skip to main content
10.1145/1314333.1314346acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Distance-preserving pseudonymization for timestamps and spatial data

Published: 29 October 2007 Publication History

Abstract

The need for privacy in intrusion detection data, such as audit logs is widely recognized. The prevalent method for privacy protection in audit logs is pseudonymization (and suppression). There is a clear trade-off between the privacy of a pseudonymization technique and its utility for intrusion detection. E.g., for IP addresses a method for prefix preserving pseudonymization has been developed, that allows pseudonymized IP addresses to be still grouped into subnets. This paper describes a pseudonymization technique for timestamps that is distance preserving. I.e. given two pseudonymized timestamps one can compute the distance δ, if d is below or equal to an agreed threshold d and one cannot compute δif δ = 2d. We extend our technique for two dimensional spatial data, e.g. location of objects or persons. We also evaluate the privacy any such distance-preserving technique can provide for timestamps theoretically and on real-world log data.

References

[1]
T. Bass. Intrusion detection systems and multisensor data fusion. Communications of the ACM, 43(4), 2000.
[2]
J. Biskup, and U. Flegel. Threshold-based Identity Recovery for Privay Enhanced Applications. Proceedings of the 7th International ACM Conference on Computer and Communications Security, 2000.
[3]
T. Brekne, and A. Årnes. Circumventing IP-Address Pseudonymization. Proceedings of the 3rd IASTED International Conference on Communications and Computer Networks, 2005.
[4]
G. Davida, Y. Frankel, and B. Matt. On Enabling Secure Applications Through Off-Line Biometric Identification. Proceedings of the IEEE Symposium on Security and Privacy, 1998.
[5]
U. Flegel, and J. Biskup. Requirements of Information Reductions for Cooperating Intrusion Detection Agents. Proceedings of the International Conference on Emerging Trends in Information and Communication Security, 2006.
[6]
M. Huang, R. Jasper, and T. Wicks. A large scale distributed intrusion detection framework based on attack strategy analysis. Computer Networks, 31(23--24), 1999.
[7]
A. Juels, and M. Wattenberg. A fuzzy commitment scheme. Proceedings of the 6th ACM conference on Computer and communications security, 1999.
[8]
A. Lee, P. Tabriz, and N. Borisov. A Privacy-Preserving Interdomain Audit Framework. Proceedings of the Workshop On Privacy In The Electronic Society, 2006.
[9]
P. Lincoln, P. Porras, and V. Shmatikov. Privacy-Preserving Sharing and Correlation of Security Alerts. Proceedings of the 13th USENIX Security Symposium, 2004.
[10]
E. Lundin, and E. Jonnson. Privacy vs. Intrusion Detection Analysis. Proceedings of International Symposium on Recent Advances in Intrusion Detection, 1999.
[11]
A. Menezes, P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.
[12]
R. Pang, and V. Paxson. A high-level programming environment for packet trace anonymization and transformation. Proceedings of the ACM Conference on Applications, technologies, architectures, and protocols for computer communications, 2003.
[13]
M. Sobirey, S. Fischer-Hübner, and K. Rannenburg. Pseudonymous audit for privacy enhanced intrusion detection. Proceedings of the 13th IFIP International Conference on Information Security (SEC), 1997.
[14]
A. Slagell, and W. Yurcik. Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization. Proceedings of the Workshop on the Value of Security through Collaboration, 2005.
[15]
B. Waters, D. Balfanz, G. Durfee, and D. K. Smetters. Building an Encrypted and Searchable Audit Log. Proceedings of the Internet Society Network Distributed Systems Symposium, 2004.
[16]
J. Xu, J. Fan, M. Ammar, and S. Moon. Prefix-Preserving IP Address Anonymization: Measurement-Based Security Evaluation and a New Cryptography-Based Scheme. Proceedings of the 10th IEEE International Conference on Network Protocols, 2002.
[17]
D. Xu, and P. Ning. Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach. Proceedings of the 21st Annual Computer Security Applications Conference, 2005.
[18]
J. Zhang, N. Borisov, and W. Yurcik. Outsourcing Security Analysis with Anonymized Logs. Proceedings of the Workshop on the Value of Security through Collaboration, 2006.

Cited By

View all
  • (2024)Enhanced Multi-Party Privacy-Preserving Record Linkage Using Trusted Execution EnvironmentsMathematics10.3390/math1215233712:15(2337)Online publication date: 26-Jul-2024
  • (2022)Multi-party Privacy-Preserving Record Linkage Method Based on Trusted Execution EnvironmentWeb Information Systems and Applications10.1007/978-3-031-20309-1_52(591-602)Online publication date: 8-Dec-2022
  • (2021)Locational privacy-preserving distance computations with intersecting sets of randomly labeled grid pointsInternational Journal of Health Geographics10.1186/s12942-021-00268-y20:1Online publication date: 20-Mar-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WPES '07: Proceedings of the 2007 ACM workshop on Privacy in electronic society
October 2007
116 pages
ISBN:9781595938831
DOI:10.1145/1314333
  • General Chair:
  • Peng Ning,
  • Program Chair:
  • Ting Yu
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 October 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. distributed intrusion detection
  2. hash functions
  3. privacy
  4. pseudonymization

Qualifiers

  • Article

Conference

CCS07
Sponsor:

Acceptance Rates

Overall Acceptance Rate 106 of 355 submissions, 30%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Enhanced Multi-Party Privacy-Preserving Record Linkage Using Trusted Execution EnvironmentsMathematics10.3390/math1215233712:15(2337)Online publication date: 26-Jul-2024
  • (2022)Multi-party Privacy-Preserving Record Linkage Method Based on Trusted Execution EnvironmentWeb Information Systems and Applications10.1007/978-3-031-20309-1_52(591-602)Online publication date: 8-Dec-2022
  • (2021)Locational privacy-preserving distance computations with intersecting sets of randomly labeled grid pointsInternational Journal of Health Geographics10.1186/s12942-021-00268-y20:1Online publication date: 20-Mar-2021
  • (2021)Modern Privacy-Preserving Record Linkage Techniques: An OverviewIEEE Transactions on Information Forensics and Security10.1109/TIFS.2021.311402616(4966-4987)Online publication date: 2021
  • (2020)Big Picture on Privacy Enhancing Technologies in e-Health: A Holistic Personal Privacy WorkflowInformation10.3390/info1107035611:7(356)Online publication date: 8-Jul-2020
  • (2019)Towards Minimising Timestamp Usage In Application SoftwareData Privacy Management, Cryptocurrencies and Blockchain Technology10.1007/978-3-030-31500-9_9(138-155)Online publication date: 20-Sep-2019
  • (2018)FEDERAL: A Framework for Distance-Aware Privacy-Preserving Record LinkageIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2017.276175930:2(292-304)Online publication date: 1-Feb-2018
  • (2017)Measuring Anonymity of Pseudonymized Data After Probabilistic Background AttacksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2017.265645812:5(1156-1169)Online publication date: May-2017
  • (2016)Anonymisation of geographical distance matrices via Lipschitz embeddingInternational Journal of Health Geographics10.1186/s12942-015-0031-715:1Online publication date: 7-Jan-2016
  • (2015)Integrity for Approximate Joins on Untrusted Computational ServersICT Systems Security and Privacy Protection10.1007/978-3-319-18467-8_30(446-459)Online publication date: 9-May-2015
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media