Lecture Notes in Computer Science 7482



Similar documents
Lecture Notes in Computer Science 5161

Lecture Notes in Computer Science 3161

Lecture Notes in Computer Science 3422

Lecture Notes in Computer Science 7850

Lecture Notes in Computer Science 3654

Lecture Notes in Computer Science 8703

Lecture Notes in Computer Science 3599

Security In Information Systems WOSIS-2005

Oral and Cranial Implants

Spatial Inequalities

Spatial Data on the Web

International Series on Consumer Science

SpringerBriefs in Criminology

The Banks and the Italian Economy

Applying Comparative Effectiveness Data to Medical Decision Making

Understanding Competitive Advantage

Lecture Notes in Computer Science 4814

THE HOME THE JOBS THE AWARDS SUBSCRIBE TO THE MAGAZINE HOME

UNIVERSITY TOP 50 BY SUBJECTS a) Arts and Humanities Universities

Lecture Notes in Computer Science

Springer-Verlag Berlin Heidelberg GmbH

Automated Firewall Analytics

Java and the Java Virtual Machine

Lecture Notes in Computer Science 7021

Human Rights in European Criminal Law

Software Process Automation

Library and Information Sciences

Lecture Notes in Mathematics 2033

INTELLIGENT SYSTEMS, CONTROL, AND AUTOMATION: SCIENCE AND ENGINEERING

Lasers in Restorative Dentistry

Stem Cell Biology and Regenerative Medicine

Miklós Szendrői Franklin H. Sim (Eds.) Color Atlas of Clinical Orthopedics

Lecture Notes in Computer Science 7554

Ding-Zhu Du Editors. Network Security

U.S. News Best Global Universities Rankings: An inside look at the latest results and methodology

The Product Manager s Toolkit

Scientific research competitiveness of world universities in computer science

Lecture Notes in Computer Science 4100

Lecture Notes in Computer Science 7453

Design of Flexible Production Systems

Professor of Mathematical Finance Office phone: Italy

World University Ranking - Times Higher Education ( )

Genitourinary Radiology: Male Genital Tract, Adrenal and Retroperitoneum

SCIS Pudong High School

Challenges and Opportunities in Health Care Management

Microsoft Voucher Ordering Processes

Lecture Notes in Computer Science 4606

Lecture Notes in Mathematics 2108

Lecture Notes in Computer Science 4417

Adult Attachment in Clinical Social Work

Essential Clinical Social Work Series

Foreign Taxes Paid and Foreign Source Income INTECH Global Income Managed Volatility Fund

Curriculum vitae. July 2007 present Professor of Mathematics (W3), Technische

Lecture Notes in Computer Science 8101

UNIVERSITIES AND COLLEGES TO WHICH THE CLASS OF 2013 HAS BEEN ADMITTED

Lecture Notes in Mathematics 2026

Data-Centric Systems and Applications

Urban Wildlife Conservation

[NUGENESIS SAMPLE MANAGEMENT ] AMPLE IMPROVING LAB EFFICIENCY, ANAGEMENT ACCELERATING BUSINESS DECISIONS. bigstock.com $69

Serden Ozcan, Department of Innovation and Organizational Economics, Copenhagen Business School, Denmark

Full professor and 6 assistant professors of IT A new school in IT Cameroon

Sustainable Supply Chains

Youth Gangs in International Perspective

Pediatric Board Study Guide

Colon Polyps and the Prevention of Colorectal Cancer

International Ranking. Institutional Research

Lecture Notes in Computer Science 5115

MALAYSIA: THE EMERGING EDUCATION HUB


CMMI for SCAMPI SM Class A Appraisal Results 2011 End-Year Update

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO Annual 3rd party application Pen Tests.

World University Rankings 2009 Top 200

Statistics for Biology and Health

Complications in Endodontic Surgery

Improving Quality Assurance in European Vocational Education and Training

Lecture Notes in Computer Science 4475

Metropolitan Locations in International High-Tech Networks

Agenda. Company Platform Customers Partners Competitive Analysis

Size and Development of the Shadow Economy of 31 European and 5 other OECD Countries from 2003 to 2015: Different Developments

UNIVERSIDADES TOP 100 RANKINGS DE ÁREA CIENCIAS NATURALES ARWU Y TIMES HIGHER EDUCATION

Accredited TOGAF 9 and ArchiMate 2 Training Course Calendar February 2016 onwards

Performance 2015: Global Stock Markets

Tufts University Senior Survey 2010 Graduate Schools by Major Report

Ammonia. Catalysis and Manufacture. Springer-Verlag. Berlin Heidelberg New York London Paris Tokyo Hong Kong Barcelona Budapest

Computer Communications and Networks

Guide. Axis Webinar. User guide

Get the benefits of Norgren s unique range of Online services


Listado de universidades extranjeras objeto de las becas de postgrado, clasificadas por área de conocimiento.

Lecture Notes in Computer Science 3706

University School Country Massachusetts Institute of

Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics.

WELCOME! Introduction. Celebrating. &PrimeRevenue. PrimeRevenue Hong Kong PrimeRevenue, Inc.

Thermo Scientific ClinQuan MD Software For In Vitro Diagnostic Use. Confidence in Results With Data Integrity

Transcription:

Lecture Notes in Computer Science 7482 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany

Willem Jonker Milan Petković (Eds.) Secure Data Management 9th VLDB Workshop, SDM 2012 Istanbul, Turkey, August 27, 2012 Proceedings 13

Volume Editors Willem Jonker University of Twente, EIT ICT Labs Faculty of Electronical Engineering, Mathematics and Computer Science P.O. Box 217, 7500 AE Enschede, The Netherlands E-mail: willem.jonker@ictlabs.eu Milan Petković Philips Research Europe, Technical University Eindhoven High Tech Campus 34, 5656 AE Eindhoven, The Netherlands E-mail: milan.petkovic@philips.com ISSN 0302-9743 e-issn 1611-3349 ISBN 978-3-642-32872-5 e-isbn 978-3-642-32873-2 DOI 10.1007/978-3-642-32873-2 Springer Heidelberg Dordrecht London New York Library of Congress Control Number: 2012944556 CR Subject Classification (1998): H.2.7-8, K.6.5, H.3, H.4, E.3, C.2 LNCS Sublibrary: SL 3 Information Systems and Application, incl. Internet/Web and HCI Springer-Verlag Berlin Heidelberg 2012 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)

Preface This year was the ninth edition of the VLDB Secure Data Management Workshop. The topic of data security remains an important area of research especially with the ever-growing amounts of data in numerous application areas and on the World-Wide Web. We received 22 submissions of which the Program Committee selected 10 full papers and 2 position papers to be presented at the workshop and included in the proceedings (approx. 50% acceptance rate). We hope the papers collected in this volume will stimulate your research in this area. The regular papers in the proceeding are grouped into four sections. Privacy and access control remain central topics in secure data management, especially where new applications keep posing new and often increasing requirements. Therefore the first two sections focus on privacy protection and access control. With the fast growth of the cloud for applications and data storage the need for security solutions for applications storing data in the cloud is also growing. Therefore, the third section focuses on secure storage on the cloud. Finally, the topic of trust is receiving more and more attention and gaining concreteness in recent research activities. Thus, the fourth and final section focuses on trust on the Web. We wish to thank all the authors of submitted papers for their high-quality submissions. We would also like to thank the Program Committee members as well as additional referees for doing an excellent review job. Finally, we acknowledge Christoph Bösch who helped in the technical preparation of the proceedings. August 2012 Willem Jonker Milan Petković

Organization Workshop Organizers Willem Jonker Milan Petković EIT ICT Labs/University of Twente, The Netherlands Philips Research/Eindhoven University of Technology, The Netherlands Program Committee Gerrit Bleumer Ljiljana Brankovic Sabrina De Capitani di Vimercati Ernesto Damiani Eric Diehl Jeroen Doumen Csilla Farkas Elena Ferrari Simone Fischer-Hubner Tyrone Grandison Dieter Gollmann Marit Hansen Min-Shiang Hwang Mizuho Iwaihara Sushil Jajodia Ton Kalker Marc Langheinrich Nguyen Manh Tho Sharad Mehrotra Stig Frode Mjolsnes Eiji Okamoto Sylvia Osborn Günther Pernul Bart Preneel Kai Rannenberg Francotyp-Postalia, Germany University of Newcastle, Australia University of Milan, Italy University of Milan, Italy Techicolor, France Irdeto, The Netherlands University of South Carolina, USA Università degli Studi dell Insubria, Italy Karlstad University, Sweden IBM Research, USA Technische Universität Hamburg-Harburg, Germany Independent Centre for Privacy Protection, Germany National Chung Hsing University, Taiwan Waseda University, Japan George Mason University, USA Huawei, USA University of Lugano (USI), Switzerland Vienna University of Technology, Austria University of California at Irvine, USA Norwegian University of Science and Technology, Norway University of Tsukuba, Japan University of Western Ontario, Canada University of Regensburg, Germany KU Leuven, Belgium Goethe University Frankfurt, Germany

VIII Organization David G. Rosado Ahmad-Reza Sadeghi Andreas Schaad Jason Smith Morton Swimmer Clark Thomborson Nicola Zannone Universidad de Castilla-La Mancha, Spain Darmstadt University, Germany SAP Labs, France Queensland University of Technology, Australia Forward-looking Threat Research, Trend Micro, Germany University of Auckland, New Zealand TU/e, The Netherlands

Table of Contents Privacy Protection Tradeoff Analysis of Relational Database Storage of Privacy Preferences... 1 Md. Sadim Mahmud and Sylvia L. Osborn Differential Privacy in Practice... 14 Maryam Shoaran, Alex Thomo, and Jens Weber A Model for Quantifying Information Leakage... 25 Steven Euijong Whang and Hector Garcia-Molina Access Control Privacy Protocol for Linking Distributed Medical Data... 45 Daniel Janusz, Martin Kost, and Johann-Christoph Freytag Cloud and the City: Facilitating Flexible Access Control over Data-Streams... 58 Wen Qiang Wang, Dinh Tien Tuan Anh, Hock Beng Lim, and Anwitaman Datta Policies for Composed Emergencies in Support of Disaster Management... 75 Barbara Carminati, Elena Ferrari, and Michele Guglielmi Secure Storage on the Cloud Indexing Encrypted Documents for Supporting Efficient Keyword Search... 93 Bijit Hore, Ee-Chien Chang, Mamadou H. Diallo, and Sharad Mehrotra Secure Quasi-Realtime Collaborative Editing over Low-Cost Storage Services... 111 Chunwang Zhang, Junjie Jin, Ee-Chien Chang, and Sharad Mehrotra Secure Metric-Based Index for Similarity Cloud... 130 Stepan Kozak, David Novak, and Pavel Zezula

X Table of Contents Trust on the Web Provenance for Web 2.0 Data... 148 Meghyn Bienvenu, Daniel Deutch, and Fabian M. Suchanek Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies... 156 Sean Thorpe, Tyrone Grandison, Indrajit Ray, and Abbie Barbir Towards Trustworthy Health Platform Cloud... 162 Mina Deng, Marco Nalin, Milan Petković, Ilaria Baroni, and Abitabile Marco Author Index... 177