Visit our Christmas Gift Finder
Click & Collect from 2 Hours
Last Christmas Delivery Dates
Free UK Standard Delivery on orders £20 and over Order in time for Christmas 18th December 2nd Class | 19th December 1st Class Free Click & Collect to shops From 2 hours of your order*
Preserving Privacy in Data Outsourcing - Advances in Information Security 51 (Paperback)
  • Preserving Privacy in Data Outsourcing - Advances in Information Security 51 (Paperback)
zoom

Preserving Privacy in Data Outsourcing - Advances in Information Security 51 (Paperback)

(author)
£101.00
Paperback 180 Pages / Published: 01/12/2012
  • Not available

This product is currently unavailable.

  • This item has been added to your basket

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

Publisher: Springer-Verlag New York Inc.
ISBN: 9781461426998
Number of pages: 180
Weight: 308 g
Dimensions: 235 x 155 x 10 mm
Edition: 2011 ed.

You may also be interested in...

The Art of Deception
Added to basket
The Cyber Effect
Added to basket
£10.99
Paperback
Democracy Hacked
Added to basket
£16.99
Hardback
Desk Wars
Added to basket
£9.99
Paperback
Hacking For Dummies
Added to basket
£22.99
Paperback
Cybersecurity and Cyberwar
Added to basket
Everyday Cryptography
Added to basket
Click Here to Kill Everybody
Added to basket
Surveillance Valley
Added to basket
£14.99
Paperback
The Perfect Weapon
Added to basket
Poc || Gtfo
Added to basket
£33.99
Hardback
Exploding Data
Added to basket
£20.00
Hardback
Breaking and Entering
Added to basket
Data and Goliath
Added to basket
£12.99
Paperback
Cyber Security
Added to basket
£29.99
Paperback
Intercept
Added to basket
£8.99
Paperback

Reviews

Please sign in to write a review

Your review has been submitted successfully.