Differentiated security levels for personal identifiable information in identity management system

Abstract With the rapid development of Internet services, identity management (IdM) has got widely attraction as the credit agency between users and service providers. It facilitates users to use the Internet service, promotes service providers to enrich services, and makes Internet more security. Personally identifiable information (PII) is the most important information asset with which identity provider (IdP) can provide various services. Since PII is sensitive to users, it has become a serious problem that PII is leaked, illegal selected, illegal accessed. In order to improve security of PII, this study develops a novel framework using data mining to forecast information asset value and find appropriate security level for protecting user PII. The framework has two stages. In the first stage, user information asset is forecasted by data mining tool (decision tree) from PII database. Then security level for user PII is determined by the information asset value assuming that the higher information asset is, the more security requirement of PII is. In the second stage, with time being, number of illegal access and attack can be accumulated. It can be used to reconstruct the decision tree and update the knowledge base combined with the result of the first stage. Thus security level of PII can be timely adjusted and the protection of PII can be guaranteed even when security threat changes. Furthermore, an empirical case was studied in a user dataset to demonstrate the protection decision derived from the framework for various PII. Simulation results show that the framework with data mining can protect PII effectively. Our work can benefit the development of e-business service.

[1]  Xiaomin Wang,et al.  An Architecture for Differentiated Security Service , 2008, 2008 International Symposium on Electronic Commerce and Security.

[2]  Chao-Fu Hong,et al.  Extracting the significant-rare keywords for patent analysis , 2009, Expert Syst. Appl..

[3]  Marco Casassa Mont,et al.  Dealing with Privacy Obligations: Important Aspects and Technical Approaches , 2004, TrustBus.

[4]  Marit Hansen,et al.  Privacy and Identity Management , 2008, IEEE Security & Privacy.

[5]  Jon Finke Identity Management , 2006, LISA.

[6]  Li Xiu,et al.  Application of data mining techniques in customer relationship management: A literature review and classification , 2009, Expert Syst. Appl..

[7]  Craig W. Thompson,et al.  Extending a Natural Language Interface with Geospatial Queries , 2007, IEEE Internet Computing.

[8]  ChenYen-Liang,et al.  Mining fuzzy association rules from questionnaire data , 2009 .

[9]  Chih-Hung Hsu Data mining to improve industrial standards and enhance production and marketing: An empirical study in apparel industry , 2009, Expert Syst. Appl..

[10]  B. Boehm Software risk management: principles and practices , 1991, IEEE Software.

[11]  Wei Xiong,et al.  Identification of candidate cancer genes involved in human retinoblastoma by data mining , 2008, Child's Nervous System.

[12]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[13]  Olvi L. Mangasarian,et al.  Nonlinear Knowledge-Based Classification , 2008, IEEE Transactions on Neural Networks.

[14]  A. Lukoševičius Methodology of Adaptation of Data Mining Methods for Medical Decision Support: Case Study , 2009 .

[15]  Alessandro Acquisti,et al.  Identity Management, Privacy, and Price Discrimination , 2008, IEEE Security & Privacy.

[16]  Zhao Xin A Study of Performance Evaluation of HRM: Based on Data Mining , 2008, 2008 International Seminar on Future Information Technology and Management Engineering.

[17]  Yen-Liang Chen,et al.  Mining fuzzy association rules from questionnaire data , 2009, Knowl. Based Syst..

[18]  Lior Rokach,et al.  Mining manufacturing databases to discover the effect of operation sequence on the product quality , 2008, J. Intell. Manuf..

[19]  Charles X. Ling,et al.  Using AUC and accuracy in evaluating learning algorithms , 2005, IEEE Transactions on Knowledge and Data Engineering.

[20]  Judy Kay,et al.  Clustering and Sequential Pattern Mining of Online Collaborative Learning Data , 2009, IEEE Transactions on Knowledge and Data Engineering.

[21]  Chin-Jui Chang,et al.  A study on the application of data mining to disadvantaged social classes in Taiwan's population census , 2009, Expert Syst. Appl..

[22]  조영섭,et al.  OASIS SAML(Security Assertion Markup Language) v2.0 고찰 및 활용 , 2006 .

[23]  H. Tan 2008 International Seminar on Future Information Technology and Management Engineering , 2009 .

[24]  Silvio Romero de Lemos Meira,et al.  Knowledge Reuse in Data Mining Projects and Its Practical Applications , 2009, ICEIS.