Abstract
Data privacy leaks are becoming a serious problem. A large percentage of privacy leaks are due to inadvertent user errors. Most data leak detection solutions do not have privacy-preserving functionality. Moreover, due to the third-party delivery of data in the cloud, it is not possible to guarantee real-time leak detection.
This chapter proposes a local-side data leakage detection method that uses a suffix array. The method also employs encryption for data protection. The method is compared with mature data leak detection algorithms to demonstrate its effectiveness in real time and that the additional data protection overhead is acceptable.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
S. Ananthi, M. Sendil and S. Karthik, Privacy preserving keyword search over encrypted cloud data, in Advances in Computing and Communications, A. Abraham, J. Lloret Mauri, J. Buford and S. Thampi (Eds.), Springer, Berlin Heidelberg, Germany, pp. 480–487, 2011.
CALO Project, Enron Email Dataset, SRI International, Menlo Park, California (www.cs.cmu.edu/Â ./enron), 2015.
F. Chen, D. Wang, R. Li, J. Chen, Z. Ming, A. Liu, H. Duan, C. Wang and J. Qin, Secure hashing based verifiable pattern matching, IEEE Transactions on Information Forensics and Security, vol. 13(11), pp. 2677–2690, 2018.
S. Gog and E. Ohlebusch, Fast and lightweight LCP-array construction algorithms, Proceedings of the Meeting on Algorithm Engineering and Experiments, pp. 25–34, 2011.
S. Jha, L. Kruger and V. Shmatikov, Towards practical privacy for genomic computation, Proceedings of the IEEE Symposium on Security and Privacy, pp. 216–230, 2008.
C. Kalyan and K. Chandrasekaran, Information leak detection in financial email using mail pattern analysis under partial information, Proceedings of the Seventh WSEAS International Conference on Applied Informatics and Communications, vol. 7, pp. 104–109, 2007.
T. Kasai, G. Lee, H. Arimura, S. Arikawa and K. Park, Linear-time longest-common-prefix computation in suffix arrays and its applications, Proceedings of the Twelfth Annual Symposium on Combinatorial Pattern Matching, pp. 181–192, 2001.
H. Kim, H. Hong, H. Kim and S. Kang, Memory-efficient parallel string matching for intrusion detection systems, IEEE Communications Letters, vol. 13(12), pp. 1004–1006, 2009.
K. Li, Z. Zhong and L. Ramaswamy, Privacy-aware collaborative spam filtering, IEEE Transactions on Parallel and Distributed Systems, vol. 20(5), pp. 725–739, 2009.
P. Lin, Y. Lin, Y. Lai and T. Lee, Using string matching for deep packet inspection, IEEE Computer, vol. 41(4), pp. 23–28, 2008.
F. Liu, X. Shu, D. Yao and A. Butt, Privacy-preserving scanning of big content for sensitive data exposure with MapReduce, Proceedings of the Fifth ACM Conference on Data and Application Security and Privacy, pp. 195–206, 2015.
U. Manber and G. Myers, Suffix arrays: A new method for on-line string searches, SIAM Journal on Computing, vol. 22(5), pp. 935–948, 1993.
Y. Shi, Z. Jiang and K. Zhang, Policy-based customized privacy preserving mechanism for SaaS applications, Proceedings of the Eighth International Conference on Grid and Pervasive Computing and Collocated Workshops, pp. 491–500, 2013.
X. Shu, D. Yao and E. Bertino, Privacy-preserving detection of sensitive data exposure, IEEE Transactions on Information Forensics and Security, vol. 10(5), pp. 1092–1103, 2015.
X. Shu, J. Zhang, D. Yao and W. Feng, Rapid and parallel content screening for detecting transformed data exposure, Proceedings of the IEEE Conference on Computer Communications Workshops, pp. 191–196, 2015.
X. Shu, J. Zhang, D. Yao and W. Feng, Fast detection of transformed data leaks, IEEE Transactions on Information Forensics and Security, vol. 11(3), pp. 528–542, 2016.
B. Wang, S. Yu, W. Lou and Y. Hou, Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud, Proceedings of the IEEE Conference on Computer Communications, pp. 2112–2120, 2014.
D. Wang, X. Jia, C. Wang, K. Yang, S. Fu and M. Xu, Generalized pattern matching string search on encrypted data in cloud systems, Proceedings of the IEEE Conference on Computer Communications, pp. 2101–2109, 2015.
H. Wang, K. Tseng and J. Pan, Deep packet inspection with bit-reduced DFA for cloud systems, Proceedings of the International Conference on Computing, Measurement, Control and Sensor Networks, pp. 221–224, 2012.
J. Zhou, Z. Cao and X. Dong, PPOPM: More efficient privacy preserving outsourced pattern matching, Proceedings of the Twenty-First European Symposium on Research in Computer Security, part I, pp. 135–153, 2016.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 IFIP International Federation for Information Processing
About this paper
Cite this paper
Liu, J., Zhang, Y., Li, Y., Jia, Y., Chen, Y., Cao, J. (2020). Detecting Local Machine Data Leakage in Real Time. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics XVI. DigitalForensics 2020. IFIP Advances in Information and Communication Technology, vol 589. Springer, Cham. https://doi.org/10.1007/978-3-030-56223-6_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-56223-6_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-56222-9
Online ISBN: 978-3-030-56223-6
eBook Packages: Computer ScienceComputer Science (R0)