A privacy data leakage prevention method in P2P networks
详细信息    查看全文
  • 作者:Cheol-Joo Chae ; YongJu Shin ; Kiseok Choi…
  • 关键词:P2P file sharing ; Privacy detection ; Privacy leakage prevention ; Privacy level ; P2P
  • 刊名:Peer-to-Peer Networking and Applications
  • 出版年:2016
  • 出版时间:May 2016
  • 年:2016
  • 卷:9
  • 期:3
  • 页码:508-519
  • 全文大小:2,797 KB
  • 参考文献:1.El-Ansary S, Haridi S (2005) An overview of structured overlay networks. Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless and Peer-to-Peer Networks. CRC, Boca Raton
    2.Lua K, Crowcroft J, Pias M, Sharma R, Lim S (2005) A survey and comparison of peer-to-peer overlay network schemes, vol. 7(2). Communications Surveys and Tutorials, Washington, DC
    3.Jia D, Yee WG, Nguyen LT, Frieder O (2008) Distributed, automatic file descriptor tuning in P2P file-sharing systems. Peer-to-Peer Netw Appl 1(2):148–161CrossRef
    4.Sasabe M, Wakamiya N, Murata M (2010) User selfishness vs. file availability in P2P file-sharing systems: Evolutionary game theoretic approach. Peer-to-Peer Netw Appl 3(1):17–26CrossRef
    5.Vishnumurthy V, Francis P (2007) A comparison of structured and unstructured P2P approaches to heterogeneous random peer selection. 2007 USENIX Annual Technical Conference, Santa Clara, CA, USA, 17–22 June 2007, pp. 309–322
    6.Check Point Security Report (2014) Check point security report homepage. http://​www.​checkpoint.​com/​
    7.Gheorghe G, Cigno RL, Montresor A (2011) Security and privacy issues in P2P streaming systems: A survey. Peer-to-Peer Netw Appl 4(2):75–91CrossRef
    8.Idota H (2001) The issues for information security of peer-to-peer. Osaka Economic Papers, vol. 51(3)
    9.Kim W-S, Kim S (2009) A study on the information effluence state and measure by peer -to-peer programs in Korea and Japan. J Inst Internet Broadcast Commun 9(1):67–74
    10.Choi J-U, Lee Y-J, Park J-M (2012) E-DRM-based privacy protection technology for overcoming technical limitations of DLP-based solutions. J Korea Inst Inf Secur Cryptol 22(5):1103–1113
    11.Lee D, Kim J, Kim KJ (2010) Data loss prevention research and technology trends. J Korea Inst Inf Secur Cryptol 20(1):56–65
    12.Kim J, Park C, Hwang J, Kim H-J (2013) Privacy level indicating data leakage prevention system. KSII Trans Internet Inf Syst 7(3):558–574MathSciNet CrossRef
    13.Cho S-K, Jun M-S (2012) Privacy leakage monitoring system design for privacy protection. J Korea Inst Inf Secur Cryptol 22(1):99–106
  • 作者单位:Cheol-Joo Chae (1)
    YongJu Shin (1)
    Kiseok Choi (1)
    Ki-Bong Kim (2)
    Kwang-Nam Choi (1)

    1. Korea Institute of Science and Technology Information, 245 Daehangno, Yuseong-gu, Daejeon, Korea
    2. Department of Computer Information, Daejeon Health Science College, 21 Chungjeong-ro, Dong-Gu, Daejeon, Korea
  • 刊物类别:Engineering
  • 刊物主题:Communications Engineering and Networks
    Information Systems and Communication Service
    Computer Communication Networks
  • 出版者:Springer New York
  • ISSN:1936-6450
文摘
Registered peers to a P2P service can share and exchange information with other peers without servers using P2P network. In such P2P networks, there are frequent leaks of the internal privacy data of an organization through P2P file sharing. Today, DLP which is a privacy data leakage prevention technology is applied P2P network blocking and file encryption methods. However restricting all the services and normal users is difficult due to the number of ports used by P2P including the port 80. Thus, we propose a privacy data leakage prevention method by releasing a P2P sharing file that does not include privacy data using a privacy data removing technology with a privacy data leaking risk factor. The proposed method provides higher security and performance compared with a DLP method as privacy data is removed from a P2P sharing file.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700