Skip to main content

The Data Modeling Considered Correlation of Information Leakage Detection and Privacy Violation

  • Conference paper
Intelligent Information and Database Systems (ACIIDS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6592))

Included in the following conference series:

Abstract

Nowadays, the importance of corporations’ business information is getting higher and industry people are trying to find software solution preventing the information asset from being disclosed by attackers. There are several representative commercial tools for this purpose and the tools are deployed in many corporations which are handling the critical information such as trade secret, intellectual property and personal information. The tools usually monitor traffic which can contain the important information and also they are watching the e-mail and instant messenger’s content. In this work, we are considering the privacy violations in the procedures of data leakage prevention especially the monitoring procedures. In addition, we have tried to make a data model considering the trade-off relation between data leakage prevention and privacy violation. Specifically speaking, we have analyzed the information units of e-mail and instant messenger and assigned a kind of assigned distinct weight values in the privacy and leakage protection viewpoints. In addition, we have shown a case how the weight values are accumulated to represent privacy violation level and data leakage prevention level. Our data model, weight value assignment result and the two kinds of level derivation process are implemented as a database model and user interface.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jia, X.-P., Peng, H., Zheng, Q.-L., Jiang, Z.-L., Li, Z.: A Topic-Based Document Correlation Model. In: Proceedings of the Seventh International Conference on Machine Learning and Cybernetics, Kunming, July12-15 (2008)

    Google Scholar 

  2. Kim, J.H., Kim, H.J.: Design of Internal Information Leakage Detection System Considering the Privacy Violation. In: ICTC2010 (International Conference on ICT Convergence 2010) (2010)

    Google Scholar 

  3. Stolfo, S.J., Hershkop, S., Hu, C.-W., Li, W.-J., Nimeskern, O., Wang, K.: Behavior-Based Modeling and Its Application to Email Analysis. ACM Transactions on Internet Technology 6(2), 187–221 (2006)

    Article  Google Scholar 

  4. Choi, D., Jin, S., Yoon, H.: A Personal Information Leakage Prevention Method on the Internet, 3rd edn. Springer, Heidelberg (1996)

    Google Scholar 

  5. Liu, S., Kuhn, R.: Data Loss Prevention, vol. 12(2), pp. 10–13. IEEE Computer Society, Los Alamitos

    Google Scholar 

  6. Gómez-Hidalgo, J.M., Martín-Abreu, J.M., Nieves, J., Santos, I., Brezo, F., Bringas, P.G.: Data Leak Prevention through Named Entity Recognition. In: 2010 IEEE Second International Conference on Social Computing, SocialCom, August 20-22, pp. 1129–1134 (2010)

    Google Scholar 

  7. Hooper, E.: Intelligent strategies for secure complex systems integration and design, effective risk management and privacy. In: 3rd Annual IEEE Systems Conference, March 23-26, pp. 257–261 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, J., Kim, Hj. (2011). The Data Modeling Considered Correlation of Information Leakage Detection and Privacy Violation. In: Nguyen, N.T., Kim, CG., Janiak, A. (eds) Intelligent Information and Database Systems. ACIIDS 2011. Lecture Notes in Computer Science(), vol 6592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20042-7_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20042-7_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20041-0

  • Online ISBN: 978-3-642-20042-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics