A Composite Privacy Leakage Indicator

被引:1
|
作者
Ulltveit-Moe, Nils [1 ]
Oleshchuk, Vladimir A. [1 ]
机构
[1] Univ Agder, N-4879 Grimstad, Norway
关键词
Privacy policy authorisation; Anonymisation; Subjective logic; Network monitoring; XACML; Outsourcing;
D O I
10.1007/s11277-011-0383-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper proposes a Subjective Logic based composite privacy leakage metric that both takes into account the amount of information leakage and also that information with high entropy in some cases may be considered encrypted. It is furthermore shown both analytically and experimentally that Min-entropy is considered better than Shannon, Renyi or Max entropy for identifying encrypted content for the composite metric. This is in particular useful for implementing privacy-enhanced Intrusion Detection Systems (IDS), where sampled encrypted traffic can be considered to have low risk of revealing sensitive information. The combined metric can be used in a Policy Enforcement Point that acts as a proxy/anonymiser in order to to reduce the leakage of private or sensitive information from the IDS sensors to an outsourced Managed Security Service provider. Although the composite privacy indicator is IDS specific, the authorisation architecture is general, and may also be useful for anonymising or pseusonymising sensitive information from or to other types of sensors that need to be exposed to the Internet. The solution is based on the eXtensible Access Control Markup Language policy language extended with support for Subjective Logic, in order to provide a method for expressing fine-grained access control policies that are based on uncertain evidences.
引用
收藏
页码:511 / 526
页数:16
相关论文
共 50 条
  • [21] Analysis of Economic Leakage Level and Infrastructure Leakage Index Indicator by Applying Active Leakage Control
    Yilmaz, Salih
    Firat, Mahmut
    Ates, Abdullah
    Ozdemir, Ozgur
    JOURNAL OF PIPELINE SYSTEMS ENGINEERING AND PRACTICE, 2021, 12 (04)
  • [22] Privacy Leakage Analysis for Colluding Smart Apps
    Wang, Junzhe
    Luo, Lannan
    52ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOP VOLUME (DSN-W 2022), 2022, : 96 - 102
  • [23] Privacy leakage analysis in online social networks
    Li, Yan
    Li, Yingjiu
    Yan, Qiang
    Deng, Robert H.
    COMPUTERS & SECURITY, 2015, 49 : 239 - 254
  • [24] A QUANTITATIVE METRIC FOR PRIVACY LEAKAGE IN FEDERATED LEARNING
    Liu, Yong
    Zhu, Xinghua
    Wang, Jianzong
    Xiao, Jing
    2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 3065 - 3069
  • [25] Precursor of privacy leakage detection for individual user
    Li, Xuefeng
    Zhao, Chensu
    Hu, Yi
    Xie, Honglin
    Wang, Yuhang
    Zhao, Jingyang
    COMPUTERS & SECURITY, 2024, 142
  • [26] Privacy Leakage and Protection of InputConnection Interface in Android
    Li, Chi-Yu
    Wang, Hsin-Yi
    Wang, Wei-Ching
    Huang, Chun-Ying
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (03): : 3309 - 3323
  • [27] Quantifying Membership Privacy via Information Leakage
    Saeidian, Sara
    Cervia, Giulia
    Oechtering, Tobias J.
    Skoglund, Mikael
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3096 - 3108
  • [28] Privacy Leakage Attacks in Browsers by Colluding Extensions
    Saini, Anil
    Gaur, Manoj Singh
    Laxmi, Vijay
    Singhal, Tushar
    Conti, Mauro
    INFORMATION SYSTEMS SECURITY (ICISS 2014), 2014, 8880 : 257 - 276
  • [29] Mosaic: Quantifying Privacy Leakage in Mobile Networks
    Xia, Ning
    Song, Han Hee
    Liao, Yong
    Iliofotou, Marios
    Nucci, Antonio
    Zhang, Zhi-Li
    Kuzmanovic, Aleksandar
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04) : 279 - 290
  • [30] Analysing Privacy Leakage of Life Events on Twitter
    Kekulluoglu, Dilara
    Magdy, Walid
    Vaniea, Kami
    PROCEEDINGS OF THE 12TH ACM CONFERENCE ON WEB SCIENCE, WEBSCI 2020, 2020, : 287 - 294