Preserving Privacy Against Side-Channel Leaks [electronic resource] From Data Publishing to Web Applications / by Wen Ming Liu, Lingyu Wang.
This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic str...
Uniform Title: | Advances in Information Security,
2512-2193 ; 68 |
---|---|
Main Authors: | |
Corporate Author: | |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2016.
|
Edition: | 1st ed. 2016. |
Series: | Advances in Information Security,
68 |
Subjects: | |
Online Access: | |
Variant Title: |
Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications |
Format: | Electronic eBook |
MARC
LEADER | 00000nam a22000003i 4500 | ||
---|---|---|---|
001 | ebs11517891e | ||
003 | EBZ | ||
006 | m o d |||||| | ||
007 | cr|unu|||||||| | ||
008 | 160824s2016 sz | o |||| 0|eng d | ||
020 | |z 9783319426426 | ||
020 | |a 9783319426440 (online) | ||
035 | |a (EBZ)ebs11517891e | ||
040 | |d EBZ | ||
042 | |a msc | ||
050 | 4 | |a QA76.9.A25 | |
100 | 1 | |a Liu, Wen Ming. |e author. |4 aut |4 http://id.loc.gov/vocabulary/relators/aut | |
245 | 1 | 0 | |a Preserving Privacy Against Side-Channel Leaks |h [electronic resource] |b From Data Publishing to Web Applications / |c by Wen Ming Liu, Lingyu Wang. |
246 | 2 | |a Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications | |
250 | |a 1st ed. 2016. | ||
264 | 1 | |a Cham : |b Springer International Publishing : |b Imprint: Springer, |c 2016. | |
490 | 1 | |a Advances in Information Security, |x 2512-2193 ; |v 68 | |
505 | 0 | |a Introduction -- Related Work -- Data Publishing: Trading off Privacy with Utility through the k-Jump Strategy -- Data Publishing: A Two-Stage Approach to Improving Algorithm Efficiency -- Web Applications: k-Indistinguishable Traffic Padding -- Web Applications: Background-Knowledge Resistant Random Padding -- Smart Metering: Inferences of Appliance Status from Fine-Grained Readings -- The Big Picture: A Generic Model of Side-Channel Leaks -- Conclusion. | |
520 | |a This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic strategy independent of data utility measures and syntactic privacy properties before discussing an extended approach to improve the efficiency. Next, the book explores privacy-preserving traffic padding in Web applications, first via a model to quantify privacy and cost and then by introducing randomness to provide background knowledge-resistant privacy guarantee. Finally, the book considers privacy-preserving smart metering by proposing a light-weight approach to simultaneously preserving users' privacy and ensuring billing accuracy. Designed for researchers and professionals, this book is also suitable for advanced-level students interested in privacy, algorithms, or web applications. | ||
650 | 0 | |a Data protection. | |
650 | 0 | |a Cryptography. | |
650 | 0 | |a Data encryption (Computer science). | |
650 | 0 | |a Computer networks . | |
700 | 1 | |a Wang, Lingyu. |e author. |4 aut |4 http://id.loc.gov/vocabulary/relators/aut | |
710 | 2 | |a SpringerLink (Online service) | |
773 | 0 | |t Springer Computer Science eBooks 2016 English/International |d Springer Nature | |
776 | 0 | 8 | |i Printed edition: |z 9783319426426 |
776 | 0 | 8 | |i Printed edition: |z 9783319426433 |
776 | 0 | 8 | |i Printed edition: |z 9783319826264 |
776 | 1 | |t Preserving Privacy Against Side-Channel Leaks | |
830 | 0 | |a Advances in Information Security, |x 2512-2193 ; |v 68 | |
856 | 4 | 0 | |y Access Content Online(from Springer Computer Science eBooks 2016 English/International) |u https://ezproxy.msu.edu/login?url=https://link.springer.com/10.1007/978-3-319-42644-0 |z Springer Computer Science eBooks 2016 English/International: 2016 |