Sharing but Protecting Content Against Internal Leakage for Organisations
نویسندگان
چکیده
Dishonest employees, who have privileges to obtain corporate critical information and access internal resources, cause the problem of internal leakage. Employees, who have such privileges and know from where to obtain corporate sensitive information, are far more dangerous than outsiders. This paper proposes a mechanism for protecting information inside organisations against unauthorised disclosure by internal adversaries. It mainly focusses on sharing and simultaneously guarding information assets from one another. This paper proposes a novel solution for binding sensitive content to organisation devices, thereby preventing uncontrolled content leakage to other devices. In the proposed solution we used trusted computing technology to provide a hardware-based root of trust on client side.
منابع مشابه
Mitigating the risk of insider threats when sharing credentials
This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharing in home networks to address the problem of unauthorized confidential content sharing in organizations. In particular it focuses on how to achieve secure content sharing between employees in a group while limiting content leakage to unauthorized individuals outside the group. The thesis discusse...
متن کاملWhen the cloud improves security
Through combined, integrated web and email protection, organisations will be in a better position to protect personal and sensitive corporate information from online and internal threats When the cloud improves security …move protection to where the threats are Executive summary Malware threats are on the rise and the attacks are growing in sophistication and complexity. Individuals and specifi...
متن کاملSecurity Analysis of a Hash-Based Secret Sharing Scheme
Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...
متن کاملThe Ends of Knowledge Sharing in Networks: Using Information Technology to Start Knowledge Protection
Organisations need networks to leverage external knowledge, particularly for SMEs with their limited resources. Organisations use networks for knowledge sharing to foster innovation. This use of networks bears risks like the unwanted spill-over of knowledge. Consequently, organisations need to balance sharing and protecting knowledge. While scholars have extensively investigated the sharing per...
متن کاملHigh-order Masking by Using Coding Theory and Its Application to AES
To guarantee that some implementation of a cryptographic scheme is secure against side channel analysis, one needs to formally prove its leakage resilience. A relatively recent trend is to apply methods pertaining to the field of Multi-Party Computation: in particular this means applying secret sharing techniques to design masking countermeasures. It is known besides that there is a strong conn...
متن کامل