With the expansion and acceptability of social media and online trading, securing data is important. Confidentiality, integrity, and availability are three pillars of information security [1]. Information and communication technologies are empowering all businesses and hold the world’s vast amount of data. Hence, protecting the privacy of these data is crucial [2]. This book addresses this important concern in three different scenarios: protection of data both explicitly and implicitly, and access control enforcement. This book is based on the author’s PhD work, and hence contains an in-depth analysis.
This book has six chapters. The introductory chapter, though brief, clearly spells out the motivations, objectives, contributions, and organization of the book. The second chapter, on related works, provides comprehensive coverage of the literature that closely matches with this book. This chapter covers various data protection techniques, from assumptions to applications to examples. In a similar line, this chapter also covers data fragmentation techniques, interface control, and access control using illustrations.
Chapters 3, 4, and 5 are the author’s research contributions. In these three chapters, he presents his algorithms in three different scenarios with many mathematical, logical, and experimental results. Wherever possible, the author has provided pseudocode. All three chapters are well written and self-contained. The performance of the proposed algorithms is scientifically analyzed and presented neatly. The last chapter summarizes the contributions and presents many ideas for future research.
Overall, this is well-written material that will be useful for researchers, scientists, and practitioners working in data privacy and information security.