Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Giovanni Livraga is active.

Publication


Featured researches published by Giovanni Livraga.


IEEE Transactions on Dependable and Secure Computing | 2014

Fragmentation in Presence of Data Dependencies

Sabrina De Capitani di Vimercati; Sara Foresti; Sushil Jajodia; Giovanni Livraga; Stefano Paraboschi; Pierangela Samarati

Fragmentation has been recently proposed as a promising approach to protect the confidentiality of sensitive associations whenever data need to undergo external release or storage. By splitting attributes among different fragments, fragmentation guarantees confidentiality of the associations among these attributes under the assumption that such associations cannot be reconstructed by re-combining the fragments. We note that the requirement that fragments do not have attributes in common, imposed by previous proposals, is only a necessary, but not sufficient, condition to ensure that information in different fragments cannot be recombined as dependencies may exist among data enabling some form of linkability. In this paper, we identify the problem of improper information leakage due to data dependencies, provide a formulation of the problem based on a natural graphical modeling, and present an approach to tackle it in an efficient and scalable way.


International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems | 2012

DATA PRIVACY: DEFINITIONS AND TECHNIQUES

Sabrina De Capitani di Vimercati; Sara Foresti; Giovanni Livraga; Pierangela Samarati

The proper protection of data privacy is a complex task that requires a careful analysis of what actually has to be kept private. Several definitions of privacy have been proposed over the years, from traditional syntactic privacy definitions, which capture the protection degree enjoyed by data respondents with a numerical value, to more recent semantic privacy definitions, which take into consideration the mechanism chosen for releasing the data. In this paper, we illustrate the evolution of the definitions of privacy, and we survey some data protection techniques devised for enforcing such definitions. We also illustrate some well-known application scenarios in which the discussed data protection techniques have been successfully used, and present some open issues.


Computers & Security | 2013

Enforcing dynamic write privileges in data outsourcing

Sabrina De Capitani di Vimercati; Sara Foresti; Sushil Jajodia; Giovanni Livraga; Stefano Paraboschi; Pierangela Samarati

Users and companies are more and more resorting to external providers for storing their data and making them available to others. Since data sharing is typically selective (i.e., accesses to certain data should be allowed only to authorized users), there is the problem of enforcing authorizations on the outsourced data. Recently proposed approaches based on selective encryption provide convenient enforcement of read privileges, but are not directly applicable for supporting write privileges. In this paper, we extend selective encryption approaches to the support of write privileges. Our proposal enriches the approach based on key derivation of existing solutions and complements it with a hash-based approach for supporting write privileges. Enforcement of write privileges and of possible policy updates relies on the - controlled - cooperation of the external provider. Our solution also allows the data owner and the users to verify the integrity of the outsourced data.


FOSAD | 2014

Encryption and Fragmentation for Data Confidentiality in the Cloud

Sabrina De Capitani di Vimercati; Robert F. Erbacher; Sara Foresti; Sushil Jajodia; Giovanni Livraga; Pierangela Samarati

Cloud computing has emerged as a successful paradigm allowing individual users as well as companies to resort to external providers for storing/processing data or making them available to others. Together with the many benefits, cloud computing introduces however new security and privacy risks. A major issue is that the data owner, storing data at external providers, loses control over them, leaving them potentially exposed to improper access, use, or dissemination. In this chapter, we consider the problem of protecting confidentiality of sensitive information when relying on external cloud providers for storing and processing data. We introduce confidentiality requirements and then illustrate encryption and data fragmentation as possible protection techniques. In particular, we discuss different approaches that have been proposed using encryption (with indexing) and fragmentation, either by themselves or in combination, to satisfy confidentiality requirements.


DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy | 2012

Enforcing subscription-based authorization policies in cloud scenarios

Sabrina De Capitani di Vimercati; Sara Foresti; Sushil Jajodia; Giovanni Livraga

The rapid advances in the Information and Communication Technologies have brought to the development of on-demand high quality applications and services allowing users to easily access resources anywhere anytime. Users can pay for a service and access the resources made available during their subscriptions until the subscribed periods expire. Users are then forced to download such resources if they want to access them also after the subscribed periods. To avoid this burden to the users, we propose the adoption of a subscription-based access control policy that combines a flexible key derivation structure with selective encryption. The publication of new resources as well as the management of subscriptions are accommodated by adapting the key derivation structure in a transparent way for the users.


Foundations of security analysis and design VI | 2011

Protecting privacy in data release

Sabrina De Capitani di Vimercati; Sara Foresti; Giovanni Livraga; Pierangela Samarati

The evolution of the Information and Communication Technology has radically changed our electronic lives, making information the key driver for todays society. Every action we perform requires the collection, elaboration, and dissemination of personal information. This situation has clearly brought a tremendous exposure of private and sensitive information to privacy breaches. In this chapter, we describe how the techniques developed for protecting data have evolved in the years. We start by providing an overview of the first privacy definitions (k-anonymity, -diversity, t-closeness, and their extensions) aimed at ensuring proper data protection against identity and attribute disclosures. We then illustrate how changes in the underlying assumptions lead to scenarios characterized by different and more complex privacy requirements. In particular, we show the impact on privacy when considering multiple releases of the same data or dynamic data collections, fine-grained privacy definitions, generic privacy constraints, and the external knowledge that a potential adversary may exploit for inferring sensitive information. We also briefly present the concept of differential privacy that has recently emerged as an alternative privacy definition.


Journal of Computer Security | 2012

An OBDD approach to enforce confidentiality and visibility constraints in data publishing

Valentina Ciriani; Sabrina De Capitani di Vimercati; Sara Foresti; Giovanni Livraga; Pierangela Samarati

With the growing needs for data sharing and dissemination, privacy-preserving data publishing is becoming an important issue that still requires further investigation. In this paper, we make a step towards private data publication by proposing a solution based on the release of vertical views fragments over a relational table that satisfy confidentiality and visibility constraints expressing requirements for information protection and release, respectively. We translate the problem of computing a fragmentation composed of the minimum number of fragments into the problem of computing a maximum weighted clique over a fragmentation graph. The fragmentation graph models fragments, efficiently computed using Ordered Binary Decision Diagrams OBDDs, that satisfy all the confidentiality constraints and a subset of the visibility constraints defined in the system. We then show an exact and a heuristic algorithm for computing a minimal and a locally minimal fragmentation, respectively. Finally, we provide experimental results comparing the execution time and the fragmentations returned by the exact and heuristic algorithms. The experiments show that the heuristic algorithm has low computation cost and computes a fragmentation close to optimum.


communications and networking symposium | 2014

Integrity for distributed queries

Sabrina De Capitani di Vimercati; Sara Foresti; Sushil Jajodia; Giovanni Livraga; Stefano Paraboschi; Pierangela Samarati

We propose an approach for allowing users to assess the integrity of distributed queries computed by a computational cloud, which is trusted neither for data confidentiality nor for query integrity. In particular, we consider join queries over multiple data sources, maintained at separate (trusted) storage servers, where join computation is performed by an inexpensive, but potentially untrusted, computational cloud. We illustrate the working of our approach and its application in a MapReduce scenario. We also provide an analysis and experimental results.


Lecture Notes in Computer Science | 2013

Extending loose associations to multiple fragments

Sabrina De Capitani di Vimercati; Sara Foresti; Sushil Jajodia; Giovanni Livraga; Stefano Paraboschi; Pierangela Samarati

Data fragmentation has been proposed as a solution for protecting the confidentiality of sensitive associations when publishing data at external servers. To enrich the utility of the published fragments, a recent approach has put forward the idea of complementing them with loose associations, a sanitized form of the sensitive associations broken by fragmentation. The original proposal considers fragmentations composed of two fragments only, and supports the definition of a loose association between this pair of fragments. In this paper, we extend loose associations to multiple fragments. We first illustrate how the publication of multiple loose associations between pairs of fragments of a generic fragmentation can potentially expose sensitive associations. We then describe an approach for supporting the more general case of publishing a loose association among an arbitrary set of fragments.


DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy | 2011

Enforcing confidentiality and data visibility constraints: an OBDD approach

Valentina Ciriani; Sabrina De Capitani di Vimercati; Sara Foresti; Giovanni Livraga; Pierangela Samarati

The problem of enabling privacy-preserving data releases has become more and more important in the last years thanks to the increasing needs of sharing and disseminating information. In this paper we address the problem of computing data releases in the form of fragments (vertical views) over a relational table, which satisfy both confidentiality and visibility constraints, expressing needs for information protection and release, respectively. We propose a modeling of constraints and of the data fragmentation problem based on Boolean formulas and Ordered Binary Decision Diagrams (OBDDs). Exploiting OBDDs, we efficiently manipulate Boolean formulas, thus easily computing data fragments that satisfy the constraints.

Collaboration


Dive into the Giovanni Livraga's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge