Abstract
The proliferation of web-based applications and information systems, and recent trends such as cloud computing and outsourced data management, have increased the exposure of data and made security more difficult. In this paper we briefly discuss open issues, such as data protection from insider threat and how to reconcile security and privacy, and outline research directions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bertino, E.: Data Protection from Insider Threats: Synthesis Lectures on Data Management. Morgan & Claypool Publishers, San Rafael (2012)
Bertino, E., Ghinita, G., Kamra, A.: Access control for databases: concepts and systems. Found. Trends Databases 3(1–2), 1–148 (2011)
Bertino, E., Takahashi, K.: Identity Management: Concepts, Technologies, and Systems. Artech House, Boston (2010)
Inan, A., Kantarcioglu, M., Ghinita, G., Bertino, E.: A hybrid approach to record matching. IEEE Trans. Dependable Sec. Comp. 9(5), 684–698 (2012)
Kamra, A., Bertino, E.: Design and implementation of an intrusion response system for relational databases. IEEE Trans. Knowl. Data Eng. 23(6), 875–888 (2011)
Kirkpatrick, M.S., Ghinita, G., Bertino, E.: Privacy-preserving enforcement of spatially aware RBAC. IEEE Trans. Dependable Sec. Comp. 9(5), 627–640 (2012)
Lim, H.S., Ghinita, G., Bertino, E., Kantarciolgu, M.: A game-theoretic approach for high assurance data. In: Proceedings of the IEEE 28th International Conference on Data Engineering, Washington, DC, USA, 1–5 April 2012
Nabeel, M., Shang, N., Bertino, E.: Privacy preserving policy based content sharing in public clouds. IEEE Trans. Knowl. Data Eng. (to appear)
Nabeel, M., Shang, N., Bertino, E.: Efficient privacy preserving content based publish subscribe systems. In: Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT), Newark, NJ, 20–22 June 2012
Sultana, S., Shehab, M., Bertino, E.: Secure provenance transmission for streaming data. IEEE Trans. Knowl. Data Eng. 25(8), 1890–1903 (2013)
Acknowledgments
The research reported in this paper has been partially supported by NSF under awards CNS-1111512, CNS-1016722, CNS-0964294.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Bertino, E. (2014). Data Security – Challenges and Research Opportunities. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2013. Lecture Notes in Computer Science(), vol 8425. Springer, Cham. https://doi.org/10.1007/978-3-319-06811-4_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-06811-4_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06810-7
Online ISBN: 978-3-319-06811-4
eBook Packages: Computer ScienceComputer Science (R0)