Abstract
For the problem that unstructured data is widespread, not under the centralized management of data resource management platform, and currently the safety monitoring of unstructured data is only for a part of data creation, transmission and destruction, lacking a data security management view with a whole life cycle, which is difficult to track data breaches and other security incidents, this paper studies that through log audit records and analysis report, it establishes a safety management view with a whole life cycle of unstructured data to effectively solve the problem of data breaches and other security incidents which cannot be traced. It uses unique file identifiers for the tracking of the whole lifecycle of unstructured data, establishes an evidence chain of the whole life cycle of the creation, transmission, access and destruction of data assets. It aims at providing analytical basis and forensic data support for events occurring at each aspect of data assets, and facilitating the tracking of data breaches and other security incidents, which has improved the accuracy and real-time of data monitoring.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Simms, D.: Big data, unstructured data, and the cloud: perspectives on internal controls. In: Xhafa, F., Barolli, L., Barolli, A., Papajorgji, P. (eds.) Modeling and Processing for Next-Generation Big-Data Technologies. MOST, vol. 4, pp. 319–340. Springer, Heidelberg (2015)
Mounji, A., Le Charlier, B., Zampunieris, D.: Distributed audit trail analysis. In: Proceedings of the Symposium on Network and Distributed System Security (NDSS), pp. 102–112 (1995)
Becker, R.A., Chambers, J.M.: Auditing of data analyses. SIAM J. Sci. Stat. Comput. 9(4), 747–760 (1988)
Dodd, T., Heinrich, N.: Method and system for calculating risk in association with a security audit of a computer network. US Patent, US 20020147803 A1 (2002)
Watanabe, A.: Security audit system and method. US Patent, US8505066 B2 (2008)
Kumari, P., Sharma, H., Shekhar, A.: Monitoring aspects of cloud over the big data analytics using the hadoop for managing short files. Data Min. Knowl. Eng. 7, 131–139 (2015)
Neels, A., Vasan, S., Fishel, S.: Generating Reports from Unstructured Data. United States Patent Application 20150019537
Cain, F., Cotichini, C., Nguyen, T.C.: Security monitoring apparatus and method. US Patent, US 8606971 B2 (2013)
Li, D.: Poster: toward a theoretical privacy framework for electronic locks in context of home security monitoring system for clouds of things. In: MobiHoc 2015, pp. 393–394 (2015)
Alexander, B., Talley, P., Hicks, J.: System and method for providing configurable security monitoring utilizing an integrated information system. US Patent, US 8392552 B2 (2013)
Acknowledgement
This work was sponsored by the Information Center of Guangdong Power Grid Corporation’s project of Study on Data Security in Big Data Environments (No. K-GD2014-1019) and Xinjiang Uygur Autonomous Region science and technology plan (No. 201230121), the Strategic Priority Research Program of Chinese Academy of Sciences (No. XDA06040601).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gu, G., Zhang, S., Wang, X., Cai, X., Chen, S. (2015). The Method and System Implementation of Unstructured Data Tracking and Forensics. In: Niu, W., et al. Applications and Techniques in Information Security. ATIS 2015. Communications in Computer and Information Science, vol 557. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48683-2_32
Download citation
DOI: https://doi.org/10.1007/978-3-662-48683-2_32
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-48682-5
Online ISBN: 978-3-662-48683-2
eBook Packages: Computer ScienceComputer Science (R0)