Chapter 14

Protecting Data in Outsourcing Scenarios

Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati

14.1 Introduction

The rapid advancements in Information and Communication Technologies (ICTs) have brought the development of new computing paradigms, where the techniques for processing, storing, communicating, sharing, and disseminating information have radically changed. Individuals and organizations are more and more resorting to external servers [1] for the storage and the efficient and reliable dissemination of information. The main consequence of this trend is the development of a data outsourcing architecture on a wide scale. Although data outsourcing introduces many benefits in terms of management and availability ...

Get Handbook on Securing Cyber-Physical Critical Infrastructure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.