Towards Analyzing Traceability of Data Leakage by Malicious Insiders
Data leakage committed by malicious insiders proposes a serious challenge for business secrets and intellectual property. Great efforts have been made to detect and mitigate insider threat. Due to the diversity in the motivations, previous work in this field mostly focuses on designing data holder’s data distribution and insider tracing algorithms, with little consideration of malicious insiders’ leakage strategies. In this paper, the traitors tracing problem is modeled as an incremental refining multi-step process. For each step, a metric is proposed to measure the efficiency of current tracing status. Theoretical and simulating analysis shows that malicious insiders can adopt sophisticated leakage strategies, which makes it difficult to distinguish them from others and leads to more innocent users involved as suspects. Thus it is important for the data holder to figure out the insiders’ leakage strategies and adopt proper tracing scheme to improve the refining process.
Keywordsdata leakage data distribution insider tracing
Unable to display preview. Download preview PDF.
- 1.Psiphon design overview 1.0, http://psiphon.ca/documents/Psiphon_Design_Overview_1_0.pdf
- 2.Python programming language, http://www.python.org/
- 3.Dingledine, R., Mathewson, N.: Design of a blocking-resistant anonymity system. Tech. rep., The Tor Project (2006)Google Scholar
- 4.Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium, vol. 13. USENIX Association (2004)Google Scholar
- 6.Gittelsohn, A.: An occupancy problem. American Statistician, 11–12 (1969)Google Scholar
- 8.Jin, H., Lotspiech, J., Nusser, S.: Traitor tracing for prerecorded and recordable media. In: Proceedings of the 4th ACM Workshop on Digital Rights Management, pp. 83–90. ACM (2004)Google Scholar
- 10.Nergiz, M.E., Atzori, M., Clifton, C.: Hiding the presence of individuals from shared databases. In: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, pp. 665–676. ACM (2007)Google Scholar
- 14.Tague, P., Poovendran, R.: A canonical seed assignment model for key predistribution in wireless sensor networks. ACM Trans. Sen. Netw. 3 (2007)Google Scholar