Risk-Based Privacy-Aware Access Control for Threat Detection Systems

被引:6
|
作者
Metoui, Nadia [1 ]
Bezzi, Michele [2 ]
Armando, Alessandro [3 ]
机构
[1] Univ Trento, DISI, Trento, Italy
[2] SAP Labs France, Secur Res, Sophia Antipolis, France
[3] Univ Genoa, DIBRIS, Genoa, Italy
关键词
Trust; Risk; Privacy; Utility Privacy-preserving threat detection;
D O I
10.1007/978-3-662-56266-6_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threat detection systems collect and analyze a large amount of security data logs for detecting potential attacks. Since log data from enterprise systems may contain sensitive and personal information access should be limited to the data relevant to the task at hand as mandated by data protection regulations. To this end, data need to be pre-processed (anonymized) to eliminate or obfuscate the sensitive information that is not-strictly necessary for the task. Additional security/accountability measures may be also applied to reduce the privacy risk, such as logging the access to the personal data or imposing deletion obligations. Anonymization reduces the privacy risk, but it should be carefully applied and balanced with utility requirements of the different phases of the process: a preliminary analysis may require fewer details than an in-depth investigation on a suspect set of logs. We propose a risk-based privacy-aware access control framework for threat detection systems, where each access request is evaluated by comparing the privacy-risk and the trustworthiness of the request. When the risk is too large compared to the trust level, the framework can apply adaptive adjustment strategies to decrease the risk (e.g., by selectively obfuscating the data) or to increase the trust level to perform a given task (e.g., imposing enforceable obligations to the user). We show how the framework can simultaneously address both the privacy and the utility requirements. The experimental results presented in the paper that the framework leads to meaningful results, and real-time performance, within an industrial threat detection solution.
引用
收藏
页码:1 / 30
页数:30
相关论文
共 50 条
  • [21] A privacy-aware access control model for distributed network monitoring
    Papagiannakopoulou, Eugenia I.
    Koukovini, Maria N.
    Lioudakis, Georgios V.
    Garcia-Alfaro, Joaquin
    Kaklamani, Dimitra I.
    Venieris, Iakovos S.
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (07) : 2263 - 2281
  • [22] An aspect-oriented approach to privacy-aware access control
    Chen, Kung
    Wang, Da-Wei
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3016 - +
  • [23] Privacy query rewriting algorithm instrumented by a privacy-aware access control model
    Oulmakhzoune, Said
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Morucci, Stephane
    Barhamgi, Mahmoud
    Benslimane, Djamal
    ANNALS OF TELECOMMUNICATIONS, 2014, 69 (1-2) : 3 - 19
  • [24] Privacy query rewriting algorithm instrumented by a privacy-aware access control model
    Said Oulmakhzoune
    Nora Cuppens-Boulahia
    Frédéric Cuppens
    Stéphane Morucci
    Mahmoud Barhamgi
    Djamal Benslimane
    annals of telecommunications - annales des télécommunications, 2014, 69 : 3 - 19
  • [25] Assurance, Consent and Access Control for Privacy-Aware OIDC Deployments
    Sassetti, Gianluca
    Sharif, Amir
    Sciarretta, Giada
    Carbone, Roberto
    Ranise, Silvio
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVII, DBSEC 2023, 2023, 13942 : 203 - 222
  • [26] Privacy-aware access control with trust management in web service
    Min Li
    Xiaoxun Sun
    Hua Wang
    Yanchun Zhang
    Ji Zhang
    World Wide Web, 2011, 14 : 407 - 430
  • [27] Privacy-aware access control through negotiation in daily life service
    Park, Hyun-A
    Zhan, Justin
    Lee, Dong Hoon
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5075 : 514 - +
  • [28] A Game Theory Model for Electricity Theft Detection and Privacy-Aware Control in AMI Systems
    Cardenas, Alvaro A.
    Amin, Saurabh
    Schwartz, Galina
    Dong, Roy
    Sastry, Shankar
    2012 50TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2012, : 1830 - 1837
  • [29] Privacy-aware multi-tenant access control for cloud workflow
    Wen Y.
    Liu J.
    Dou W.
    Chen A.
    Zhou M.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2019, 25 (04): : 894 - 900
  • [30] Online Auction Fraud Detection in Privacy-Aware Reputation Systems
    Lin, Jun-Lin
    Khomnotai, Laksamee
    ENTROPY, 2017, 19 (07)