Data Leak Detection As a Service: Challenges and Solutions
نویسندگان
چکیده
We describe a network-based data-leak detection (DLD) technique, the main feature of which is that the detection does not require the data owner to reveal the content of the sensitive data. Instead, only a small amount of specialized digests are needed. Our technique – referred to as the fuzzy fingerprint – can be used to detect accidental data leaks due to human errors or application flaws. The privacy-preserving feature of our algorithms minimizes the exposure of sensitive data and enables the data owner to safely delegate the detection to others. We describe how cloud providers can offer their customers data-leak detection as an add-on service with strong privacy guarantees. We perform extensive experimental evaluation on the privacy, efficiency, accuracy and noise tolerance of our techniques. Our evaluation results under various data-leak scenarios and setups show that our method can support accurate detection with very small number of false alarms, even when the presentation of the data has been transformed. It also indicates that the detection accuracy does not degrade when partial digests are used. We further provide a quantifiable method to measure the privacy guarantee offered by our fuzzy fingerprint framework.
منابع مشابه
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network
Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...
متن کاملNational Program for the Rehabilitation of Socially Harmed Women in the Iranian Welfare Organization: Goals, Service Patterns, Challenges and the Future Path
Background and Aim: Prostitution is one of the alarming social harms in any population with considerable challenges and concerns. Many prostitutes have been victims of unfavorable social conditions. The purpose of this study was to determine and explain the goals, service patterns, challenges and proposed solutions for the Program of Rehabilitation of Socially Harmed Women in the Iranian Welfar...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملINVERSE FREQUENCY RESPONSE ANALYSIS FOR PIPELINES LEAK DETECTION USING THE PARTICLE SWARM OPTIMIZATION
Inverse Transient Analysis (ITA) is a powerful approach for leak detection of pipelines. When the pipe transient flow is analyzed in frequency domain the ITA is called Inverse Frequency Response Analysis (IFRA). To implement an IFRA for leak detection, a transient state is initiated in the pipe by fast closure of the downstream end valve. Then, the pressure time history at the valve location is...
متن کامل