Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Protecting privacy in data release
Livraga G., Springer Publishing Company, Incorporated, New York, NY, 2015. 192 pp. Type: Book (978-3-319161-08-2)
Date Reviewed: Oct 13 2015

With the expansion and acceptability of social media and online trading, securing data is important. Confidentiality, integrity, and availability are three pillars of information security [1]. Information and communication technologies are empowering all businesses and hold the world’s vast amount of data. Hence, protecting the privacy of these data is crucial [2]. This book addresses this important concern in three different scenarios: protection of data both explicitly and implicitly, and access control enforcement. This book is based on the author’s PhD work, and hence contains an in-depth analysis.

This book has six chapters. The introductory chapter, though brief, clearly spells out the motivations, objectives, contributions, and organization of the book. The second chapter, on related works, provides comprehensive coverage of the literature that closely matches with this book. This chapter covers various data protection techniques, from assumptions to applications to examples. In a similar line, this chapter also covers data fragmentation techniques, interface control, and access control using illustrations.

Chapters 3, 4, and 5 are the author’s research contributions. In these three chapters, he presents his algorithms in three different scenarios with many mathematical, logical, and experimental results. Wherever possible, the author has provided pseudocode. All three chapters are well written and self-contained. The performance of the proposed algorithms is scientifically analyzed and presented neatly. The last chapter summarizes the contributions and presents many ideas for future research.

Overall, this is well-written material that will be useful for researchers, scientists, and practitioners working in data privacy and information security.

Reviewer:  S. Ramakrishnan Review #: CR143851 (1512-1013)
1) Stallings, W. Cryptography and network security: principles and practice (6th ed.). Pearson, Upper Saddle River, NJ, 2013.
2) Mayer-Schonberger, V. ; Cukier, K. Big data: a revolution that will transform how we live, work and think. Hodder and Stoughton, London, UK, 2013.
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security, Integrity, And Protection (H.2.0 ... )
 
 
Data Mining (H.2.8 ... )
 
 
Privacy (K.4.1 ... )
 
 
Content Analysis And Indexing (H.3.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Security, Integrity, And Protection": Date
Views for multilevel database security
Denning D., Akl S., Heckman M., Lunt T., Morgenstern M., Neumann P., Schell R. IEEE Transactions on Software Engineering SE-13(2): 129-140, 1987. Type: Article
Feb 1 1988
Computer security: a comprehensive controls checklist
Wood C., Banks W., Guarro S., Garcia A., Hampel V., Sartorio H., Wiley-Interscience, New York, NY, 1987. Type: Book (9789780471847953)
Feb 1 1988
Incorporating access control in forms systems
Yeo G. Computers and Security 4(2): 109-122, 1985. Type: Article
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy