Privacy-Preserving Mechanism for Monitoring Sensitive Data

The warranty of privacy of a person's data is understood as the capacity of managing, altering, restricting or publishing for a group of individuals chosen by the person. The shared data can be sensitive revealing something private, which deserves protection when shared, e.g. Personal financial information. Among several computing services, there is much sensitive data without any privacy-preserving mechanism. This work presents a privacy-preserving mechanism, which guarantees the privacy of the data owner and the person who accesses the data. A cloud monitoring mechanism was developed for data that needs to have its access monitored with intrusion-detection scenarios available for the data owner. The proposed viability was evaluated through tests on the response time to access the monitored page, server overload and consumption of server resources through the prism of an application using the mechanism. Such mechanism presents itself as a viable solution due to its minimum impact on computing resources and as a solution to help monitoring sensitive data access.

[1]  Lisa Singh,et al.  Exploring re-identification risks in public domains , 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust.

[2]  Jie Xu,et al.  A survey of personal privacy protection in public service mashups , 2011, Proceedings of 2011 IEEE 6th International Symposium on Service Oriented System (SOSE).

[3]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[4]  Ralph Stair,et al.  Principles of information systems , 2014 .

[5]  Malek Ben Salem,et al.  Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[6]  Dan Lin,et al.  Promoting Distributed Accountability in the Cloud , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[7]  Richard Walters The cloud challenge: realising the benefits without increasing risk , 2012 .

[8]  Mats Näslund,et al.  Privacy in machine-to-machine communications A state-of-the-art survey , 2012, 2012 IEEE International Conference on Communication Systems (ICCS).

[9]  Alessandro Acquisti,et al.  Misplaced Confidences , 2013, WEIS.

[10]  S. Fischer-h bner IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms , 2001 .

[11]  A. Westin Social and Political Dimensions of Privacy , 2003 .

[12]  Ian Molyneaux The Art of Application Performance Testing - Help for Programmers and Quality Assurance , 2009 .

[13]  Jonathan M. Spring,et al.  Monitoring Cloud Computing by Layer, Part 2 , 2011, IEEE Security & Privacy.

[14]  Flora Amato,et al.  A semantic based methodology to classify and protect sensitive data in medical records , 2010, 2010 Sixth International Conference on Information Assurance and Security.

[15]  Roel Peeters,et al.  Distributed privacy-preserving transparency logging , 2013, WPES.

[16]  Bhavani M. Thuraisingham,et al.  Identity management for cloud computing: developments and directions , 2011, CSIIRW '11.

[17]  Norjihan Abdul Ghani,et al.  Controlling your personal information disclosure , 2008 .

[18]  H. Tavani,et al.  Cyberstalking, personal privacy, and moral responsibility , 2002, Ethics and Information Technology.