Skip to main content

Detecting Local Machine Data Leakage in Real Time

  • Conference paper
  • First Online:
Advances in Digital Forensics XVI (DigitalForensics 2020)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 589))

Included in the following conference series:

  • 532 Accesses

Abstract

Data privacy leaks are becoming a serious problem. A large percentage of privacy leaks are due to inadvertent user errors. Most data leak detection solutions do not have privacy-preserving functionality. Moreover, due to the third-party delivery of data in the cloud, it is not possible to guarantee real-time leak detection.

This chapter proposes a local-side data leakage detection method that uses a suffix array. The method also employs encryption for data protection. The method is compared with mature data leak detection algorithms to demonstrate its effectiveness in real time and that the additional data protection overhead is acceptable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. Ananthi, M. Sendil and S. Karthik, Privacy preserving keyword search over encrypted cloud data, in Advances in Computing and Communications, A. Abraham, J. Lloret Mauri, J. Buford and S. Thampi (Eds.), Springer, Berlin Heidelberg, Germany, pp. 480–487, 2011.

    Google Scholar 

  2. CALO Project, Enron Email Dataset, SRI International, Menlo Park, California (www.cs.cmu.edu/ ./enron), 2015.

    Google Scholar 

  3. F. Chen, D. Wang, R. Li, J. Chen, Z. Ming, A. Liu, H. Duan, C. Wang and J. Qin, Secure hashing based verifiable pattern matching, IEEE Transactions on Information Forensics and Security, vol. 13(11), pp. 2677–2690, 2018.

    Google Scholar 

  4. S. Gog and E. Ohlebusch, Fast and lightweight LCP-array construction algorithms, Proceedings of the Meeting on Algorithm Engineering and Experiments, pp. 25–34, 2011.

    Google Scholar 

  5. S. Jha, L. Kruger and V. Shmatikov, Towards practical privacy for genomic computation, Proceedings of the IEEE Symposium on Security and Privacy, pp. 216–230, 2008.

    Google Scholar 

  6. C. Kalyan and K. Chandrasekaran, Information leak detection in financial email using mail pattern analysis under partial information, Proceedings of the Seventh WSEAS International Conference on Applied Informatics and Communications, vol. 7, pp. 104–109, 2007.

    Google Scholar 

  7. T. Kasai, G. Lee, H. Arimura, S. Arikawa and K. Park, Linear-time longest-common-prefix computation in suffix arrays and its applications, Proceedings of the Twelfth Annual Symposium on Combinatorial Pattern Matching, pp. 181–192, 2001.

    Google Scholar 

  8. H. Kim, H. Hong, H. Kim and S. Kang, Memory-efficient parallel string matching for intrusion detection systems, IEEE Communications Letters, vol. 13(12), pp. 1004–1006, 2009.

    Google Scholar 

  9. K. Li, Z. Zhong and L. Ramaswamy, Privacy-aware collaborative spam filtering, IEEE Transactions on Parallel and Distributed Systems, vol. 20(5), pp. 725–739, 2009.

    Google Scholar 

  10. P. Lin, Y. Lin, Y. Lai and T. Lee, Using string matching for deep packet inspection, IEEE Computer, vol. 41(4), pp. 23–28, 2008.

    Google Scholar 

  11. F. Liu, X. Shu, D. Yao and A. Butt, Privacy-preserving scanning of big content for sensitive data exposure with MapReduce, Proceedings of the Fifth ACM Conference on Data and Application Security and Privacy, pp. 195–206, 2015.

    Google Scholar 

  12. U. Manber and G. Myers, Suffix arrays: A new method for on-line string searches, SIAM Journal on Computing, vol. 22(5), pp. 935–948, 1993.

    Google Scholar 

  13. Y. Shi, Z. Jiang and K. Zhang, Policy-based customized privacy preserving mechanism for SaaS applications, Proceedings of the Eighth International Conference on Grid and Pervasive Computing and Collocated Workshops, pp. 491–500, 2013.

    Google Scholar 

  14. X. Shu, D. Yao and E. Bertino, Privacy-preserving detection of sensitive data exposure, IEEE Transactions on Information Forensics and Security, vol. 10(5), pp. 1092–1103, 2015.

    Google Scholar 

  15. X. Shu, J. Zhang, D. Yao and W. Feng, Rapid and parallel content screening for detecting transformed data exposure, Proceedings of the IEEE Conference on Computer Communications Workshops, pp. 191–196, 2015.

    Google Scholar 

  16. X. Shu, J. Zhang, D. Yao and W. Feng, Fast detection of transformed data leaks, IEEE Transactions on Information Forensics and Security, vol. 11(3), pp. 528–542, 2016.

    Google Scholar 

  17. B. Wang, S. Yu, W. Lou and Y. Hou, Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud, Proceedings of the IEEE Conference on Computer Communications, pp. 2112–2120, 2014.

    Google Scholar 

  18. D. Wang, X. Jia, C. Wang, K. Yang, S. Fu and M. Xu, Generalized pattern matching string search on encrypted data in cloud systems, Proceedings of the IEEE Conference on Computer Communications, pp. 2101–2109, 2015.

    Google Scholar 

  19. H. Wang, K. Tseng and J. Pan, Deep packet inspection with bit-reduced DFA for cloud systems, Proceedings of the International Conference on Computing, Measurement, Control and Sensor Networks, pp. 221–224, 2012.

    Google Scholar 

  20. J. Zhou, Z. Cao and X. Dong, PPOPM: More efficient privacy preserving outsourced pattern matching, Proceedings of the Twenty-First European Symposium on Research in Computer Security, part I, pp. 135–153, 2016.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jingcheng Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, J., Zhang, Y., Li, Y., Jia, Y., Chen, Y., Cao, J. (2020). Detecting Local Machine Data Leakage in Real Time. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics XVI. DigitalForensics 2020. IFIP Advances in Information and Communication Technology, vol 589. Springer, Cham. https://doi.org/10.1007/978-3-030-56223-6_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-56223-6_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-56222-9

  • Online ISBN: 978-3-030-56223-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics