A Composite Privacy Leakage Indicator

被引:1
|
作者
Ulltveit-Moe, Nils [1 ]
Oleshchuk, Vladimir A. [1 ]
机构
[1] Univ Agder, N-4879 Grimstad, Norway
关键词
Privacy policy authorisation; Anonymisation; Subjective logic; Network monitoring; XACML; Outsourcing;
D O I
10.1007/s11277-011-0383-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper proposes a Subjective Logic based composite privacy leakage metric that both takes into account the amount of information leakage and also that information with high entropy in some cases may be considered encrypted. It is furthermore shown both analytically and experimentally that Min-entropy is considered better than Shannon, Renyi or Max entropy for identifying encrypted content for the composite metric. This is in particular useful for implementing privacy-enhanced Intrusion Detection Systems (IDS), where sampled encrypted traffic can be considered to have low risk of revealing sensitive information. The combined metric can be used in a Policy Enforcement Point that acts as a proxy/anonymiser in order to to reduce the leakage of private or sensitive information from the IDS sensors to an outsourced Managed Security Service provider. Although the composite privacy indicator is IDS specific, the authorisation architecture is general, and may also be useful for anonymising or pseusonymising sensitive information from or to other types of sensors that need to be exposed to the Internet. The solution is based on the eXtensible Access Control Markup Language policy language extended with support for Subjective Logic, in order to provide a method for expressing fine-grained access control policies that are based on uncertain evidences.
引用
收藏
页码:511 / 526
页数:16
相关论文
共 50 条
  • [1] A Composite Privacy Leakage Indicator
    Nils Ulltveit-Moe
    Vladimir A. Oleshchuk
    Wireless Personal Communications, 2011, 61 : 511 - 526
  • [2] (In)visible Privacy Indicator: Security Analysis of Privacy Indicator on Android Devices
    Choe, Yurak
    Yu, Hyungseok
    Kim, Taeho
    Lee, Shinjae
    Lee, Hojoon
    Kim, Hyoungshick
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1630 - 1643
  • [3] On the Privacy Leakage of Coded Caching
    Wang, Yu
    Abouzeid, Alhussein A.
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [4] The Impact of Linkability On Privacy Leakage
    Hassanpour, Ahmad
    Utsash, Masrur Masqub
    Yang, Bian
    PROCEEDINGS OF THE 2023 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING, ASONAM 2023, 2023, : 364 - 370
  • [5] Privacy Leakage in Wireless Charging
    Liu, Jianwei
    Zou, Xiang
    Zhao, Leqi
    Tao, Yusheng
    Hu, Sideng
    Han, Jinsong
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 501 - 514
  • [6] On the damage and compensation of privacy leakage
    Wang, DW
    Liau, CJ
    Hsu, TS
    Chen, JKP
    RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY XVIII, 2004, 144 : 311 - 324
  • [7] Privacy Leakage in Privacy-Preserving Neural Network Inference
    Wei, Mengqi
    Zhu, Wenxing
    Cui, Liangkun
    Li, Xiangxue
    Li, Qiang
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 133 - 152
  • [8] Privacy Model: Detect Privacy Leakage for Chinese Browser Extensions
    Zhao, Yufei
    Yang, Liqun
    Li, Zhoujun
    He, Longtao
    Zhang, Yipeng
    IEEE ACCESS, 2021, 9 : 44502 - 44513
  • [9] On Privacy Leakage through Silence Suppression
    Zhu, Ye
    INFORMATION SECURITY, 2011, 6531 : 276 - 282
  • [10] PRIVACY LEAKAGE IN HEALTH SOCIAL NETWORKS
    Al Faresi, Ahmed
    Alazzawe, Ahmed
    Alazzawe, Anis
    COMPUTATIONAL INTELLIGENCE, 2014, 30 (03) : 514 - 534