An Analysis on Critical Information Security Systems

A Technical Review Tour and Study of the Sensitive Information Security Methods and Techniques
  • Sona Kaushik
  • Shalini Puri
Part of the Advances in Intelligent Systems and Computing book series (volume 167)


Information’s security and delicacy make the electronic systems in a challenging and chasing phase when it is passed on from an end to other via Internet. In today’s world, as the necessity and importance of sensitive information are growing with new advancements and technologies, they become more prone to attacks and oriented towards the insecure environment. Attackers always want just an attack on such information to either to use it or intercept it. In this direction, many researchers have put their good efforts not only just to provide information security, instead they also consider the related primary security concerns, like confidentiality, access control, integrity along with the quality issues of reliability, robustness, usability etc. This effort included and presented a technological advancement based comparative study of various Sensitive Information Security (SIS) models and their proposed methods, algorithms, and experimental results. This study provides a great forum and better understanding of these models with their respective advantages and disadvantages.


sensitive information models data security models concerns of security systems confidentiality integrity reliability denial of service usability robustness 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Wu, X., Le, P.D., Srinivasan, B.: Security Architeture for Sensitive Information Systems. In: Convergence and Hybrid Information Technologies, pp. 239–266 (March 2010)Google Scholar
  2. 2.
    Paez, R., Satizabal, C., Forne, J.: A Performance Model to Cooperative Itinerant Agents (CIA): A Security Scheme to IDS. In: The Second International Conference on Availability, Reliability and Security(ARES), pp. 791–798. IEEE (2007)Google Scholar
  3. 3.
    Wei, Z., Xiaofei, Y.: Agent Transport Security Based On Freezing Mode. In: International Conference on Communications and Intelligence Information Security (ICCIIS), pp. 60–63. IEEE (2010)Google Scholar
  4. 4.
    Chen, E.Y., Ito, M.: Using End-to-Middle Security to Protect against Evil Twin Access Points. In: IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops (WoWMoM), pp. 1–6 (2009)Google Scholar
  5. 5.
    Chen, H.: Design and Implementation of Secure Enterprise Network Based on DMVPN. In: International Conference on Business Management and Electronic Information (BMEI), pp. 506–511. IEEE (2011)Google Scholar
  6. 6.
    Shouhuai, X., Xiaohu, L., Parker, T.P., Xueping, W.: Exploiting Trust-Based Social Networks for Distributed Protection of Sensitive Data. IEEE Transactions on Information Forensics and Security 6(1), 39–52 (2010)Google Scholar
  7. 7.
    Lijun, G., Zhang, L.: Low-Cost RFID Security Protocols Survey. In: Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC), vol. 2, pp. 1068–1070. IEEE (2011)Google Scholar
  8. 8.
    Bhutta, A., Foroosh, H.: On Combining Encryption For Multiple Data Streams. In: IEEE 9th International Multitopic Conference (INMIC), pp. 1–6 (2005)Google Scholar
  9. 9.
    Proano, A., Lazos, L.: Packet-Hiding Methods for Preventing Selective Jamming Attacks. IEEE Transactions on Dependable and Secure Computing 9(1), 101–114 (2012)CrossRefGoogle Scholar
  10. 10.
    Ukil, A.: Secure Trust Management in Distributed Computing Systems. In: Sixth IEEE Symposium on Electronic, Design, Test and Application (DELTA), pp. 116–121 (2011)Google Scholar
  11. 11.
    Yali, L., Corbett, C., Ken, C., Archibald, R., Mukherjee, B., Ghosal, D.: SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack. In: 42nd Hawaii International Conference on System Sciences (HICSS), pp. 1–10. IEEE (2009)Google Scholar
  12. 12.
    Zhang, Y., Liu, G., Li, J., Li, C.: Study on Access Control Model of Service-Oriented Computing. In: International Forum on Computer Science-Technology and Applications (IFCSTA 2009), vol. 1, pp. 239–242. IEEE (2009)Google Scholar
  13. 13.
    Shi-Hua, W., Xiao-Yong, L.: A Security Model to Protect Sensitive Information Flows Based on Trusted Computing Technologies. In: International Conference on Machine Learning and Cybernetics, vol. 7, pp. 3646–3650. IEEE (2008)Google Scholar
  14. 14.
    Zhao, Y., Liu, J.Q., Han, Z., Shen, C.X.: An Operating System Trusted Security Model for Important Sensitive Information System. In: The First International Symposium on Data, Privacy, and E-Commerce (ISDPE), pp. 465–468. IEEE (2007)Google Scholar
  15. 15.
    Mejia-Nogales, J.L., Vidal-Beltran, S., Lopez-Bonilla, J.L.: Design and Implementation of a Secure Access System to Information Resources for IEEE 802.11 Wireless Networks. In: Electronics, Robotics and Automotive Mechanics Conference, vol. 1, pp. 58–63. IEEE (2006)Google Scholar
  16. 16.
    Shi, W., Fryman, J.B., Gu, G., Lee, H.-H.S., Zhang, Y., Yang, J.: InfoShield: A Security Architecture for Protecting Information Usage in Memory. In: The Twelfth International Symposium on High-Performance Computer Architecture, pp. 222–231. IEEE (2006)Google Scholar
  17. 17.
    Hussain, K., Rajan, S., Addulla, N., Moussa, G.: No-capture Hardware Feature for Securing Sensitive Information. In: International Conference on Information Technology: Coding and Computing (ITCC), vol. 1, pp. 697–702. IEEE (2005)Google Scholar
  18. 18.
    Fung, B., Trojer, T., Hung, P., Xiong, L., Al-Hussaeni, K., Dssouli, R.: Service-Oriented Architecture for High-Dimensional Private Data Mashup. IEEE Transactions on Services Computing (2011) (unpublished)Google Scholar
  19. 19.
    Wang, K., Su, R., Li, Z., Cai, Z., Zhou, L.: Study of Secure Complicated Information System Architecture Model. In: First International Conference on Semantics, Knowledge and Grid (SKG 2005). IEEE (2005)Google Scholar
  20. 20.
    Ernst, Young: Into the cloud, out of the fog. Ernst & Young Global Information Security Survey (December 2011)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Birla Institute of TechnologyMesra RanchiIndia

Personalised recommendations