A Composite Privacy Leakage Indicator

被引:1
|
作者
Ulltveit-Moe, Nils [1 ]
Oleshchuk, Vladimir A. [1 ]
机构
[1] Univ Agder, N-4879 Grimstad, Norway
关键词
Privacy policy authorisation; Anonymisation; Subjective logic; Network monitoring; XACML; Outsourcing;
D O I
10.1007/s11277-011-0383-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper proposes a Subjective Logic based composite privacy leakage metric that both takes into account the amount of information leakage and also that information with high entropy in some cases may be considered encrypted. It is furthermore shown both analytically and experimentally that Min-entropy is considered better than Shannon, Renyi or Max entropy for identifying encrypted content for the composite metric. This is in particular useful for implementing privacy-enhanced Intrusion Detection Systems (IDS), where sampled encrypted traffic can be considered to have low risk of revealing sensitive information. The combined metric can be used in a Policy Enforcement Point that acts as a proxy/anonymiser in order to to reduce the leakage of private or sensitive information from the IDS sensors to an outsourced Managed Security Service provider. Although the composite privacy indicator is IDS specific, the authorisation architecture is general, and may also be useful for anonymising or pseusonymising sensitive information from or to other types of sensors that need to be exposed to the Internet. The solution is based on the eXtensible Access Control Markup Language policy language extended with support for Subjective Logic, in order to provide a method for expressing fine-grained access control policies that are based on uncertain evidences.
引用
收藏
页码:511 / 526
页数:16
相关论文
共 50 条
  • [31] Secret Rate - Privacy Leakage in Biometric Systems
    Ignatenko, Tanya
    Willems, Frans
    2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 2251 - 2255
  • [32] A Systematic Method on PDF Privacy Leakage Issues
    Feng, Yun
    Liu, Baoxu
    Cui, Xiang
    Liu, Chaoge
    Kang, Xuebin
    Su, Junwei
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1020 - 1029
  • [33] PRIvacy LEakage Methodology (PRILE) for IDS Rules
    Ulltveit-Moe, Nils
    Oleshchuk, Vladimir
    PRIVACY AND IDENTITY MANAGEMENT FOR LIFE, 2010, 320 : 213 - 225
  • [34] Characterizing Privacy Leakage in Encrypted DNS Traffic
    Hu, Guannan
    Fukuda, Kensuke
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2023, E106B (02) : 156 - 165
  • [35] Location Privacy Leakage through Sensory Data
    Liang, Yi
    Cai, Zhipeng
    Han, Qilong
    Li, Yingshu
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [36] Leakage indicator for gas-packed food
    不详
    FOOD AUSTRALIA, 1997, 49 (03): : 105 - 105
  • [37] MICROBIAL-CONTAMINATION AS AN INDICATOR OF SEWER LEAKAGE
    DIZER, H
    HAGENDORF, U
    WATER RESEARCH, 1991, 25 (07) : 791 - 796
  • [38] On Composite Leakage Current Maximization
    Ashesh Rastogi
    Kunal P. Ganeshpure
    Alodeep Sanyal
    Sandip Kundu
    Journal of Electronic Testing, 2008, 24 : 405 - 420
  • [39] On composite leakage current maximization
    Rastogi, Ashesh
    Ganeshpure, Kunal P.
    Sanyal, Alodeep
    Kundu, Sandip
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2008, 24 (04): : 405 - 420
  • [40] Quantifying Location Privacy Leakage from Transaction Prices
    Gervais, Arthur
    Ritzdorf, Hubert
    Lucic, Mario
    Lenders, Vincent
    Capkun, Srdjan
    COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 382 - 405