Priv-Share: A privacy-preserving framework for differential and trustless delegation of cyber threat intelligence using blockchain

被引:0
|
作者
Dunnett, Kealan [1 ]
Pal, Shantanu [2 ]
Jadidi, Zahra [3 ]
Dedeoglu, Volkan [4 ]
Jurdak, Raja [1 ]
机构
[1] Queensland Univ Technol, Sch Comp Sci, Brisbane, Qld 4000, Australia
[2] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3125, Australia
[3] Griffith Univ, Sch Informat & Commun Technol, Gold Coast, Qld 4222, Australia
[4] Commonwealth Sci & Ind Res Org Data61 CSIRO Data61, Brisbane 4069, Australia
关键词
Blockchain; Privacy; Cyber threat intelligence; Information sharing; Delegation; Data injection; INTERNET; DESIGN;
D O I
10.1016/j.comnet.2024.110686
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of the Internet of Things (IoT), Industry 5.0 applications and associated services have caused a powerful transition in the cyber threat landscape. As a result, organisations require new ways to proactively manage the risks associated with their infrastructure. In response, a significant amount of research has focused on developing efficient Cyber Threat Intelligence (CTI) sharing. However, in many cases, CTI contains sensitive information that has the potential to leak valuable information or cause reputational damage to the sharing organisation. While a number of existing CTI sharing approaches have utilised blockchain to facilitate privacy, it can be highlighted that a comprehensive approach that enables dynamic trust-based decision-making, facilitates decentralised trust evaluation and provides CTI producers with highly granular sharing of CTI is lacking. Subsequently, in this paper, we propose a blockchain-based CTI sharing framework, called Priv-Share, , as a promising solution towards this challenge. In particular, we highlight that the integration of differential sharing, , trustless delegation, , democratic group managers and incentives as part of Priv-Share ensures that it can satisfy these criteria. The results of an analytical evaluation of the proposed framework using both queuing and game theory demonstrate its ability to provide scalable CTI sharing in a trustless manner. Moreover, a quantitative evaluation of an Ethereum proof-of-concept prototype demonstrates that applying the proposed framework within real-world contexts is feasible.
引用
收藏
页数:15
相关论文
共 31 条