000 03338nam a22005415i 4500
001 978-3-319-42644-0
003 DE-He213
005 20200421112556.0
007 cr nn 008mamaa
008 160824s2016 gw | s |||| 0|eng d
020 _a9783319426440
_9978-3-319-42644-0
024 7 _a10.1007/978-3-319-42644-0
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aLiu, Wen Ming.
_eauthor.
245 1 0 _aPreserving Privacy Against Side-Channel Leaks
_h[electronic resource] :
_bFrom Data Publishing to Web Applications /
_cby Wen Ming Liu, Lingyu Wang.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aXIII, 142 p. 19 illus., 1 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x1568-2633 ;
_v68
505 0 _aIntroduction -- Related Work -- Data Publishing: Trading off Privacy with Utility through the k-Jump Strategy -- Data Publishing: A Two-Stage Approach to Improving Algorithm Efficiency -- Web Applications: k-Indistinguishable Traffic Padding -- Web Applications: Background-Knowledge Resistant Random Padding -- Smart Metering: Inferences of Appliance Status from Fine-Grained Readings -- The Big Picture: A Generic Model of Side-Channel Leaks -- Conclusion.
520 _aThis book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic strategy independent of data utility measures and syntactic privacy properties before discussing an extended approach to improve the efficiency. Next, the book explores privacy-preserving traffic padding in Web applications, first via a model to quantify privacy and cost and then by introducing randomness to provide background knowledge-resistant privacy guarantee. Finally, the book considers privacy-preserving smart metering by proposing a light-weight approach to simultaneously preserving users' privacy and ensuring billing accuracy. Designed for researchers and professionals, this book is also suitable for advanced-level students interested in privacy, algorithms, or web applications.
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aComputer security.
650 0 _aData encryption (Computer science).
650 0 _aComputers.
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aData Encryption.
650 2 4 _aInformation Systems and Communication Service.
650 2 4 _aComputer Communication Networks.
700 1 _aWang, Lingyu.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319426426
830 0 _aAdvances in Information Security,
_x1568-2633 ;
_v68
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-42644-0
912 _aZDB-2-SCS
942 _cEBK
999 _c59184
_d59184