Abstract
Registered peers to a P2P service can share and exchange information with other peers without servers using P2P network. In such P2P networks, there are frequent leaks of the internal privacy data of an organization through P2P file sharing. Today, DLP which is a privacy data leakage prevention technology is applied P2P network blocking and file encryption methods. However restricting all the services and normal users is difficult due to the number of ports used by P2P including the port 80. Thus, we propose a privacy data leakage prevention method by releasing a P2P sharing file that does not include privacy data using a privacy data removing technology with a privacy data leaking risk factor. The proposed method provides higher security and performance compared with a DLP method as privacy data is removed from a P2P sharing file.
Similar content being viewed by others
References
El-Ansary S, Haridi S (2005) An overview of structured overlay networks. Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless and Peer-to-Peer Networks. CRC, Boca Raton
Lua K, Crowcroft J, Pias M, Sharma R, Lim S (2005) A survey and comparison of peer-to-peer overlay network schemes, vol. 7(2). Communications Surveys and Tutorials, Washington, DC
Jia D, Yee WG, Nguyen LT, Frieder O (2008) Distributed, automatic file descriptor tuning in P2P file-sharing systems. Peer-to-Peer Netw Appl 1(2):148–161
Sasabe M, Wakamiya N, Murata M (2010) User selfishness vs. file availability in P2P file-sharing systems: Evolutionary game theoretic approach. Peer-to-Peer Netw Appl 3(1):17–26
Vishnumurthy V, Francis P (2007) A comparison of structured and unstructured P2P approaches to heterogeneous random peer selection. 2007 USENIX Annual Technical Conference, Santa Clara, CA, USA, 17–22 June 2007, pp. 309–322
Check Point Security Report (2014) Check point security report homepage. http://www.checkpoint.com/
Gheorghe G, Cigno RL, Montresor A (2011) Security and privacy issues in P2P streaming systems: A survey. Peer-to-Peer Netw Appl 4(2):75–91
Idota H (2001) The issues for information security of peer-to-peer. Osaka Economic Papers, vol. 51(3)
Kim W-S, Kim S (2009) A study on the information effluence state and measure by peer -to-peer programs in Korea and Japan. J Inst Internet Broadcast Commun 9(1):67–74
Choi J-U, Lee Y-J, Park J-M (2012) E-DRM-based privacy protection technology for overcoming technical limitations of DLP-based solutions. J Korea Inst Inf Secur Cryptol 22(5):1103–1113
Lee D, Kim J, Kim KJ (2010) Data loss prevention research and technology trends. J Korea Inst Inf Secur Cryptol 20(1):56–65
Kim J, Park C, Hwang J, Kim H-J (2013) Privacy level indicating data leakage prevention system. KSII Trans Internet Inf Syst 7(3):558–574
Cho S-K, Jun M-S (2012) Privacy leakage monitoring system design for privacy protection. J Korea Inst Inf Secur Cryptol 22(1):99–106
Acknowledgments
This research was supported by Maximize the Value of National Science and Technology by Strengthen Sharing/Collaboration of National R&D information funded by the Korea Institute of Science and Technology Information (KISTI).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chae, CJ., Shin, Y., Choi, K. et al. A privacy data leakage prevention method in P2P networks. Peer-to-Peer Netw. Appl. 9, 508–519 (2016). https://doi.org/10.1007/s12083-015-0371-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-015-0371-x