Preserving Privacy in Data Outsourcing

作者: Sara Foresti

DOI:

关键词:

摘要: Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt data, thus reducing query execution efficiency preventing selective release. Preserving in Data Outsourcing presents a comprehensive approach for protecting highly when it stored systems are not under data owner's control. The illustrated combines access control encryption, enforcing via structured encryption. This solution, coupled with efficient algorithms key derivation distribution, provides secure authorization management outsourced allowing owner outsource only but security policy itself. To reduce amount encrypted book also investigates fragmentation as possible way protect associations provide complementary means privacy: broken by will visible users authorized (by knowing proper key) join fragments. finally problem executing queries over distributed at different servers which must controlled ensure parties that. Case Studies throughout book. Privacy, mining, protection, outsourcing, electronic commerce, machine learning professionals others working these related fields find this valuable asset, well primary such ACM, IEEE Management Science. suitable advanced level students researchers concentrating computer science secondary text reference

参考文章(12)
Diana K. Smetters, Brent R. Waters, Dirk Balfanz, Glenn Durfee, Building an Encrypted and Searchable Audit Log. network and distributed system security symposium. ,(2004)
Philip S. Yu, Charu C. Aggarwal, Privacy-Preserving Data Mining: Models and Algorithms Springer. ,(2008)
Radu Sion, Query execution assurance for outsourced databases very large data bases. pp. 601- 612 ,(2005)
Zheng-Fei Wang, Jing Dai, Wei Wang, Bai-Le Shi, Fast query over encrypted character data in database computational intelligence and security. pp. 1027- 1033 ,(2004) , 10.1007/978-3-540-30497-5_158
C. T. Yu, C. C. Chang, Distributed query processing ACM Computing Surveys. ,vol. 16, pp. 399- 433 ,(1984) , 10.1145/3872.3874
Victor R.L Shen, Tzer-Shyong Chen, A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations Computers & Security. ,vol. 21, pp. 164- 171 ,(2002) , 10.1016/S0167-4048(02)00211-0
Tsai Hui-Min, Chang Chin-Chen, Refereed paper: A cryptographic implementation for dynamic access control in a user hierarchy Computers & Security. ,vol. 14, pp. 159- 166 ,(1995) , 10.1016/0167-4048(95)97049-G
Laks V. S. Lakshmanan, Hui Wang, Efficient secure query evaluation over encrypted XML databases very large data bases. pp. 127- 138 ,(2006) , 10.5555/1182635.1164140
Zheng-Fei Wang, Wei Wang, Bai-Le Shi, Storage and Query over Encrypted Character and Numerical Data in Database computer and information technology. pp. 77- 81 ,(2005) , 10.1109/CIT.2005.174