Risk-Based Privacy-Aware Access Control for Threat Detection Systems

被引:6
|
作者
Metoui, Nadia [1 ]
Bezzi, Michele [2 ]
Armando, Alessandro [3 ]
机构
[1] Univ Trento, DISI, Trento, Italy
[2] SAP Labs France, Secur Res, Sophia Antipolis, France
[3] Univ Genoa, DIBRIS, Genoa, Italy
来源
TRANSACTIONS ON LARGE-SCALE DATA- AND KNOWLEDGECENTERED SYSTEMS XXXVI: SPECIAL ISSUE ON DATA AND SECURITY ENGINEERING | 2018年 / 10720卷
关键词
Trust; Risk; Privacy; Utility Privacy-preserving threat detection;
D O I
10.1007/978-3-662-56266-6_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threat detection systems collect and analyze a large amount of security data logs for detecting potential attacks. Since log data from enterprise systems may contain sensitive and personal information access should be limited to the data relevant to the task at hand as mandated by data protection regulations. To this end, data need to be pre-processed (anonymized) to eliminate or obfuscate the sensitive information that is not-strictly necessary for the task. Additional security/accountability measures may be also applied to reduce the privacy risk, such as logging the access to the personal data or imposing deletion obligations. Anonymization reduces the privacy risk, but it should be carefully applied and balanced with utility requirements of the different phases of the process: a preliminary analysis may require fewer details than an in-depth investigation on a suspect set of logs. We propose a risk-based privacy-aware access control framework for threat detection systems, where each access request is evaluated by comparing the privacy-risk and the trustworthiness of the request. When the risk is too large compared to the trust level, the framework can apply adaptive adjustment strategies to decrease the risk (e.g., by selectively obfuscating the data) or to increase the trust level to perform a given task (e.g., imposing enforceable obligations to the user). We show how the framework can simultaneously address both the privacy and the utility requirements. The experimental results presented in the paper that the framework leads to meaningful results, and real-time performance, within an industrial threat detection solution.
引用
收藏
页码:1 / 30
页数:30
相关论文
共 50 条
  • [41] Privacy-aware access control for message exchange in vehicular ad hoc networks
    Sushama Karumanchi
    Anna Squicciarini
    Dan Lin
    Telecommunication Systems, 2015, 58 : 349 - 361
  • [42] Privacy-aware access control for message exchange in vehicular ad hoc networks
    Karumanchi, Sushama
    Squicciarini, Anna
    Lin, Dan
    TELECOMMUNICATION SYSTEMS, 2015, 58 (04) : 349 - 361
  • [43] A novel Threat Evaluation method for privacy-aware system in RFID
    Tian, Yuan
    Song, Biao
    Huh, Eui-Nam
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2011, 8 (04) : 230 - 240
  • [44] Privacy-Aware and Context-Sensitive Access Control for Opportunistic Data Sharing
    Luis Herrera, Juan
    Chen, Hsiao-Yuan
    Berrocal, Javier
    Murillo, Juan M.
    Julien, Christine
    21ST IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2021), 2021, : 762 - 769
  • [45] Privacy-Aware Detection of Shilling Profiles on Arbitrarily Distributed Recommender Systems
    Yilmazel, Burcu
    Bilge, Alper
    Kaleli, Cihan
    IEEE ACCESS, 2019, 7 : 28863 - 28885
  • [46] Privacy-Aware Proximity Based Services
    Mascetti, Sergio
    Bettini, Claudio
    Freni, Dario
    Wang, X. Sean
    Jajodia, Sushil
    MDM: 2009 10TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, 2009, : 31 - +
  • [47] Personalization in privacy-aware highly dynamic systems
    Sackmann, Stefan
    Strueker, Jens
    Accorsi, Rafael
    COMMUNICATIONS OF THE ACM, 2006, 49 (09) : 32 - +
  • [48] Dynamic risk-based decision methods for access control systems
    Shaikh, Riaz Ahmed
    Adi, Kamel
    Logrippo, Luigi
    COMPUTERS & SECURITY, 2012, 31 (04) : 447 - 464
  • [49] A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress
    Papagiannakopoulou, Eugenia I. .
    Koukovini, Maria N.
    Lioudakis, Georgios V.
    Garcia-Alfaro, Joaquin
    Kaklamani, Dimitra I.
    Venieris, Iakovos S.
    FOUNDATIONS AND PRACTICE OF SECURITY, 2011, 6888 : 208 - +
  • [50] Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things
    Zhang, Yinghui
    Deng, Robert H.
    Han, Gang
    Zheng, Dong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 123 : 89 - 100