp. 48
Correctness and Complexityp. 53
Policy Updatesp. 58
Grant and Revokep. 59
Correctnessp. 63
Two-Layer Encryption for Policy Outsourcingp. 65
Two-Layer Encryptionp. 66
Policy Updates in Two-Layer Encryptionp. 70
Over-encryptp. 70
Grant and Revokep. 71
Correctnessp. 75
Protection Evaluationp. 76
Exposure Risk: Full_SELp. 78
Exposure Risk: Delta_SELp. 79
Design Considerationsp. 80
Experimental Resultsp. 81
Chapter Summaryp. 84
Combining Fragmentation and Encryption to Protect Data Privacyp. 85
Introductionp. 85
Chapter Outlinep. 87
Confidentiality Constraintsp. 88
Fragmentation and Encryption for Constraint Satisfactionp. 90
Minimal Fragmentationp. 91
Correctnessp. 92
Maximal Visibilityp. 92
Minimum Number of Fragmentsp. 93
Fragmentation Latticep. 94
A Complete Search Approach to Minimal Fragmentationp. 96
Computing a Minimal Fragmentationp. 98
Correctness and Complexityp. 100
A Heuristic Approach to Minimize Fragmentationp. 102
Computing a Vector-minimal Fragmentationp. 102
Correctness and Complexityp. 105
Taking Attribute Affinity into Accountp. 107
A Heuristic Approach to Maximize Affinityp. 109
Computing a Vector-minimal Fragmentation with the Affinity Matrixp. 110
Correctness and Complexityp. 113
Query Cost Modelp. 115
A Heuristic Approach to Minimize Query Cost Executionp. 118
Computing a Vector-minimal Fragmentation with the Cost Functionp. 119
Correctness and Complexityp. 122
Query Executionp. 123
Indexesp. 126
Experimental Resultsp. 130
Chapter Summaryp. 133
Distributed Query Processing under Safely Composed Permissionsp. 135
Introductionp. 135
Chapter Outlinep. 137
Preliminary Conceptsp. 137
Data Modelp. 137
Distributed Query Executionp. 139
Security Modelp. 141
Permissionsp. 141
Relation Profilesp. 143
Graph-based Modelp. 144
Authorized Viewsp. 147
Authorizing Permissionsp. 149
Composition of Permissionsp. 151
Algorithmp. 155
Safe Query Planningp. 159
Third Party Involvementp. 162
Build a Safe Query Planp. 163
Chapter Summaryp. 169
Conclusionsp. 171
Summary of the Contributionsp. 171
Future Workp. 172
Access Control Enforcementp. 172
Privacy Protectionp. 173
Safe Data Integrationp. 174
Referencesp. 175
Table of Contents provided by Ingram. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.