Explanation-Based Auditing
نویسندگان
چکیده
To comply with emerging privacy laws and regulations, it has become common for applications like electronic health records systems (EHRs) to collect access logs, which record each time a user (e.g., a hospital employee) accesses a piece of sensitive data (e.g., a patient record). Using the access log, it is easy to answer simple queries (e.g., Who accessed Alice’s medical record?), but this often does not provide enough information. In addition to learning who accessed their medical records, patients will likely want to understand why each access occurred. In this paper, we introduce the problem of generating explanations for individual records in an access log. The problem is motivated by user-centric auditing applications, and it also provides a novel approach to misuse detection. We develop a framework for modeling explanations which is based on a fundamental observation: For certain classes of databases, including EHRs, the reason for most data accesses can be inferred from data stored elsewhere in the database. For example, if Alice has an appointment with Dr. Dave, this information is stored in the database, and it explains why Dr. Dave looked at Alice’s record. Large numbers of data accesses can be explained using general forms called explanation templates. Rather than requiring an administrator to manually specify explanation templates, we propose a set of algorithms for automatically discovering frequent templates from the database (i.e., those that explain a large number of accesses). We also propose techniques for inferring collaborative user groups, which can be used to enhance the quality of the discovered explanations. Finally, we have evaluated our proposed techniques using an access log and data from the University of Michigan Health System. Our results demonstrate that in practice we can provide explanations for over 94% of data accesses in the log.
منابع مشابه
Auditing with Incomplete Logs
The protection of sensitive information is of utmost importance for organizations. The complexity and dynamism of modern businesses are forcing a re-think of traditional protection mechanisms. In particular, a priori policy enforcement mechanisms are often complemented with auditing mechanisms that rely on an a posteriori analysis of logs recording users’ activities to prove conformity to polic...
متن کاملطراحی الگوی ممیزی فرایندهای آموزشی و پژوهشی
Abstract The main goal of this research has been design the auditing model for research and educational processes to based on its findings, context, dimensions, elements and requirements that have essentiality and efficiency to research and educational processes audit, develop and explanation. The present study from the point of goal has been applied research and has been done by Exploratory Mi...
متن کاملInvestigating Problems and Obstacles of the Risk-Based Auditing in Iran and Prioritizing them
In this study, we investigate the problems and obstacles of implementing the risk-based auditing in Iran. We set four hypotheses and used questionnaire containing 45 questions to collect the required data. The questionnaires were distributed between Iranian certified public accountants who were partners or directors of audit firms and audit organizations member of Iranian certified public accou...
متن کاملInfluence factors analysis of online auditing performance Using Gray Analysis (GIA)
Many researches on online technology and online auditing applications have been conducted, but researches on online auditing performance are very limited. The purpose of this study is to analyze the factors affecting performance and to assess the performance of online auditing using Gray Analysis (GIA). The statistical society of this study is 10 top stock companies who want to use online audit...
متن کاملIntroducing a positive thinking model in auditing based on grounded theory
The purpose of this study is Provide a positive thinking model in auditing based on grounded theory. The statistical population of the study included auditing experts and the samples included 14 experts using snowball sampling method. Data collection tools included semi-structured interviews and data analysis method was content analysis using a three-step encoding using Maxqda software. For t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- PVLDB
دوره 5 شماره
صفحات -
تاریخ انتشار 2011