Privacy Principles for Sharing Cyber Security Data

被引:20
|
作者
Fisk, Gina [1 ]
Ardi, Calvin [1 ,2 ]
Pickett, Neale [1 ]
Heidemann, John [2 ]
Fisk, Mike [1 ]
Papadopoulos, Christos [3 ]
机构
[1] Los Alamos Natl Lab, Los Alamos, NM 87545 USA
[2] USC Informat Sci Inst, Marina Del Rey, CA 90292 USA
[3] Colorado State Univ, Ft Collins, CO 80523 USA
关键词
D O I
10.1109/SPW.2015.23
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Sharing cyber security data across organizational boundaries brings both privacy risks in the exposure of personal information and data, and organizational risk in disclosing internal information. These risks occur as information leaks in network traffic or logs, and also in queries made across organizations. They are also complicated by the trade-offs in privacy preservation and utility present in anonymization to manage disclosure. In this paper, we define three principles that guide sharing security information across organizations: Least Disclosure, Qualitative Evaluation, and Forward Progress. We then discuss engineering approaches that apply these principles to a distributed security system. Application of these principles can reduce the risk of data exposure and help manage trust requirements for data sharing, helping to meet our goal of balancing privacy, organizational risk, and the ability to better respond to security with shared information.
引用
收藏
页码:193 / 197
页数:5
相关论文
共 50 条
  • [21] Cyber Security and Privacy Issues in Smart Grids
    Liu, Jing
    Xiao, Yang
    Li, Shuhui
    Liang, Wei
    Chen, C. L. Philip
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (04): : 981 - 997
  • [22] Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services
    Wang, Xiao-Si
    Herwono, Ian
    Di Cerbo, Francesco
    Kearney, Paul
    Shackleton, Mark
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [23] New European Data Privacy and Cyber Security Laws-One Year Later
    Kalman, Laurence
    COMMUNICATIONS OF THE ACM, 2019, 62 (04) : 38 - 39
  • [24] Towards Improved Cyber Security Information Sharing
    Dandurand, Luc
    Serrano, Oscar Serrano
    2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON), 2013,
  • [25] Harmonizing privacy with security principles and practices
    Pfleeger, S. L.
    Pfleeger, C. P.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (02)
  • [26] A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era
    Han, Si
    Han, Ke
    Zhang, Shouyi
    IEEE ACCESS, 2019, 7 : 60290 - 60298
  • [27] Privacy and Data Security
    Gaff, Brian M.
    Smedinghoff, Thomas J.
    Sor, Socheth
    COMPUTER, 2012, 45 (03) : 8 - 10
  • [28] Cyber Security Information Sharing During a Large Scale Real Life Cyber Security Exercise
    Hautamaki, Jari
    Kokkonen, Tero
    Sipola, Tuomo
    GOOD PRACTICES AND NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 3, WORLDCIST 2024, 2024, 987 : 45 - 55
  • [29] Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks
    Qu, Youyang
    Yu, Shui
    Zhou, Wanlei
    Chen, Shiping
    Wu, Jun
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (01): : 269 - 281
  • [30] A security architecture for data privacy and security
    Weaver, Alfred C.
    ETFA 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOL 1, PTS 1 AND 2, PROCEEDINGS, 2005, : 673 - 676