Risk-Based Privacy-Aware Access Control for Threat Detection Systems

被引:6
|
作者
Metoui, Nadia [1 ]
Bezzi, Michele [2 ]
Armando, Alessandro [3 ]
机构
[1] Univ Trento, DISI, Trento, Italy
[2] SAP Labs France, Secur Res, Sophia Antipolis, France
[3] Univ Genoa, DIBRIS, Genoa, Italy
关键词
Trust; Risk; Privacy; Utility Privacy-preserving threat detection;
D O I
10.1007/978-3-662-56266-6_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threat detection systems collect and analyze a large amount of security data logs for detecting potential attacks. Since log data from enterprise systems may contain sensitive and personal information access should be limited to the data relevant to the task at hand as mandated by data protection regulations. To this end, data need to be pre-processed (anonymized) to eliminate or obfuscate the sensitive information that is not-strictly necessary for the task. Additional security/accountability measures may be also applied to reduce the privacy risk, such as logging the access to the personal data or imposing deletion obligations. Anonymization reduces the privacy risk, but it should be carefully applied and balanced with utility requirements of the different phases of the process: a preliminary analysis may require fewer details than an in-depth investigation on a suspect set of logs. We propose a risk-based privacy-aware access control framework for threat detection systems, where each access request is evaluated by comparing the privacy-risk and the trustworthiness of the request. When the risk is too large compared to the trust level, the framework can apply adaptive adjustment strategies to decrease the risk (e.g., by selectively obfuscating the data) or to increase the trust level to perform a given task (e.g., imposing enforceable obligations to the user). We show how the framework can simultaneously address both the privacy and the utility requirements. The experimental results presented in the paper that the framework leads to meaningful results, and real-time performance, within an industrial threat detection solution.
引用
收藏
页码:1 / 30
页数:30
相关论文
共 50 条
  • [31] THE PRIVACY-AWARE ACCESS CONTROL SYSTEM USING ATTRIBUTE-AND ROLE-BASED ACCESS CONTROL IN PRIVATE CLOUD
    Mon, Ei Ei
    Naing, Thinn Thu
    2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, : 447 - 451
  • [32] Privacy-Aware Distributed Bayesian Detection
    Li, Zuxing
    Oechtering, Tobias J.
    IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2015, 9 (07) : 1345 - 1357
  • [33] A Privacy-Aware Access Model on Anonymized Data
    Huang, Xuezhen
    Liu, Jiqiang
    Han, Zhen
    TRUSTED SYSTEMS, INTRUST 2014, 2015, 9473 : 201 - 212
  • [34] PRIVACY-AWARE QUICKEST CHANGE DETECTION
    Lau, Tze Siong
    Tay, Wee Peng
    2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 5999 - 6003
  • [35] Towards the development of privacy-aware systems
    Guarda, Paolo
    Zannone, Nicola
    INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (02) : 337 - 350
  • [36] Application of Privacy-aware Role-based Access Control Model in IHE-XDS
    Dauletbek, Daniya
    Yuan, Shi-Zhong
    4TH ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA 2017), 2017, 12
  • [37] Designing Privacy-Aware Systems in the Cloud
    Kalloniatis, Christos
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 113 - 123
  • [38] PriGuarder: A Privacy-Aware Access Control Approach Based on Attribute Fuzzy Grouping in Cloud Environments
    Lin, Li
    Liu, Ting-Ting
    Li, Shuang
    Magurawalage, Chathura M. Sarathchandra
    Tu, Shan-Shan
    IEEE ACCESS, 2018, 6 : 1882 - 1893
  • [39] Risk-based Decision Method for Access Control Systems
    Shaikh, Riaz Ahmed
    Adi, Kamel
    Logrippo, Luigi
    Mankovski, Serge
    2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 189 - 192
  • [40] Privacy-Aware Identity Cloning Detection Based on Deep Forest
    Alharbi, Ahmed
    Dong, Hai
    Yi, Xun
    Abeysekara, Prabath
    SERVICE-ORIENTED COMPUTING (ICSOC 2021), 2021, 13121 : 415 - 430