Privacy Principles for Sharing Cyber Security Data

被引:20
|
作者
Fisk, Gina [1 ]
Ardi, Calvin [1 ,2 ]
Pickett, Neale [1 ]
Heidemann, John [2 ]
Fisk, Mike [1 ]
Papadopoulos, Christos [3 ]
机构
[1] Los Alamos Natl Lab, Los Alamos, NM 87545 USA
[2] USC Informat Sci Inst, Marina Del Rey, CA 90292 USA
[3] Colorado State Univ, Ft Collins, CO 80523 USA
关键词
D O I
10.1109/SPW.2015.23
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Sharing cyber security data across organizational boundaries brings both privacy risks in the exposure of personal information and data, and organizational risk in disclosing internal information. These risks occur as information leaks in network traffic or logs, and also in queries made across organizations. They are also complicated by the trade-offs in privacy preservation and utility present in anonymization to manage disclosure. In this paper, we define three principles that guide sharing security information across organizations: Least Disclosure, Qualitative Evaluation, and Forward Progress. We then discuss engineering approaches that apply these principles to a distributed security system. Application of these principles can reduce the risk of data exposure and help manage trust requirements for data sharing, helping to meet our goal of balancing privacy, organizational risk, and the ability to better respond to security with shared information.
引用
收藏
页码:193 / 197
页数:5
相关论文
共 50 条
  • [1] Innovative Protocols for Data Sharing and Cyber Systems Security
    Ogiela, Urszula
    Takizawa, Makoto
    Ogiela, Lidia
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2018, 2019, 22 : 445 - 452
  • [2] Data Sharing Security and Privacy Preservation in Cloud Computing
    Prasad, Kadam
    Poonam, Jadhav
    Gauri, Khupase
    Thoutam, N. C.
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1070 - 1075
  • [3] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    ERCIM NEWS, 2015, (100): : 10 - 11
  • [4] Cyber security and privacy third cyber security and privacy EU forum, CSP forum 2014
    Cleary, Frances
    Felici, Massimo
    Communications in Computer and Information Science, 2014, 470
  • [5] ON THE SHARING OF CYBER SECURITY INFORMATION
    Luiijf, Eric
    Klaver, Marieke
    CRITICAL INFRASTRUCTURE PROTECTION IX, 2015, 466 : 29 - 46
  • [6] Achieving data security and privacy across healthcare applications using cyber security mechanisms
    Zhu, Shanying
    Saravanan, Vijayalakshmi
    Muthu, BalaAnand
    ELECTRONIC LIBRARY, 2020, 38 (5-6): : 979 - 995
  • [7] Game Theory for Cyber Security and Privacy
    Do, Cuong T.
    Tran, Nguyen H.
    Hong, Choongseon
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    Blasch, Erik
    Ren, Shaolei
    Pissinou, Niki
    Iyengar, Sundaraja Sitharama
    ACM COMPUTING SURVEYS, 2017, 50 (02) : 30 - 37
  • [8] Balancing Cyber-Security and Privacy
    Patakyova, Maria T.
    BRATISLAVA LAW REVIEW, 2020, 4 (01): : 181 - 183
  • [9] An Approach of Privacy Preservation and Data Security in Cloud Computing for Secured Data Sharing
    Dewangan, Revati Raman
    Soni, Sunita
    Mishal, Ashish
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2025, 18 (02) : 176 - 195
  • [10] Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing
    Zhang, Leyou
    Cui, Yilei
    Mu, Yi
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 387 - 397