|
![]() |
|||
|
||||
OverviewThis book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic strategy independent of data utility measures and syntactic privacy properties before discussing an extended approach to improve the efficiency. Next, the book explores privacy-preserving traffic padding in Web applications, first via a model to quantify privacy and cost and then by introducing randomness to provide background knowledge-resistant privacy guarantee. Finally, the book considers privacy-preserving smart metering by proposing a light-weight approach to simultaneously preserving users' privacy and ensuring billing accuracy. Designed for researchers and professionals, this book is also suitable for advanced-level students interested in privacy, algorithms, or web applications. Full Product DetailsAuthor: Wen Ming Liu , Lingyu WangPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Edition: Softcover reprint of the original 1st ed. 2016 Volume: 68 Dimensions: Width: 15.50cm , Height: 0.90cm , Length: 23.50cm Weight: 2.467kg ISBN: 9783319826264ISBN 10: 3319826263 Pages: 142 Publication Date: 22 April 2018 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsIntroduction.- Related Work.- Data Publishing: Trading off Privacy with Utility through the k-Jump Strategy.- Data Publishing: A Two-Stage Approach to Improving Algorithm Efficiency.- Web Applications: k-Indistinguishable Traffic Padding.- Web Applications: Background-Knowledge Resistant Random Padding.- Smart Metering: Inferences of Appliance Status from Fine-Grained Readings.- The Big Picture: A Generic Model of Side-Channel Leaks.- Conclusion.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |