Differentiated security levels for personal identifiable information in identity management system

被引:21
|
作者
Chen, Jianyong [1 ]
Wu, Guihua [1 ]
Shen, Linlin [1 ,2 ]
Ji, Zhen [1 ]
机构
[1] Shenzhen Univ, Dept Comp Sci & Technol, Shenzhen, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing, Peoples R China
关键词
Identity management; Differentiated security; Personal identifiable information;
D O I
10.1016/j.eswa.2011.04.226
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid development of Internet services, identity management (IdM) has got widely attraction as the credit agency between users and service providers. It facilitates users to use the Internet service, promotes service providers to enrich services, and makes Internet more security. Personally identifiable information (PII) is the most important information asset with which identity provider (IdP) can provide various services. Since PII is sensitive to users, it has become a serious problem that PII is leaked, illegal selected, illegal accessed. In order to improve security of PII, this study develops a novel framework using data mining to forecast information asset value and find appropriate security level for protecting user PII. The framework has two stages. In the first stage, user information asset is forecasted by data mining tool (decision tree) from PII database. Then security level for user PII is determined by the information asset value assuming that the higher information asset is, the more security requirement of PII is. In the second stage, with time being, number of illegal access and attack can be accumulated. It can be used to reconstruct the decision tree and update the knowledge base combined with the result of the first stage. Thus security level of PII can be timely adjusted and the protection of PII can be guaranteed even when security threat changes. Furthermore, an empirical case was studied in a user dataset to demonstrate the protection decision derived from the framework for various PII. Simulation results show that the framework with data mining can protect PII effectively. Our work can benefit the development of e-business service. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:14156 / 14162
页数:7
相关论文
共 50 条
  • [1] IDENTITY-BASED INFORMATION SECURITY MANAGEMENT-SYSTEM FOR PERSONAL-COMPUTER NETWORKS
    OKAMOTO, E
    TANAKA, K
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1989, 7 (02) : 290 - 294
  • [2] Improving the information security in SMEs to protect customer's personal identifiable information
    Els, Floyd
    Cilliers, Liezel
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON BUSINESS AND FINANCE, 2015, : 75 - 79
  • [3] Make personal information security great again: A case of users' perspectives on personal identifiable information in South Africa
    Rajkumar, Kavish
    Njenga, Kennedy
    SOUTH AFRICAN JOURNAL OF INFORMATION MANAGEMENT, 2022, 24 (01):
  • [4] Databases of Personal Identifiable Information
    Al-Fedaghi, Sabah S.
    Thalheim, Bernhard
    SITIS 2008: 4TH INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGY AND INTERNET BASED SYSTEMS, PROCEEDINGS, 2008, : 617 - +
  • [5] Security, Compliance, and Agile Deployment of Personal Identifiable Information Solutions on a Public Cloud
    Katsuno, Yasuharu
    Kundu, Ashish
    Das, Koushik K.
    Takahashi, Hitomi
    Schloss, Robert
    Dey, Prasenjit
    Mohania, Mukesh
    PROCEEDINGS OF 2016 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2016, : 359 - 366
  • [6] Protection Profile of Personal Information Security System Designing a Secure Personal Information Security System
    Lee, Hyun-Jung
    Lee, Kwangwoo
    Won, Dongho
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 806 - 811
  • [7] Identity Management for the Requirements of the Information Security
    Ferreira, M. B.
    Alonso, K. C.
    2013 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM 2013), 2013, : 53 - 57
  • [8] Usable privacy and security for personal information management
    Karat, CM
    Brodie, C
    Karat, J
    COMMUNICATIONS OF THE ACM, 2006, 49 (01) : 56 - 57
  • [9] ClaimID: A system for personal identity management
    Stutzman, Frederic
    Russell, Terrell
    OPENING INFORMATION HORIZONS, 2006, : 367 - 367
  • [10] Managing Personal Identifiable Information in Data Lakes
    Orescanin, Drazen
    Hlupic, Tomislav
    Vrdoljak, Boris
    IEEE ACCESS, 2024, 12 : 32164 - 32180