Privacy of Outsourced Data Privacy and Identity Management for Life

  • Capitani di Vimercati S
  • Foresti S
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.

Abstract

Data outsourced to an external storage server are usually encrypted since there is the common assumption that all data are equally sensitive. The encrypted data however cannot be efficiently queried and their selective release is not possible or require the application of specific solutions. To overcome these problems, new proposals have been recently developed, which are based on a fragmentation technique possibly combined with encryption. The main advantage of these proposals is that they limit the use of encryption, thus improving query execution efficiency. In this paper, we describe such fragmentation-based approaches focusing in particular on the different data fragmentation models proposed in the literature. We then conclude the paper with a discussion on some research directions.

Cite

CITATION STYLE

APA

Capitani di Vimercati, S., & Foresti, S. (2010). Privacy of Outsourced Data Privacy and Identity Management for Life. In M. Bezzi, P. Duquenoy, S. Fischer-Hübner, M. Hansen, & G. Zhang (Eds.) (Vol. 320, pp. 174–187). Springer Boston. Retrieved from http://www.springerlink.com/content/36x5k10883616193

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free