PP-GSM: Privacy-preserving graphical security model for security assessment as a service

被引:0
|
作者
Lee, Dongwon [1 ]
Oh, Yongwoo [1 ]
Hong, Jin B. [2 ]
Kim, Hyoungshick [1 ]
Kim, Dan Dongseong [3 ]
机构
[1] Sungkyunkwan Univ, Dept Software, Suwon 16419, Gyeonggi Do, South Korea
[2] Univ Western Australia, Dept Comp Sci & Software Engn, Perth, WA 6907, Australia
[3] Univ Queensland, Sch ITEE, Brisbane, Qld 4072, Australia
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2023年 / 142卷
关键词
Graphical security models; Homomorphic encryption; Graph obfuscation; Security assessment; Privacy-preserving computing; FULLY HOMOMORPHIC ENCRYPTION; ATTACK;
D O I
10.1016/j.future.2022.12.041
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security Assessment-as-a-Service (SAaaS) allows users to outsource security assessments of their systems and networks from the cloud, reducing the burden on users whom do not have sufficient resources to carry out security assessments. SAaaS can be implemented using Graphical Security Models (GSMs), such as Attack Graphs and Attack Trees, that are widely used for security assessments. However, this approach exposes users' sensitive data (e.g., network topology, host vulnerabilities) in the cloud, which would not be acceptable in private systems such as government and/or corporation networks. This paper proposes a framework named privacy-preserving GSM (PP-GSM) for SAaaS. PP- GSM is built with (1) homomorphic encryption (HE) for protecting users' sensitive data by performing security assessment computations on the encrypted network models, and (2) graph obfuscation techniques to confuse attackers trying to reveal users' sensitive data. Moreover, we develop new algorithms to speed up HE by reducing the number of multiplications, which are computationally expensive arithmetic operations in HE schemes. Our experimental results using various realistic scenarios show that PP-GSM can be generated on average in 1,078 s for networks with 60 nodes (and the time taken is linearly proportional to the number of nodes). For evaluations, the time taken can be as short as on average 30 s for computing the cumulative attack success probability. Therefore, PP-GSM is a promising solution for the SAaaS to be used in practice.(c) 2023 Elsevier B.V. All rights reserved.
引用
收藏
页码:351 / 363
页数:13
相关论文
共 50 条
  • [1] Efficient Privacy-Preserving Logistic Model With Malicious Security
    Miao, Guanhong
    Wu, Samuel S.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 5751 - 5766
  • [2] Multilayer privacy-preserving model for security and privacy access control in edge computing
    Karthikeyan, K.
    Madhavan, P.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (10):
  • [3] On the Security of A Privacy-Preserving Product Calculation Scheme
    Zhu, Youwen
    Huang, Zhiqiu
    Huang, Liusheng
    Takagi, Tsuyoshi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (03) : 373 - 374
  • [4] Cloud Data Security Access with Privacy-Preserving
    Wang, Jingyu
    Gu, Ruichun
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 268 - 271
  • [5] Privacy-preserving sharing and correlation of security alerts
    Lincoln, P
    Porras, P
    Shmatikov, V
    USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, 2004, : 239 - 254
  • [6] On the Security of Privacy-Preserving Machine Learning Against Model Stealing Attacks
    Chaturvedi, Bhuvnesh
    Chakraborty, Anirban
    Chatterje, Ayantika
    Mukhopadhya, Debdeep
    CRYPTOLOGY AND NETWORK SECURITY, PT II, CANS 2024, 2025, 14906 : 96 - 117
  • [7] On perspective of security and privacy-preserving solutions in the internet of things
    Malina, Lukas
    Hajny, Jan
    Fujdiak, Radek
    Hosek, Jiri
    COMPUTER NETWORKS, 2016, 102 : 83 - 95
  • [8] PriSIEM: Enabling privacy-preserving Managed Security Services
    Coppolino, Luigi
    D'Antonio, Salvatore
    Mazzeo, Giovanni
    Romano, Luigi
    Sgaglione, Luigi
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 203
  • [9] PriSIEM: Enabling privacy-preserving Managed Security Services
    Coppolino, Luigi
    D'Antonio, Salvatore
    Mazzeo, Giovanni
    Romano, Luigi
    Sgaglione, Luigi
    Journal of Network and Computer Applications, 2022, 203
  • [10] Database as a service-security and privacy preserving
    Tian X.-X.
    Wang X.-L.
    Gao M.
    Zhou A.-Y.
    Ruan Jian Xue Bao/Journal of Software, 2010, 21 (05): : 991 - 1006