Abstract
Nowadays, the importance of corporations’ business information is getting higher and industry people are trying to find software solution preventing the information asset from being disclosed by attackers. There are several representative commercial tools for this purpose and the tools are deployed in many corporations which are handling the critical information such as trade secret, intellectual property and personal information. The tools usually monitor traffic which can contain the important information and also they are watching the e-mail and instant messenger’s content. In this work, we are considering the privacy violations in the procedures of data leakage prevention especially the monitoring procedures. In addition, we have tried to make a data model considering the trade-off relation between data leakage prevention and privacy violation. Specifically speaking, we have analyzed the information units of e-mail and instant messenger and assigned a kind of assigned distinct weight values in the privacy and leakage protection viewpoints. In addition, we have shown a case how the weight values are accumulated to represent privacy violation level and data leakage prevention level. Our data model, weight value assignment result and the two kinds of level derivation process are implemented as a database model and user interface.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jia, X.-P., Peng, H., Zheng, Q.-L., Jiang, Z.-L., Li, Z.: A Topic-Based Document Correlation Model. In: Proceedings of the Seventh International Conference on Machine Learning and Cybernetics, Kunming, July12-15 (2008)
Kim, J.H., Kim, H.J.: Design of Internal Information Leakage Detection System Considering the Privacy Violation. In: ICTC2010 (International Conference on ICT Convergence 2010) (2010)
Stolfo, S.J., Hershkop, S., Hu, C.-W., Li, W.-J., Nimeskern, O., Wang, K.: Behavior-Based Modeling and Its Application to Email Analysis. ACM Transactions on Internet Technology 6(2), 187–221 (2006)
Choi, D., Jin, S., Yoon, H.: A Personal Information Leakage Prevention Method on the Internet, 3rd edn. Springer, Heidelberg (1996)
Liu, S., Kuhn, R.: Data Loss Prevention, vol. 12(2), pp. 10–13. IEEE Computer Society, Los Alamitos
Gómez-Hidalgo, J.M., Martín-Abreu, J.M., Nieves, J., Santos, I., Brezo, F., Bringas, P.G.: Data Leak Prevention through Named Entity Recognition. In: 2010 IEEE Second International Conference on Social Computing, SocialCom, August 20-22, pp. 1129–1134 (2010)
Hooper, E.: Intelligent strategies for secure complex systems integration and design, effective risk management and privacy. In: 3rd Annual IEEE Systems Conference, March 23-26, pp. 257–261 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, J., Kim, Hj. (2011). The Data Modeling Considered Correlation of Information Leakage Detection and Privacy Violation. In: Nguyen, N.T., Kim, CG., Janiak, A. (eds) Intelligent Information and Database Systems. ACIIDS 2011. Lecture Notes in Computer Science(), vol 6592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20042-7_40
Download citation
DOI: https://doi.org/10.1007/978-3-642-20042-7_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20041-0
Online ISBN: 978-3-642-20042-7
eBook Packages: Computer ScienceComputer Science (R0)