Risk-Based Privacy-Aware Access Control for Threat Detection Systems

被引:6
|
作者
Metoui, Nadia [1 ]
Bezzi, Michele [2 ]
Armando, Alessandro [3 ]
机构
[1] Univ Trento, DISI, Trento, Italy
[2] SAP Labs France, Secur Res, Sophia Antipolis, France
[3] Univ Genoa, DIBRIS, Genoa, Italy
关键词
Trust; Risk; Privacy; Utility Privacy-preserving threat detection;
D O I
10.1007/978-3-662-56266-6_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threat detection systems collect and analyze a large amount of security data logs for detecting potential attacks. Since log data from enterprise systems may contain sensitive and personal information access should be limited to the data relevant to the task at hand as mandated by data protection regulations. To this end, data need to be pre-processed (anonymized) to eliminate or obfuscate the sensitive information that is not-strictly necessary for the task. Additional security/accountability measures may be also applied to reduce the privacy risk, such as logging the access to the personal data or imposing deletion obligations. Anonymization reduces the privacy risk, but it should be carefully applied and balanced with utility requirements of the different phases of the process: a preliminary analysis may require fewer details than an in-depth investigation on a suspect set of logs. We propose a risk-based privacy-aware access control framework for threat detection systems, where each access request is evaluated by comparing the privacy-risk and the trustworthiness of the request. When the risk is too large compared to the trust level, the framework can apply adaptive adjustment strategies to decrease the risk (e.g., by selectively obfuscating the data) or to increase the trust level to perform a given task (e.g., imposing enforceable obligations to the user). We show how the framework can simultaneously address both the privacy and the utility requirements. The experimental results presented in the paper that the framework leads to meaningful results, and real-time performance, within an industrial threat detection solution.
引用
收藏
页码:1 / 30
页数:30
相关论文
共 50 条
  • [1] Trust and Risk-Based Access Control for Privacy Preserving Threat Detection Systems
    Metoui, Nadia
    Bezzi, Michele
    Armando, Alessandro
    FUTURE DATA AND SECURITY ENGINEERING, FDSE 2016, 2016, 10018 : 285 - 304
  • [2] Privacy-aware Role Based Access Control
    Ni, Qun
    Trombetta, Alberto
    Bertino, Elisa
    Lobo, Jorge
    SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 41 - 50
  • [3] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Calo, Seraphin B.
    IEEE SECURITY & PRIVACY, 2009, 7 (04) : 35 - 43
  • [4] Conditional privacy-aware role based access control
    Ni, Qun
    Lin, Dan
    Bertino, Elisa
    Lobo, Jorge
    COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 72 - +
  • [5] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Brodie, Carolyn
    Karat, Clare-Marie
    Karat, John
    Trombetta, Alberto
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (03)
  • [6] A privacy-aware access control system
    Ardagna, C.
    Cremonini, M.
    di Vimercati, S.
    Samarati, P.
    JOURNAL OF COMPUTER SECURITY, 2008, 16 (04) : 369 - 397
  • [7] Purpose fusion: The risk purpose based privacy-aware data access control
    Liu Y.-M.
    Zhou H.-F.
    Wang Z.-H.
    Wang W.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (08): : 1339 - 1348
  • [8] A Semantic Framework for Privacy-Aware Access Control
    Lioudakis, Georgios V.
    Dellas, Nikolaos L.
    Koutsoloukas, Eleftherios A.
    Kapitsaki, Georgia M.
    Kaklamani, Dimitra I.
    Venieris, Iakovos S.
    2008 INTERNATIONAL MULTICONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (IMCSIT), VOLS 1 AND 2, 2008, : 757 - 764
  • [9] Access control in a privacy-aware eLearning environment
    Franz, Elke
    Wahrig, Hagen
    Boettcher, Alexander
    Borcea-Pfitzmann, Katrin
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 879 - +
  • [10] Privacy-aware access control for video data in intelligent surveillance systems
    Vagts, Hauke
    Jakoby, Andreas
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2012, 2012, 8406