Masking Gateway for Enterprises

  • Sara Porat
  • Boaz Carmeli
  • Tamar Domany
  • Tal Drory
  • Ksenya Kveler
  • Alex Melament
  • Haim Nelken
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5533)

Abstract

Today’s business world revolves around the need to share data. On the other hand, the leakage of sensitive data is becoming one of our main security threats. Organizations are becoming more aware of the need to control the information that flows out of their boundaries and must more strictly monitor this flow in order to comply with government regulations. This paper presents an SOA-based solution called Masking Gateway for Enterprises (MAGEN), which allows the sharing of data while safeguarding sensitive business data. The major novelty lies in architecting a single system that handles a wide range of scenarios in a centralized and unified manner.

Keywords

Data Leakage Prevention (DLP) data masking de-identification anonymization Service Oriented Architecture (SOA) Optical Character Recognition (OCR) 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Burke, B.E.: Information Protection and Control Survey: Data Loss Prevention and Encryption Trends. IDC Special Study, Doc. # 211109 (2008)Google Scholar
  2. 2.
    Proctor, P.E., Mogull, R., Ouellet, E.: Magic Quadrant for Content Monitoring and Filtering and Data Loss Prevention. Gartner report, ID Number: G00147610 (2007)Google Scholar
  3. 3.
    Yuhanna, N.: Protecting Private Data with Data Masking. Forrester report (2006), http://www.forrester.com/Research/Document/Excerpt/0,7211,39116,00.html
  4. 4.
    Feiman, J.: Data Obfuscation (Masking, Privacy, Scrambling): Many Names for the Same Technique. Gartner report, ID Number: G00157661 (2008)Google Scholar
  5. 5.
  6. 6.
  7. 7.
  8. 8.
    Nelken, H., Vortman, P., Cohen, S., Melament, A.: De-Identification Framework. IBM White Paper (2004)Google Scholar
  9. 9.
    Gardner, J.L.: HIDE: An Integrated System for Health Information DE-identification. In: 21st IEEE International Symposium on Computer-Based Medical Systems, CBMS 2008, pp. 254–259. IEEE Press, Los Alamitos (2008)CrossRefGoogle Scholar
  10. 10.
    Carter, G.: LDAP System Administration. O’ Reilly, Sebastopol (2003)Google Scholar
  11. 11.
  12. 12.
  13. 13.
  14. 14.
  15. 15.
    Agrawal, R., Srikant, R.: Privacy Preserving Data Mining. ACM’s Special Interest Group on Management Of Data (SIGMOD) 29(2), 439–450 (2000)Google Scholar
  16. 16.
    Sweeney, L.: k-anonymity: A Model for Protecting Privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557–570 (2002)MathSciNetCrossRefMATHGoogle Scholar
  17. 17.
    Bayardo, R.J., Agrawal, R.: Data Privacy through Optimal k-anonymization. In: Proceedings of the 21st IEEE International Conference on Data Engineering. ICDE 2005, pp. 217–228 (2005)Google Scholar
  18. 18.
    Shand, B., Rashbass, J.: Protecting privacy in tabular healthcare data: explicit uncertainty for disclosure control. In: Proceedings of the 2005 ACM workshop on Privacy in the Electronic Society (WPES 2005), pp. 20–26 (2005) Google Scholar
  19. 19.
    Goshtasby, A., Ehrich, R.W.: Contextual word recognition using probabilistic relaxation labeling. Pattern Recognition 21(5), 455–462 (1988)CrossRefGoogle Scholar
  20. 20.
    Porat, S., Carmeli, B., Domany, T., Drory, T., Geva, A., Tarem, A.: Dynamic Masking of Application Displays Using OCR Technologies. IBM Systems Journal, special issue on Global Service Delivery Technologies (2008) (submitted)Google Scholar
  21. 21.
  22. 22.
    Cranor, L.F.: Web Privacy with P3P. O’Reilly, Sebastopol (2002)Google Scholar
  23. 23.
    OASIS eXtensible Access Control Markup Language (XACML), http://lists.oasis-open.org/archives/wsia/200205/pdf00001.pdf

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Sara Porat
    • 1
  • Boaz Carmeli
    • 1
  • Tamar Domany
    • 1
  • Tal Drory
    • 1
  • Ksenya Kveler
    • 1
  • Alex Melament
    • 1
  • Haim Nelken
    • 1
  1. 1.IBM Haifa Research LabHaifa UniversityHaifaIsrael

Personalised recommendations