[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Skip header Section
Protecting Privacy in Data ReleaseMay 2015
Publisher:
  • Springer Publishing Company, Incorporated
ISBN:978-3-319-16108-2
Published:20 May 2015
Pages:
192
Skip Bibliometrics Section
Reflects downloads up to 13 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

This book presents a comprehensive approach to protecting sensitive information when large data collections are released by their owners. It addresses three key requirements of data privacy: the protection of data explicitly released, the protection of information not explicitly released but potentially vulnerable due to a release of other data, and the enforcement of owner-defined access restrictions to the released data. It is also the first book with a complete examination of how to enforce dynamic read and write access authorizations on released data, applicable to the emerging data outsourcing and cloud computing situations. Private companies, public organizations and final users are releasing, sharing, and disseminating their data to take reciprocal advantage of the great benefits of making their data available to others. This book weighs these benefits against the potential privacy risks. A detailed analysis of recent techniques for privacy protection in data release and case studies illustrate crucial scenarios. Protecting Privacy in Data Release targets researchers, professionals and government employees working in security and privacy. Advanced-level students in computer science and electrical engineering will also find this book useful as a secondary text or reference.

Contributors
  • University of Milan

Reviews

S. Ramakrishnan

With the expansion and acceptability of social media and online trading, securing data is important. Confidentiality, integrity, and availability are three pillars of information security [1]. Information and communication technologies are empowering all businesses and hold the world's vast amount of data. Hence, protecting the privacy of these data is crucial [2]. This book addresses this important concern in three different scenarios: protection of data both explicitly and implicitly, and access control enforcement. This book is based on the author's PhD work, and hence contains an in-depth analysis. This book has six chapters. The introductory chapter, though brief, clearly spells out the motivations, objectives, contributions, and organization of the book. The second chapter, on related works, provides comprehensive coverage of the literature that closely matches with this book. This chapter covers various data protection techniques, from assumptions to applications to examples. In a similar line, this chapter also covers data fragmentation techniques, interface control, and access control using illustrations. Chapters 3, 4, and 5 are the author's research contributions. In these three chapters, he presents his algorithms in three different scenarios with many mathematical, logical, and experimental results. Wherever possible, the author has provided pseudocode. All three chapters are well written and self-contained. The performance of the proposed algorithms is scientifically analyzed and presented neatly. The last chapter summarizes the contributions and presents many ideas for future research. Overall, this is well-written material that will be useful for researchers, scientists, and practitioners working in data privacy and information security. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations