期刊文献+

基于指纹和Bloom滤波器的数据泄漏检测方案 被引量:1

Data-leakage detection scheme based on fingerprint and Bloom filters
在线阅读 下载PDF
导出
摘要 针对当前的数据防泄漏方案主要依赖在外传数据中进行关键词通用搜索,导致数据流控制不够精细、虚警率较高的问题。首先设计了一种基于白名单的数据防泄漏(DLP)架构,在此基础上,提出了一种基于文件指纹和Bloom滤波器的数据泄露检测算法。该算法通过使用动态规划来计算最优检测位置,最大限度地降低了内存开销,并支持高速部署。仿真实验结果表明,所提算法可以用较低的代价,实现大量数据的在线指纹检测。例如,对1 TB的文件,该方案只需340 MB内存就可实现1000字节的最差检测延时期望(泄露的长度)。 Aiming at the problems that the existing Data-Leakage Prevention (DLP) solutions are based on generic search for keywords in outgoing data, and hence severely lack the ability to control data flow at a fine granularity with low false probability. In this paper, an DLP architecture based on the white-listing was firstly designed, which used a white-listing for providing the strong security of data transmission. On this basis, a data leakage detection algorithm by combining document fingerprinting with Bloom filters was proposed. This algorithm computed the optimal locations by using dynamic programming to minimize the memory overhead and enable high-speed implementation. The simulation results show that the proposed algorithm for checking the fingerprints for a large amount of documents at very low cost. For example, for 1 TB of documents, the proposed solution only requires 340 MB memory to achieve worst case expected detection lag ( i. e. leakage length) of 1 000 Bytes.
作者 黄伟文 罗佳
出处 《计算机应用》 CSCD 北大核心 2014年第7期1922-1928,共7页 journal of Computer Applications
基金 国家自然科学基金面上项目(61379119/F020803)
关键词 数据泄露 云计算 白名单 虚警率 指纹检测 BLOOM滤波器 data-leakage cloud computing white-listing false probability fingerprint detection Bloom filter
  • 相关文献

参考文献13

  • 1林闯,苏文博,孟坤,刘渠,刘卫东.云计算安全:架构、机制与模型评价[J].计算机学报,2013,36(9):1765-1784. 被引量:325
  • 2LAWTON G.New technology prevents data leakage[J].Computer,2008,41(9):14-17.
  • 3YOSHIHAMA S,MISHINA T,MATSUMOTO T.Web-based data leakage prevention[C]//Proceedings of the 5th International Workshop on Security.Piscataway:IEEE,2010:78-93.
  • 4洪澄,张敏,冯登国.面向云存储的高效动态密文访问控制方法[J].通信学报,2011,32(7):125-132. 被引量:79
  • 5王志文,王强.云计算敏感数据防泄露技术研究[J].信息安全与通信保密,2013,11(8):85-87. 被引量:10
  • 6陈牮华.基于云计算的网络安全数据传递方法研究[J].计算机仿真,2012,29(8):139-141. 被引量:17
  • 7SCHEAR N,KINTANA C,ZHANG Q,et al.Glavlit:Preventing exfiltration at wire speed[J].Irvine Is Burning,2012,12(5):133-140.
  • 8YUMEREFENDI A R,MICKLE B,COX L P.TightLip:Keeping applications from spilling the beans[C]// Proceedings of the 9th USENIX Symposium on Networked Systems and Design and Implementation.Berkeley:USENIX Association,2012:289-296.
  • 9KLONOWSKI M,KOZA M,KUTYLOWSKI M.Efficient and robust data aggregation using untrusted infrastructure[C]// Proceedings of the 6th International Conference on Security of Information and Networks.New York:ACM,2013:123-130.
  • 10MITZENMACHER M.Compressed bloom filters[J].IEEE/ACM Transactions on Networking,2002,10(5):604-612.

二级参考文献101

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:74
  • 3樊亚军,刘久文.TPM安全芯片设计与实现[J].信息安全与通信保密,2007,29(6):136-137. 被引量:5
  • 4张旻晋 桂文明 苏递生 等.从终端到网络的可信计算技术.信息技术快报,2006,4(2):21-34.
  • 5王伟.多信息源的实时入侵检测方法研究[M].西安:西安交通大学出版社,2005.
  • 6B Waters. Egleient identity - based encryption without random ora - cles [ C ]. Advances in Cryptology - EUROCRYPT 2005. Ber- lin : Springer - Verlag, 2005 : 114 - 127.
  • 7CRAMPTON J, KOPONEN T. Delegation in Role-based Access Control[J]. International Journal of Information Security, 2008(7): 123-136.
  • 8BEBALOH J, CHASE M. Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records[C]. Proceedings of the 2009 ACM Workshop on Cloud Computing Security. USA: [s.n.], 2009: 124-132.
  • 9GENTRY C. Fully Homomorphic Encryption Using Ideal Lattices[C]. Proceedings of Symposium on Theory of Computing(STOC'09). USA: [s.n.], 2009: 169-178.
  • 10RECORDON D, REED D. OpenID 2.0: A Platform for User-centric Identity Management[C]. Proceedings of the Second ACM Workshop on Digital Identity Management. USA : [s.n.], 2006 : 14-26.

共引文献416

同被引文献14

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部