Proceedings of the 5th ACM Conference on Data and Application Security and Privacy 2015
DOI: 10.1145/2699026.2699130
|View full text |Cite
|
Sign up to set email alerts
|

Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing

Abstract: The leak of sensitive data on computer systems poses a serious threat to organizational security. Organizations need to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., to detect sensitive information being stored or transmitted in the clear. However, detecting the exposure of sensitive information is challenging due to data transformation in the content. Transformations (such as insertion, deletion) result in highly unpredictable leak patterns. Existing autom… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…On the side of formal analysis of data leaks in workflows, Accorsi and Wonnemann [41] proposed a framework for the automated detection of leaks based on static flow analysis by transforming workflows into Petri nets. Some papers propose data leak protection, by screening data and comparing fingerprints [42][43][44][45][46][47][48]. Segarra et al [49] propose an architecture to securely stream medical data using Trusted Execution Environments, while Zuo et al investigate data leakage in mobile applications interaction with the cloud [50].…”
Section: Related Workmentioning
confidence: 99%
“…On the side of formal analysis of data leaks in workflows, Accorsi and Wonnemann [41] proposed a framework for the automated detection of leaks based on static flow analysis by transforming workflows into Petri nets. Some papers propose data leak protection, by screening data and comparing fingerprints [42][43][44][45][46][47][48]. Segarra et al [49] propose an architecture to securely stream medical data using Trusted Execution Environments, while Zuo et al investigate data leakage in mobile applications interaction with the cloud [50].…”
Section: Related Workmentioning
confidence: 99%
“…The detection rate gives the percentage of leak incidents that are successfully detected. We also compute standard false positive rate defined in Equation (2). We detail the semantic meaning for primary cases, true positive (TP), false positive (FP), true negative (TN), and false negative (FN), in Table III. Detection rate (Recall) = TP TP + FN (1) False positive rate = FP FP + TP…”
Section: A Implementation and Experiments Setupmentioning
confidence: 99%
“…Shu and Yao [32] presented privacy-preserving methods for protecting sensitive data in a non-MapReduce based detection environment. Shu et al [33] further proposed to accelerate screening transformed data leaks using GPU. Blanton et al [5] proposed a solution for fast outsourcing of sequence edit distance and secure path computation, while preserving the confidentiality of the sequence.…”
Section: Related Workmentioning
confidence: 99%