The goal of this chapter is to describe the main solutions being devised for protecting data confidentiality and integrity in outsourcing scenarios. In particular, we illustrate approaches that guarantee data confidentiality by applying encryption or a combination of encryption and fragmentation. We then focus on approaches that aim at guaranteeing data integrity in storage and in query computation. Finally, we present some issues that still need to be investigated for ensuring privacy and security of data outsourced to external servers.
Protecting data in outsourcing scenarios / S. De Capitani di Vimercati, S. Foresti, P. Samarati - In: Handbook on securing cyber-physical critical infrastructure / [a cura di] S.K Das, K. Kant, N. Zhang. - Waltham, USA : Morgan Kaufmann, 2012. - ISBN 9780124158153. - pp. 361-388
Protecting data in outsourcing scenarios
S. De Capitani di VimercatiPrimo
;S. ForestiSecondo
;P. SamaratiUltimo
2012
Abstract
The goal of this chapter is to describe the main solutions being devised for protecting data confidentiality and integrity in outsourcing scenarios. In particular, we illustrate approaches that guarantee data confidentiality by applying encryption or a combination of encryption and fragmentation. We then focus on approaches that aim at guaranteeing data integrity in storage and in query computation. Finally, we present some issues that still need to be investigated for ensuring privacy and security of data outsourced to external servers.File | Dimensione | Formato | |
---|---|---|---|
Ch5.1_Samarati.pdf
accesso aperto
Tipologia:
Pre-print (manoscritto inviato all'editore)
Dimensione
374.62 kB
Formato
Adobe PDF
|
374.62 kB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.