Skip to main content
Log in

A privacy data leakage prevention method in P2P networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Registered peers to a P2P service can share and exchange information with other peers without servers using P2P network. In such P2P networks, there are frequent leaks of the internal privacy data of an organization through P2P file sharing. Today, DLP which is a privacy data leakage prevention technology is applied P2P network blocking and file encryption methods. However restricting all the services and normal users is difficult due to the number of ports used by P2P including the port 80. Thus, we propose a privacy data leakage prevention method by releasing a P2P sharing file that does not include privacy data using a privacy data removing technology with a privacy data leaking risk factor. The proposed method provides higher security and performance compared with a DLP method as privacy data is removed from a P2P sharing file.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. El-Ansary S, Haridi S (2005) An overview of structured overlay networks. Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless and Peer-to-Peer Networks. CRC, Boca Raton

  2. Lua K, Crowcroft J, Pias M, Sharma R, Lim S (2005) A survey and comparison of peer-to-peer overlay network schemes, vol. 7(2). Communications Surveys and Tutorials, Washington, DC

  3. Jia D, Yee WG, Nguyen LT, Frieder O (2008) Distributed, automatic file descriptor tuning in P2P file-sharing systems. Peer-to-Peer Netw Appl 1(2):148–161

    Article  Google Scholar 

  4. Sasabe M, Wakamiya N, Murata M (2010) User selfishness vs. file availability in P2P file-sharing systems: Evolutionary game theoretic approach. Peer-to-Peer Netw Appl 3(1):17–26

    Article  Google Scholar 

  5. Vishnumurthy V, Francis P (2007) A comparison of structured and unstructured P2P approaches to heterogeneous random peer selection. 2007 USENIX Annual Technical Conference, Santa Clara, CA, USA, 17–22 June 2007, pp. 309–322

  6. Check Point Security Report (2014) Check point security report homepage. http://www.checkpoint.com/

  7. Gheorghe G, Cigno RL, Montresor A (2011) Security and privacy issues in P2P streaming systems: A survey. Peer-to-Peer Netw Appl 4(2):75–91

    Article  Google Scholar 

  8. Idota H (2001) The issues for information security of peer-to-peer. Osaka Economic Papers, vol. 51(3)

  9. Kim W-S, Kim S (2009) A study on the information effluence state and measure by peer -to-peer programs in Korea and Japan. J Inst Internet Broadcast Commun 9(1):67–74

    Google Scholar 

  10. Choi J-U, Lee Y-J, Park J-M (2012) E-DRM-based privacy protection technology for overcoming technical limitations of DLP-based solutions. J Korea Inst Inf Secur Cryptol 22(5):1103–1113

    Google Scholar 

  11. Lee D, Kim J, Kim KJ (2010) Data loss prevention research and technology trends. J Korea Inst Inf Secur Cryptol 20(1):56–65

    Google Scholar 

  12. Kim J, Park C, Hwang J, Kim H-J (2013) Privacy level indicating data leakage prevention system. KSII Trans Internet Inf Syst 7(3):558–574

    Article  MathSciNet  Google Scholar 

  13. Cho S-K, Jun M-S (2012) Privacy leakage monitoring system design for privacy protection. J Korea Inst Inf Secur Cryptol 22(1):99–106

    Google Scholar 

Download references

Acknowledgments

This research was supported by Maximize the Value of National Science and Technology by Strengthen Sharing/Collaboration of National R&D information funded by the Korea Institute of Science and Technology Information (KISTI).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kwang-Nam Choi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chae, CJ., Shin, Y., Choi, K. et al. A privacy data leakage prevention method in P2P networks. Peer-to-Peer Netw. Appl. 9, 508–519 (2016). https://doi.org/10.1007/s12083-015-0371-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-015-0371-x

Keywords

Navigation