Online information leaker identification scheme for secure data sharing

  • PDF / 1,399,408 Bytes
  • 18 Pages / 439.642 x 666.49 pts Page_size
  • 0 Downloads / 288 Views

DOWNLOAD

REPORT


Online information leaker identification scheme for secure data sharing Ashutosh Kumar Singh1 · Ishu Gupta1 Received: 31 October 2019 / Revised: 17 July 2020 / Accepted: 28 July 2020 / © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract This paper proposes a novel scheme for the leaker identification that deals with the dynamic scenario by handling the requests of the users in an online custom. A distribution strategy is introduced having less risk associated with exposing the data and furthermore improves the likelihood of identifying the leaker when the information is revealed by the malicious user. The observed results signify an improvement of up to 41%, 368%, and 318% for average probability, average success rate, and detection rate respectively compared to the prior work. Also, the proposed framework significantly minimizes the possibility of data leakage up to 88% and synchronously achieves a 100% efficacy rate. Keywords Average success rate · Business’s data · Cloud computing · Data leakage · Detection rate · Distribution strategy · Information security · Malicious user · Time instance

1 Introduction Data sharing across distinct entities in a cloud environment is a necessity to upgrade the business’s performance but, it comprises a risk of exposing it to the unauthorized third party [2, 31, 32, 36]. The average size and average cost of data breaches have raised 2.2% and 6.4% respectively in the year 2018 over the last year and the likelihood of experiencing the compromised records will be 27.7% by 2020 [16, 30]. As a consequence, data protection has become a crucial challenge for the entity accountable for its management [5, 7, 26]. The emerged issue can be addressed via the recognition of a malicious entity that provokes the data leakage [15, 29]. The methods that deal with the data leaker detection can be mainly classified into two broad categories (i) watermarking [4, 12, 17, 21, 27, 28] and fingerprinting [18–20, 24, 33] (ii) probability [1, 3, 8–11, 13, 14, 23] based approaches. Kumar et al. [21] introduced an approach based on watermarking that utilized the Bell-La Padula model for ensuring security via providing access control in the cloud environment.  Ishu Gupta

[email protected] Ashutosh Kumar Singh [email protected] 1

National Institute of Technology Kurukshetra, Kurukshetra, India

Multimedia Tools and Applications

The approach embedded the client ID in the document whenever the cloud data is shared among the users. The guilty party is detected by extracting the embedded client ID from the discovered document. A generic framework called Lineage In Malicious Environment (LIME) based on data lineage is proposed by Backes et al. in [4] to protect the data in a vicious environment. In this framework, the data is shared among the owners and the consumers; and a vigorous integration of watermarking, signature primitives, and oblivious transfer techniques have been utilized for developing an accountable data transfer protocol among the engaged entities. Shen et a