The increasing availability of large collections of personal information as well as of data storage facilities for supporting data-intensive services, support the view that service providers will be more and more requested to be responsible for the storage and the efficient and reliable dissemination of information, thus realizing a "data outsourcing" architecture. Within a data outsourcing architecture data are stored together with application front-ends at the sites of an external server who takes full charges of their management. While publishing data on external servers may increase service availability, reducing data owners' burden of managing data, data outsourcing introduces new privacy and security concerns since the server storing the data may be honest-but-curious. A honest-but-curious server honestly manages the data but may not be trusted by the data owner to read their content. To ensure adequate privacy protection, a traditional solution consists in encrypting the outsourced data, thus preventing outside attacks as well as infiltration from the server itself. Such traditional solutions have however the disadvantage of reducing query execution efficiency and of preventing selective information release. This introduces then the need to develop new models and methods for the definition and enforcement of access control and privacy restrictions on outsourced data while ensuring an efficient query execution.In this thesis, we present a comprehensive approach for protecting sensitive information when it is stored on systems that are not under the data owner's control. There are mainly three security requirements that need to be considered when designing a system for ensuring confidentiality of data stored and managed by a honest-but-curious server. The first requirement is access control enforcement to limit the ability of authorized users to access system's resources. In traditional contexts, a trusted module of the data management system is in charge of enforcing the access control policy. In the considered scenario, the service provider is not trusted for enforcing the access control policy and the data owner is not willing to mediate access requests to filter query results. We therefore propose a new access control system, based on selective encryption, that does not require the presence of a trusted module in the system for the enforcement of the policy. The second requirement is privacy protection to limit the visibility of stored/published data to non authorized II users while minimizing the adoption of encryption. Data collections often contain personally identifiable information that needs to be protected both at storage and when disseminated to other parties. As an example, medical data cannot be stored or published along with the identity of the patients they refer to. To guarantee privacy protection and to limit the use of encryption, in this thesis we first propose a solution for modeling in a simple while powerful way privacy requirements through confidentiality constraints, which a...