Skip to main content

The Method and System Implementation of Unstructured Data Tracking and Forensics

  • Conference paper
  • First Online:
Applications and Techniques in Information Security (ATIS 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 557))

  • 912 Accesses

Abstract

For the problem that unstructured data is widespread, not under the centralized management of data resource management platform, and currently the safety monitoring of unstructured data is only for a part of data creation, transmission and destruction, lacking a data security management view with a whole life cycle, which is difficult to track data breaches and other security incidents, this paper studies that through log audit records and analysis report, it establishes a safety management view with a whole life cycle of unstructured data to effectively solve the problem of data breaches and other security incidents which cannot be traced. It uses unique file identifiers for the tracking of the whole lifecycle of unstructured data, establishes an evidence chain of the whole life cycle of the creation, transmission, access and destruction of data assets. It aims at providing analytical basis and forensic data support for events occurring at each aspect of data assets, and facilitating the tracking of data breaches and other security incidents, which has improved the accuracy and real-time of data monitoring.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Simms, D.: Big data, unstructured data, and the cloud: perspectives on internal controls. In: Xhafa, F., Barolli, L., Barolli, A., Papajorgji, P. (eds.) Modeling and Processing for Next-Generation Big-Data Technologies. MOST, vol. 4, pp. 319–340. Springer, Heidelberg (2015)

    Google Scholar 

  2. Mounji, A., Le Charlier, B., Zampunieris, D.: Distributed audit trail analysis. In: Proceedings of the Symposium on Network and Distributed System Security (NDSS), pp. 102–112 (1995)

    Google Scholar 

  3. Becker, R.A., Chambers, J.M.: Auditing of data analyses. SIAM J. Sci. Stat. Comput. 9(4), 747–760 (1988)

    Article  MATH  Google Scholar 

  4. Dodd, T., Heinrich, N.: Method and system for calculating risk in association with a security audit of a computer network. US Patent, US 20020147803 A1 (2002)

    Google Scholar 

  5. Watanabe, A.: Security audit system and method. US Patent, US8505066 B2 (2008)

    Google Scholar 

  6. Kumari, P., Sharma, H., Shekhar, A.: Monitoring aspects of cloud over the big data analytics using the hadoop for managing short files. Data Min. Knowl. Eng. 7, 131–139 (2015)

    Google Scholar 

  7. Neels, A., Vasan, S., Fishel, S.: Generating Reports from Unstructured Data. United States Patent Application 20150019537

    Google Scholar 

  8. Cain, F., Cotichini, C., Nguyen, T.C.: Security monitoring apparatus and method. US Patent, US 8606971 B2 (2013)

    Google Scholar 

  9. Li, D.: Poster: toward a theoretical privacy framework for electronic locks in context of home security monitoring system for clouds of things. In: MobiHoc 2015, pp. 393–394 (2015)

    Google Scholar 

  10. Alexander, B., Talley, P., Hicks, J.: System and method for providing configurable security monitoring utilizing an integrated information system. US Patent, US 8392552 B2 (2013)

    Google Scholar 

Download references

Acknowledgement

This work was sponsored by the Information Center of Guangdong Power Grid Corporation’s project of Study on Data Security in Big Data Environments (No. K-GD2014-1019) and Xinjiang Uygur Autonomous Region science and technology plan (No. 201230121), the Strategic Priority Research Program of Chinese Academy of Sciences (No. XDA06040601).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sheng Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gu, G., Zhang, S., Wang, X., Cai, X., Chen, S. (2015). The Method and System Implementation of Unstructured Data Tracking and Forensics. In: Niu, W., et al. Applications and Techniques in Information Security. ATIS 2015. Communications in Computer and Information Science, vol 557. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48683-2_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-48683-2_32

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-48682-5

  • Online ISBN: 978-3-662-48683-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics