Advertisement

Introduction

  • Giovanni Livraga
Part of the Advances in Information Security book series (ADIS, volume 57)

Abstract

Private companies, public organizations and final users are more and more releasing, sharing, and disseminating their data, to take reciprocal advantage of the great benefits they can obtain by making their data available, publicly or selectively, to others. Unfortunately, these benefits come at the price of unprecedented privacy risks: large collections of data often include sensitive information, possibly related to users, which should be properly protected. The availability of effective means for protecting data against privacy violations is then emerging as one of the key issues to be addressed in such an open and collaborative scenario. In this book, we define a comprehensive approach for protecting sensitive information when large collections of data are publicly or selectively released by their owners. In this chapter, we discuss the motivations behind the work, our objectives and our contributions. We finally illustrate the outline of the book.

Keywords

Sensitive Information Data Owner Access Control Policy Boolean Formula Selective Encryption 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 3.
    G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, Y. Xu, Two can keep a secret: a distributed architecture for secure database services, in Proceedings of CIDR 2005, Asilomar, CA, 2005Google Scholar
  2. 7.
    M. Barbaro, T. Zeller, A face is exposed for AOL searcher no. 4417749. New York Times, August 9 2006Google Scholar
  3. 8.
    L. Batina, B. Gierlichs, E. Prouff, M. Rivain, F. Standaert, N. Veyrat-Charvillon, Mutual information analysis: a comprehensive study. J. Cryptol. 24(2), 269–291 (2011)CrossRefzbMATHMathSciNetGoogle Scholar
  4. 13.
    M. Bezzi, S. De Capitani di Vimercati, G. Livraga, P. Samarati, Protecting privacy of sensitive value distributions in data release, in Proceedings of STM 2010, Athens, Greece, 2010Google Scholar
  5. 14.
    M. Bezzi, S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, R. Sassi, Modeling and preventing inferences from sensitive value distributions in data release. JCS 20(4), 393–436 (2012)Google Scholar
  6. 17.
    E. Brier, C. Clavier, F. Olivier, Correlation power analysis with a leakage model, in Proceedings of CHES 2004, Cambridge, MA, 2004Google Scholar
  7. 20.
    F. Cayre, C. Fontaine, T. Furon, Watermarking security: Theory and practice. IEEE TSP 53(10), 3976–3987 (2005)MathSciNetGoogle Scholar
  8. 27.
    V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, Keep a few: outsourcing data while maintaining confidentiality, in Proceedings of ESORICS 2009, Saint Malo, 2009Google Scholar
  9. 28.
    V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, Combining fragmentation and encryption to protect privacy in data storage. ACM TISSEC 13(3), 1–33 (2010)CrossRefGoogle Scholar
  10. 29.
    V. Ciriani, S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati. Enforcing confidentiality and data visibility constraints: An OBDD approach, in Proceedings of DBSec 2011, Richmond, VA, 2011Google Scholar
  11. 30.
    V. Ciriani, S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati. An OBDD approach to enforce confidentiality and visibility constraints in data publishing. JCS 20(5), 463–508 (2012)Google Scholar
  12. 38.
    S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, Fragments and loose associations: Respecting privacy in data publishing. PVLDB 3(1), 1370–1381 (2010)Google Scholar
  13. 40.
    S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, Enforcing subscription-based authorization policies in cloud scenarios, in Proceedings of DBSec 2012, Paris, 2012Google Scholar
  14. 41.
    S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati, Enforcing dynamic write privileges in data outsourcing. Comput. Secur. 39, 47–63 (2013)CrossRefGoogle Scholar
  15. 42.
    S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati, Extending loose associations to multiple fragments. in Proceedings of DBSec 2013, Newark, NJ, 2013Google Scholar
  16. 45.
    S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati, Loose associations to increase utility in data publishing. JCS 23(1), 59–88 (2015)Google Scholar
  17. 57.
    B. Gierlichs, L. Batina, P. Tuyls, B. Preneel, Mutual information analysis - a generic side-channel distinguisher. in Proceedings of CHES 2008, Washington, 2008Google Scholar
  18. 68.
    D.E. Knuth, The Art of Computer Programming, Volume 4, Fascicle 1: Bitwise Tricks & Techniques; Binary Decision Diagrams (Addison-Wesley Professional, Upper Saddle River, 2009)Google Scholar
  19. 80.
    C. Meinel, T. Theobald, Algorithms and Data Structures in VLSI Design (Springer, Berlin, 1998)CrossRefzbMATHGoogle Scholar
  20. 85.
    A. Narayanan, V. Shmatikov, Robust de-anonymization of large sparse datasets, in Proceedings of IEEE S&P 2008, Berkeley/Oakland, 2008Google Scholar
  21. 105.
    N. Veyrat-Charvillon, F. Standaert, Mutual information analysis: How, when and why? in Proceedings of CHES 2009, Lausanne, 2009Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Giovanni Livraga
    • 1
  1. 1.Universita degli Studi di MilanoCremaItaly

Personalised recommendations