Preserving Privacy Against Side-Channel Leaks Preserving Privacy Against Side-Channel Leaks
Advances in Information Security

Preserving Privacy Against Side-Channel Leaks

From Data Publishing to Web Applications

    • $84.99
    • $84.99

Publisher Description

This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic strategy independent of data utility measures and syntactic privacy properties before discussing an extended approach to improve the efficiency. Next, the book explores privacy-preserving traffic padding in Web applications, first via a model to quantify privacy and cost and then by introducing randomness to provide background knowledge-resistant privacy guarantee. Finally, the book considers privacy-preserving smart metering by proposing a light-weight approach to simultaneously preserving users' privacy and ensuring billing accuracy. Designed for researchers and professionals, this book is also suitable for advanced-level students interestedin privacy, algorithms, or web applications.

GENRE
Computers & Internet
RELEASED
2016
August 24
LANGUAGE
EN
English
LENGTH
155
Pages
PUBLISHER
Springer International Publishing
SELLER
Springer Nature B.V.
SIZE
3.2
MB
Guide to Data Privacy Guide to Data Privacy
2022
Advances in Information and Computer Security Advances in Information and Computer Security
2020
Algorithms for Data and Computation Privacy Algorithms for Data and Computation Privacy
2020
Information Security and Cryptology Information Security and Cryptology
2016
Progress in Cryptology - AFRICACRYPT 2017 Progress in Cryptology - AFRICACRYPT 2017
2017
Advances in Information and Computer Security Advances in Information and Computer Security
2015
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007