Economics of Privacy: A Model for Protecting Against Cyber Data Disclosure Attacks

被引:3
|
作者
Miaoui, Yosra [1 ]
Boudriga, Noureddine [1 ]
Abaoub, Ezzeddine [2 ]
机构
[1] Univ Carthage, Commun Networks & Secur Res Lab, Carthage, Tunisia
[2] Taif Univ, Coll Adm & Financial Sci, At Taif, Saudi Arabia
关键词
Outsourcing; economics of privacy; optimal security investment; privacy threats modeling; INFORMATION SECURITY INVESTMENT;
D O I
10.1016/j.procs.2015.12.165
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The majority of research works on the the economics of data privacy are not suitable for firms that outsource their business operations. In particular, the computation of security investment does not consider the bilateral security risk, and the used threat models do not consider the particular aspects of privacy threats and attacks, which show the use of multiple steps to thief and misuse the information, and depend on the type of the stolen information and its lifetime. We provide in this work an economic security investment model, allowing firms, which outsource their IT business functions, to determine their optimal security investment and the related residual risk. In this work, threats on data privacy are modeled considering the particular aspects of privacy attacks. A numerical analysis is conducted to analyze the impact of the quality of detection and reaction to privacy breaches, on optimal investment and residual risk. The analysis shows that the amount of optimal investment depends on the minimal time period to detect a security breach, the ability of the customer firm to react to such an attack as quickly as possible, and also on the type of threat on private data. In particular it has been shown that for threats related to private information theft, the customer firm can take advantage from the delay in detecting attacks at the outsourcing provider side. Moreover, it should not also put a lot of security investment effort in reducing the reaction time to these privacy attacks. In the contrary, for threats related to privacy exploitation by self-propagating malware, the customer firm has not to contact with an outsourcing company which is not committed to report an attack occurrence within a short delay, and should not to put a lot of security investment effort in reducing the reaction time to these attacks. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:569 / 579
页数:11
相关论文
共 50 条
  • [1] Protecting against cyber attacks in biometric technologies
    IEC
    ChinaStandardization, 2023, (05) : 57 - 57
  • [2] PROTECTING COMMUNICATIONS INFRASTRUCTURE AGAINST CYBER ATTACKS
    Gu Dawu
    Jiang Xuxian
    Xue Yibo
    Zou Wei
    Guo Li
    CHINA COMMUNICATIONS, 2014, 11 (08) : I - II
  • [3] Protecting Location Privacy against Inference Attacks
    Minami, Kazuhiro
    Borisov, Nikita
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 711 - 713
  • [4] Output regeneration defense against membership inference attacks for protecting data privacy
    Ding, Yong
    Huang, Peixiong
    Liang, Hai
    Yuan, Fang
    Wang, Huiyong
    INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2023, : 61 - 79
  • [5] Protecting Privacy Against Record Linkage Disclosure: A Bounded Swapping Approach for Numeric Data
    Li, Xiao-Bai
    Sarkar, Sumit
    INFORMATION SYSTEMS RESEARCH, 2011, 22 (04) : 774 - 789
  • [6] Effectively protecting critical infrastructures against cyber attacks: Against blackout
    Kritische infrastrukturen wirkungsvoll vor cyber-angriffen schützen: Wider den blackout
    Alsbih, Amir, 2018, VDI Fachmedien GmBbH & Co. (70): : 1 - 2
  • [7] Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks
    Yang, Yang
    Guan, Zhi
    Liu, Zhe
    Chen, Zhong
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 49 - 60
  • [8] Protecting Biomedical Data Against Attribute Disclosure
    Spengler, Helmut
    Prasser, Fabian
    GERMAN MEDICAL DATA SCIENCES: SHAPING CHANGE - CREATIVE SOLUTIONS FOR INNOVATIVE MEDICINE (GMDS 2019), 2019, 267 : 207 - 214
  • [9] Protecting privacy in the cyber era
    Davis, JC
    IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2000, 19 (02) : 10 - +
  • [10] An Integrated Security System of Protecting Smart Grid against Cyber Attacks
    Wei, Dong
    Lu, Yan
    Jafari, Mohsen
    Skare, Paul
    Rohde, Kenneth
    2010 INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2010,