Preserving privacy in data outsourcing

Saved in:
Bibliographic Details
Main Authors: Foresti Sara.
Corporate Authors: SpringerLink (Online service)
Published: Springer,
Publisher Address: New York
Publication Dates: c2011.
Literature type: Book
Language: English
Series: Advances in information security ; 51
Subjects:
Online Access: http://dx.doi.org/10.1007/978-1-4419-7659-8
Carrier Form: 1 online resource (xv, 180 p.):
ISBN: 9781441976598 (electronic bk.)
1441976590 (electronic bk.)
Index Number: TP309
CLC: TP309
Contents: Includes bibliographical references (p. 175-180).
Preserving Privacy in Data Outsourcing; Foreword; Preface; Acknowledgements; Contents; Chapter 1 Introduction; Chapter 2 Overview of the State of the Art; Chapter 3 Selective Encryption to Enforce Access Control℗£; Chapter 4 Combining Fragmentation and Encryption to Protect Data Privacy℗£; Chapter 5 Distributed Query Processing under Safely Composed Permissions℗£; Chapter 6 Conclusions; References.
Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release. Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrate.