Preserving Privacy in On-Line Analytical Processing (OLAP) Preserving Privacy in On-Line Analytical Processing (OLAP)
Advances in Information Security

Preserving Privacy in On-Line Analytical Processing (OLAP‪)‬

Lingyu Wang and Others
    • $129.99
    • $129.99

Publisher Description

On-Line Analytic Processing (OLAP) systems usually need to meet two conflicting goals. First, the sensitive data stored in underlying data warehouses must be kept secret. Second, analytical queries about the data must be allowed for decision support purposes. The main challenge is that sensitive data can be inferred from answers to seemingly innocent aggregations of the data. Existing inference control methods in statistical databases usually exhibit high performance overhead and limited effectiveness when applied to OLAP systems.

Preserving Privacy in On-Line Analytical Processing reviews a series of methods that can precisely answer data cube-style OLAP queries regarding sensitive data while provably preventing adversaries from inferring the data. How to keep the performance overhead of these security methods at a reasonable level is also addressed. Achieving a balance between security, availability, and performance is shown to be feasible in OLAP systems.

Preserving Privacy in On-Line Analytical Processing is designed for the professional market, composed of practitioners and researchers in industry.  This book is also appropriate for graduate-level students in computer science and engineering.

GENRE
Computers & Internet
RELEASED
2007
April 6
LANGUAGE
EN
English
LENGTH
192
Pages
PUBLISHER
Springer US
SELLER
Springer Nature B.V.
SIZE
5
MB
Scalable Uncertainty Management Scalable Uncertainty Management
2008
Scalable Uncertainty Management Scalable Uncertainty Management
2007
Managing and Mining Uncertain Data Managing and Mining Uncertain Data
2010
Transactions on Rough Sets XII Transactions on Rough Sets XII
2010
Modeling Decisions for Artificial Intelligence Modeling Decisions for Artificial Intelligence
2008
Database Systems for Advanced Applications Database Systems for Advanced Applications
2010
Binary Code Fingerprinting for Cybersecurity Binary Code Fingerprinting for Cybersecurity
2020
Applied Cryptography and Network Security Workshops Applied Cryptography and Network Security Workshops
2019
Network Security Metrics Network Security Metrics
2017
Foundations and Practice of Security Foundations and Practice of Security
2016
Preserving Privacy Against Side-Channel Leaks Preserving Privacy Against Side-Channel Leaks
2016
Network Hardening Network Hardening
2014
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007