- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- Cloud Data Security Solutions
- Privacy, Security, and Data Protection
- Blockchain Technology Applications and Security
- Mobile Crowdsensing and Crowdsourcing
- Access Control and Trust
- Cloud Computing and Resource Management
- Adversarial Robustness in Machine Learning
- IoT and Edge/Fog Computing
- Service-Oriented Architecture and Web Services
- Distributed systems and fault tolerance
- Digital and Cyber Forensics
- Security and Verification in Computing
- Internet Traffic Analysis and Secure E-voting
- Vehicular Ad Hoc Networks (VANETs)
- Data Quality and Management
- Scientific Computing and Data Management
- Data Stream Mining Techniques
- Data Mining Algorithms and Applications
- Advanced Database Systems and Queries
- Software System Performance and Reliability
- Information and Cyber Security
- Cybercrime and Law Enforcement Studies
- Complexity and Algorithms in Graphs
University of Milan
2016-2025
Nelson Mandela University
2021
University of Milano-Bicocca
2018
The proper protection of data privacy is a complex task that requires careful analysis what actually has to be kept private. Several definitions have been proposed over the years, from traditional syntactic definitions, which capture degree enjoyed by respondents with numerical value, more recent semantic take into consideration mechanism chosen for releasing data. In this paper, we illustrate evolution privacy, and survey some techniques devised enforcing such definitions. We also...
Fragmentation has been recently proposed as a promising approach to protect the confidentiality of sensitive associations whenever data need undergo external release or storage. By splitting attributes among different fragments, fragmentation guarantees these under assumption that such cannot be reconstructed by re-combining fragments. We note requirement fragments do not have in common, imposed previous proposals, is only necessary, but sufficient, condition ensure information recombined...
The current cloud market features a multitude of services that differ from one another in terms functionality or security/performance guarantees. Users wishing to use service for storing, processing, sharing their data must be able select the best matches desiderata. In this paper, we propose novel, user centric, brokering supporting users specification requirements and enabling evaluation against available plans, assessing how much different plans can satisfy user's Our allows specify...
The widespread diffusion of mobile devices integrating location capabilities makes the users yet another type sensitive information used by service providers in provision accurate and personalized services (location-based -- LBSs). A major problem this context is that privacy increasingly at risk, calling for solutions balancing benefits provided LBSs guarantees. In paper, we study a novel related to inferences caused release consecutive positions LBS providers. We provide an approach based...
Data fragmentation has been proposed as a solution for protecting the confidentiality of sensitive associations when releasing data publishing or external storage. To enrich utility fragments, recent approach put forward idea complementing pair fragments with some (non-precise, hence loose) information on association between them. Starting from observation that in presence multiple publication several independent pairs can cause improper leakage information, this paper we extend loose to...
We propose an approach for allowing users to assess the integrity of distributed queries computed by a computational cloud, which is trusted neither data confidentiality nor query integrity. In particular, we consider join over multiple sources, maintained at separate (trusted) storage servers, where computation performed inexpensive, but potentially untrusted, cloud. illustrate working our and its application in MapReduce scenario. also provide analysis experimental results.
With the growing needs for data sharing and dissemination, privacy-preserving publishing is becoming an important issue that still requires further investigation. In this paper, we make a step towards private publication by proposing solution based on release of vertical views (frag ments) over relational table satisfy confidentiality visibility constraints expressing requirements information protection release, respectively. We translate problem computing fragmentation composed minimum...
With the cloud emerging as a successful paradigm for conveniently storing, accessing, processing, and sharing information, market has seen an incredible growth. An ever-increasing number of providers offer today several plans, with different guarantees in terms service properties such performance, cost, or security. While variety naturally corresponds to diversified user demand, it is far from trivial users identify plans that better suit their specific needs. In this paper, we address...
Recent ICTs paradigms such as cloud computing, data outsourcing, digital markets, and the spread of multiple social media based on Web 2.0 technologies, facilitate exchange large information flows among a myriad interconnected devices users, for different aims purposes. This complex scenario underlies development on-line ecosystems interacting entities, where concepts community, self-organization, evolution knowledge are fundamental.
IoT infrastructures can be seen as an interconnected network of sources data, whose analysis and processing beneficial for our society.Since devices are limited in storage computation capabilities, relying on external cloud providers has recently been identified a promising solution storing managing data.Due to the heterogeneity data applicative scenarios, service delivery should driven by requirements specific applications.In this paper, we propose novel approach supporting application...