
Preserving Privacy in Data Outsourcing
by Foresti, Sara; Samarati, Pierangela-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
Rent Textbook
Rent Digital
New Textbook
We're Sorry
Sold Out
Used Textbook
We're Sorry
Sold Out
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Table of Contents
Introduction | p. 1 |
Motivation | p. 1 |
Contribution of the Book | p. 4 |
Access Control Enforcement | p. 4 |
Privacy Protection | p. 5 |
Safe Data Integration | p. 6 |
Organization of the Book | p. 7 |
Overview of the State of the Art | p. 9 |
Introduction | p. 9 |
Chapter Outline | p. 10 |
Basic Scenario and Data Organization | p. 11 |
Parties Involved | p. 11 |
Data Organization | p. 12 |
Interactions | p. 13 |
Querying Encrypted Data | p. 15 |
Bucket-Based Approach | p. 15 |
Hash-Based Approach | p. 17 |
B+ Tree Approach | p. 18 |
Order Preserving Encryption Approaches | p. 20 |
Other Approaches | p. 21 |
Evaluation of Inference Exposure | p. 22 |
Integrity of Outsourced Data | p. 24 |
Privacy Protection of Databases | p. 26 |
Access Control Enforcement in the Outsourcing Scenario | p. 27 |
Safe Data Integration | p. 29 |
Chapter Summary | p. 30 |
Selective Encryption to Enforce Access Control | p. 31 |
Introduction | p. 31 |
Chapter Outline | p. 33 |
Relational Model | p. 33 |
Basic Concepts and Notation | p. 34 |
Access Control and Encryption Policies | p. 35 |
Access Control Policy | p. 35 |
Encryption Policy | p. 36 |
Token Management | p. 40 |
Minimal Encryption Policy | p. 42 |
Vertices and Edges Selection | p. 45 |
Vertices Factorization | p. 47 |
A2E Algorithm | p. 48 |
Correctness and Complexity | p. 53 |
Policy Updates | p. 58 |
Grant and Revoke | p. 59 |
Correctness | p. 63 |
Two-Layer Encryption for Policy Outsourcing | p. 65 |
Two-Layer Encryption | p. 66 |
Policy Updates in Two-Layer Encryption | p. 70 |
Over-encrypt | p. 70 |
Grant and Revoke | p. 71 |
Correctness | p. 75 |
Protection Evaluation | p. 76 |
Exposure Risk: Full_SEL | p. 78 |
Exposure Risk: Delta_SEL | p. 79 |
Design Considerations | p. 80 |
Experimental Results | p. 81 |
Chapter Summary | p. 84 |
Combining Fragmentation and Encryption to Protect Data Privacy | p. 85 |
Introduction | p. 85 |
Chapter Outline | p. 87 |
Confidentiality Constraints | p. 88 |
Fragmentation and Encryption for Constraint Satisfaction | p. 90 |
Minimal Fragmentation | p. 91 |
Correctness | p. 92 |
Maximal Visibility | p. 92 |
Minimum Number of Fragments | p. 93 |
Fragmentation Lattice | p. 94 |
A Complete Search Approach to Minimal Fragmentation | p. 96 |
Computing a Minimal Fragmentation | p. 98 |
Correctness and Complexity | p. 100 |
A Heuristic Approach to Minimize Fragmentation | p. 102 |
Computing a Vector-minimal Fragmentation | p. 102 |
Correctness and Complexity | p. 105 |
Taking Attribute Affinity into Account | p. 107 |
A Heuristic Approach to Maximize Affinity | p. 109 |
Computing a Vector-minimal Fragmentation with the Affinity Matrix | p. 110 |
Correctness and Complexity | p. 113 |
Query Cost Model | p. 115 |
A Heuristic Approach to Minimize Query Cost Execution | p. 118 |
Computing a Vector-minimal Fragmentation with the Cost Function | p. 119 |
Correctness and Complexity | p. 122 |
Query Execution | p. 123 |
Indexes | p. 126 |
Experimental Results | p. 130 |
Chapter Summary | p. 133 |
Distributed Query Processing under Safely Composed Permissions | p. 135 |
Introduction | p. 135 |
Chapter Outline | p. 137 |
Preliminary Concepts | p. 137 |
Data Model | p. 137 |
Distributed Query Execution | p. 139 |
Security Model | p. 141 |
Permissions | p. 141 |
Relation Profiles | p. 143 |
Graph-based Model | p. 144 |
Authorized Views | p. 147 |
Authorizing Permissions | p. 149 |
Composition of Permissions | p. 151 |
Algorithm | p. 155 |
Safe Query Planning | p. 159 |
Third Party Involvement | p. 162 |
Build a Safe Query Plan | p. 163 |
Chapter Summary | p. 169 |
Conclusions | p. 171 |
Summary of the Contributions | p. 171 |
Future Work | p. 172 |
Access Control Enforcement | p. 172 |
Privacy Protection | p. 173 |
Safe Data Integration | p. 174 |
References | p. 175 |
Table of Contents provided by Ingram. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.