A privacy data leakage prevention method in P2P networks

被引:13
|
作者
Chae, Cheol-Joo [1 ]
Shin, YongJu [1 ]
Choi, Kiseok [1 ]
Kim, Ki-Bong [2 ]
Choi, Kwang-Nam [1 ]
机构
[1] Korea Inst Sci & Technol Informat, 245 Daehangno, Taejon, South Korea
[2] Daejeon Hlth Sci Coll, Dept Comp Informat, 21 Chungjeong Ro, Taejon, South Korea
关键词
P2P file sharing; Privacy detection; Privacy leakage prevention; Privacy level; P2P;
D O I
10.1007/s12083-015-0371-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Registered peers to a P2P service can share and exchange information with other peers without servers using P2P network. In such P2P networks, there are frequent leaks of the internal privacy data of an organization through P2P file sharing. Today, DLP which is a privacy data leakage prevention technology is applied P2P network blocking and file encryption methods. However restricting all the services and normal users is difficult due to the number of ports used by P2P including the port 80. Thus, we propose a privacy data leakage prevention method by releasing a P2P sharing file that does not include privacy data using a privacy data removing technology with a privacy data leaking risk factor. The proposed method provides higher security and performance compared with a DLP method as privacy data is removed from a P2P sharing file.
引用
收藏
页码:508 / 519
页数:12
相关论文
共 50 条
  • [1] A privacy data leakage prevention method in P2P networks
    Cheol-Joo Chae
    YongJu Shin
    Kiseok Choi
    Ki-Bong Kim
    Kwang-Nam Choi
    [J]. Peer-to-Peer Networking and Applications, 2016, 9 : 508 - 519
  • [2] Protecting Data Privacy in Structured P2P Networks
    Jawad, Mohamed
    Serrano-Alvarado, Patricia
    Valduriez, Patrick
    [J]. DATA MANAGEMENT IN GRID AND PEER-TO-PEER SYSTEMS, PROCEEDINGS, 2009, 5697 : 85 - 98
  • [3] The method of P2P traffic detecting for P2P harmful contents prevention
    Lee, HG
    Nam, TY
    Jang, JS
    [J]. 7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 777 - 780
  • [4] kNN queries method on uncertain data over P2P networks
    Sun, Yong-Jiao
    Dong, Han
    Yuan, Ye
    Wang, Guo-Ren
    [J]. Dongbei Daxue Xuebao/Journal of Northeastern University, 2012, 33 (05): : 632 - 635
  • [5] Security and privacy of machine learning assisted P2P networks
    Hongwei Li
    Rongxing Lu
    Mohamed M. E. A. Mahmoud
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 2234 - 2236
  • [6] Collaborative Privacy Management in P2P Online Social Networks
    Zahak, Matin
    Alizadeh, Mahdi
    Abbaspour, Maghsoud
    [J]. 2015 12TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2015, : 64 - 72
  • [7] Security and privacy of machine learning assisted P2P networks
    Li, Hongwei
    Lu, Rongxing
    Mahmoud, Mohamed M. E. A.
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (06) : 2234 - 2236
  • [8] Breaking monocultures in P2P networks for worm prevention
    Zhou, Ying
    Wu, Zhong-Fu
    Wang, Hao
    Zhong, Jiang
    Feng, Yong
    Zhu, Zheng-Zhou
    [J]. PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 2793 - +
  • [9] PROACTIVE WORM PREVENTION BASED ON P2P NETWORKS
    Wu, Kai-Gui
    Feng, Yong
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (3B): : 205 - 210
  • [10] Hiding Data Sources in P2P Networks
    Klonowski, Marek
    Kutylowski, Miroslaw
    Rozanski, Bartlomiej
    [J]. APPLIED PUBLIC KEY INFRASTRUCTURE, 2005, 128 : 225 - 239