Advertisement

Design and Evaluation of a Diffusion Tracing Function for Classified Information Among Multiple Computers

  • Nobuto Otsubo
  • Shinichiro Uemura
  • Toshihiro Yamauchi
  • Hideo Taniguchi
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 240)

Abstract

In recent years, the opportunity to deal with classified information in a computer has increased, so the cases of classified information leakage have also increased. We have developed a function called “diffusion tracing function for classified information” (tracing function), which has the ability to trace the diffusion of classified information in a computer and to manage which resources might contain classified information. The classified information exchanged among the processes in multiple computers should be traced. This paper proposes a method which traces the diffusion for classified information among multiple computers. Evaluation results show the effectiveness of the proposed methods.

Keywords

Prevention of information leaks Network security Log management 

References

  1. 1.
    Japan Network Security Association (2008) Information Security Incident Survey Report, http://www.jnsa.org/result/incident/data/2008incident_survey_e_v1.0.pdf
  2. 2.
    Tabata T, Hakomori S, Ohashi K, Uemura S, Yokoyama K, Taniguchi H (2009) Tracing classified information diffusion for protecting information leakage. IPSJ J 50(9):2088–2012 (in Japanese)Google Scholar
  3. 3.
    Kim CH, Keromytis DA, Covington M, Sahita R (2009) Capturing information flow with concatenated dynamic taint analysis. 2009 International conference on Availability, Reliability and Security (ARES 2009), pp 355–362Google Scholar
  4. 4.
    Zavou A, Portokalidis G, Keromytis DA (2011) Taint-Exchange: A generic system for cross-process and cross-host taint tracking. The 6th International Workshop on Security (IWSEC 2011), vol 7038. LNCS, pp 113–128Google Scholar
  5. 5.
    Garnkel T, Pfaff B, Chow J, Rosenblum M, Boneh D (2003) Terra: A virtual machine-based platform for trusted computing. In: Proceedings of 19th ACM SIGOPS Symposium on Operating System Principles (SOSP 2003), pp 193–206Google Scholar
  6. 6.
    Katsuno Y, Watanabe Y, Furuichi S, Kudo M (2007) Chinese-Wall process confinement for practical distributed coalitions. Proceedings of 12th ACM Symposium on Access Control Models and Technologies (SACMAT2007), pp 225–234Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht(Outside the USA) 2013

Authors and Affiliations

  • Nobuto Otsubo
    • 1
  • Shinichiro Uemura
    • 1
  • Toshihiro Yamauchi
    • 1
  • Hideo Taniguchi
    • 1
  1. 1.Graduate School of Natural Science and TechnologyOkayama UniversityOkayamaJapan

Personalised recommendations