Differentiated security levels for personal identifiable information in identity management system

被引:21
作者
Chen, Jianyong [1 ]
Wu, Guihua [1 ]
Shen, Linlin [1 ,2 ]
Ji, Zhen [1 ]
机构
[1] Shenzhen Univ, Dept Comp Sci & Technol, Shenzhen, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing, Peoples R China
关键词
Identity management; Differentiated security; Personal identifiable information;
D O I
10.1016/j.eswa.2011.04.226
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid development of Internet services, identity management (IdM) has got widely attraction as the credit agency between users and service providers. It facilitates users to use the Internet service, promotes service providers to enrich services, and makes Internet more security. Personally identifiable information (PII) is the most important information asset with which identity provider (IdP) can provide various services. Since PII is sensitive to users, it has become a serious problem that PII is leaked, illegal selected, illegal accessed. In order to improve security of PII, this study develops a novel framework using data mining to forecast information asset value and find appropriate security level for protecting user PII. The framework has two stages. In the first stage, user information asset is forecasted by data mining tool (decision tree) from PII database. Then security level for user PII is determined by the information asset value assuming that the higher information asset is, the more security requirement of PII is. In the second stage, with time being, number of illegal access and attack can be accumulated. It can be used to reconstruct the decision tree and update the knowledge base combined with the result of the first stage. Thus security level of PII can be timely adjusted and the protection of PII can be guaranteed even when security threat changes. Furthermore, an empirical case was studied in a user dataset to demonstrate the protection decision derived from the framework for various PII. Simulation results show that the framework with data mining can protect PII effectively. Our work can benefit the development of e-business service. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:14156 / 14162
页数:7
相关论文
共 23 条
[1]   Identity management, privacy, and price discrimination [J].
Acquisti, Alessandro .
IEEE SECURITY & PRIVACY, 2008, 6 (02) :46-50
[2]   SOFTWARE RISK MANAGEMENT - PRINCIPLES AND PRACTICES [J].
BOEHM, BW .
IEEE SOFTWARE, 1991, 8 (01) :32-41
[3]  
Cantor Scott, 2005, SECURITY ASSERTION M
[4]   A study on the application of data mining to disadvantaged social classes in Taiwan's population census [J].
Chang, Chin-Jui ;
Shyue, Shiahn-Wern .
EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (01) :510-518
[5]  
CHEN J, 2008, INT S EL COMM SEC GU, P301
[6]   Mining fuzzy association rules from questionnaire data [J].
Chen, Yen-Liang ;
Weng, Cheng-Hsiung .
KNOWLEDGE-BASED SYSTEMS, 2009, 22 (01) :46-56
[7]  
Cunha R, 2009, LECT NOTES BUS INF P, V24, P317
[8]   An introduction to ROC analysis [J].
Fawcett, Tom .
PATTERN RECOGNITION LETTERS, 2006, 27 (08) :861-874
[9]   Data mining to improve industrial standards and enhance production and marketing: An empirical study in apparel industry [J].
Hsu, Chih-Hung .
EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (03) :4185-4191
[10]   Using AUC and accuracy in evaluating learning algorithms [J].
Huang, J ;
Ling, CX .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (03) :299-310