Skip to main content

2011 | Buch

Preserving Privacy in Data Outsourcing

insite
SUCHEN

Über dieses Buch

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Introduction
Abstract
The amount of data stored, processed, and exchanged by private companies and public organizations is rapidly increasing. As a consequence, users are today, with increasing frequency, resorting to service providers for disseminating and sharing resources they want to make available to others. The protection against privacy violations is becoming therefore one of the most important issues that must be addressed in such an open and collaborative context. In this book, we define a comprehensive approach for protecting sensitive information when it is stored on systems that are not under the data owner’s direct control. In the remainder of this chapter, we give the motivation and the outline of this book.
Sara Foresti
Chapter 2. Overview of the State of the Art
Abstract
This chapter discusses the state of the art in the area of data outsourcing, which is mainly focused on efficient methods for querying encrypted data. We also present some approaches for evaluating the inference exposure due to data publication, and solutions for granting data integrity. A few research efforts have instead addressed the problem of developing access control systems for outsourced data and for securely querying distributed databases.
Sara Foresti
Chapter 3. Selective Encryption to Enforce Access Control
Abstract
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to be addressed in this context concerns the enforcement of selective authorization policies and the support of policy updates in dynamic scenarios.
In this chapter, we present a novel solution for the enforcement of access control and the management of its evolution. Encryption is the traditional way in which a third party can be prevented from accessing information it would have otherwise access to, either because it controls a channel transmitting it or because it reads its stored representation. Our proposal is based on the application of selective encryption as a means to enforce authorizations. Also, the model here proposed represents a first solution for efficiently managing policy updates, limiting the adoption of expensive re-encryption techniques.
Sara Foresti
Chapter 4. Combining Fragmentation and Encryption to Protect Data Privacy
Abstract
Traditional solutions for granting data privacy rely on encryption. However, dealing with encrypted data makes query processing expensive. In this chapter, we propose a solution to enforce privacy over data collections combining data fragmentation with encryption.We model privacy requirements as confidentiality constraints expressing the sensitivity of the content of single attributes and of their associations. We then use encryption as an underlying (conveniently available) measure for making data unintelligible, while exploiting fragmentation to break sensitive associations among attributes. We introduce both exact and heuristic algorithms computing a fragmentation that tries to minimize the impact of fragmentation on query efficiency
Sara Foresti
Chapter 5. Distributed Query Processing under Safely Composed Permissions
Abstract
The integration of information sources detained by distinct parties, either for security or efficiency reasons, is becoming of great interest. A crucial issue in this scenario is the definition of mechanisms for the integration that correctly satisfy the commercial and business policies of the organization owning the data. In this chapter, we propose a new model based on the characterization of access privileges for a set of servers on the components of a relational schema. The proposed approach is based on three concepts: i) flexible permissions identify portions of the data being authorized, ii) relations are checked for release not with respect to individual authorizations but rather evaluating whether the information release they (directly or indirectly) entail is allowed by the permissions, and iii) each basic operation necessary for query evaluation entails different data exchanges among the servers. Access control is effectively modeled and efficiently executed in terms of graph coloring and composition. The query execution plan is checked against privileges to evaluate if it can or cannot be exploited for query evaluation.
Sara Foresti
Chapter 6. Conclusions
Abstract
In this book, we have addressed the problem of protecting information when outsourced to an external server. After a brief introduction and a discussion of related work, we focused on three specific aspects: access control enforcement, privacy protection, and safe data integration. In this chapter, we shortly summarize the contributions of this book and we outline some future work.
Sara Foresti
Backmatter
Metadaten
Titel
Preserving Privacy in Data Outsourcing
verfasst von
Sara Foresti
Copyright-Jahr
2011
Verlag
Springer US
Electronic ISBN
978-1-4419-7659-8
Print ISBN
978-1-4419-7658-1
DOI
https://doi.org/10.1007/978-1-4419-7659-8