Economics of Privacy: A Model for Protecting Against Cyber Data Disclosure Attacks

被引:3
|
作者
Miaoui, Yosra [1 ]
Boudriga, Noureddine [1 ]
Abaoub, Ezzeddine [2 ]
机构
[1] Univ Carthage, Commun Networks & Secur Res Lab, Carthage, Tunisia
[2] Taif Univ, Coll Adm & Financial Sci, At Taif, Saudi Arabia
关键词
Outsourcing; economics of privacy; optimal security investment; privacy threats modeling; INFORMATION SECURITY INVESTMENT;
D O I
10.1016/j.procs.2015.12.165
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The majority of research works on the the economics of data privacy are not suitable for firms that outsource their business operations. In particular, the computation of security investment does not consider the bilateral security risk, and the used threat models do not consider the particular aspects of privacy threats and attacks, which show the use of multiple steps to thief and misuse the information, and depend on the type of the stolen information and its lifetime. We provide in this work an economic security investment model, allowing firms, which outsource their IT business functions, to determine their optimal security investment and the related residual risk. In this work, threats on data privacy are modeled considering the particular aspects of privacy attacks. A numerical analysis is conducted to analyze the impact of the quality of detection and reaction to privacy breaches, on optimal investment and residual risk. The analysis shows that the amount of optimal investment depends on the minimal time period to detect a security breach, the ability of the customer firm to react to such an attack as quickly as possible, and also on the type of threat on private data. In particular it has been shown that for threats related to private information theft, the customer firm can take advantage from the delay in detecting attacks at the outsourcing provider side. Moreover, it should not also put a lot of security investment effort in reducing the reaction time to these privacy attacks. In the contrary, for threats related to privacy exploitation by self-propagating malware, the customer firm has not to contact with an outsourcing company which is not committed to report an attack occurrence within a short delay, and should not to put a lot of security investment effort in reducing the reaction time to these attacks. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:569 / 579
页数:11
相关论文
共 50 条
  • [21] Protecting Against Inference Attacks on Co-location Data
    Ahuja, Ritesh
    Ghinita, Gabriel
    Krishna, Nithin
    Shahabi, Cyrus
    2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,
  • [22] Information Protection of Data Processing Center Against Cyber Attacks
    Ogbu, James Onyigwang
    Oksiuk, Alexandr
    2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 132 - 134
  • [23] Information Protection of Data Processing Center Against Cyber Attacks
    Onyigwang, Ogbu James
    Shestak, Yanina
    Oksiuk, Alexandr
    PROCEEDINGS OF THE 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA STREAM MINING & PROCESSING (DSMP), 2016, : 397 - 400
  • [24] A Privacy-preserving Algorithm for AC Microgrid Cyber-physical System Against False Data Injection Attacks
    Yang, Jun
    Zhang, Yu
    JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2023, 11 (05) : 1646 - 1658
  • [25] A Privacy-preserving Algorithm for AC Microgrid Cyber-physical System Against False Data Injection Attacks
    Jun Yang
    Yu Zhang
    JournalofModernPowerSystemsandCleanEnergy, 2023, 11 (05) : 1646 - 1658
  • [26] Social Network Privacy for Attribute Disclosure Attacks
    Chester, Sean
    Srivastava, Gautam
    2011 INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2011), 2011, : 445 - 449
  • [27] OnionBots: Subverting Privacy Infrastructure for Cyber Attacks
    Sanatinia, Amirali
    Noubir, Guevara
    2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, 2015, : 69 - 80
  • [29] Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory
    Li, Congwu
    Le Guan
    Lin, Jingqiang
    Luo, Bo
    Cai, Quanwei
    Jing, Jiwu
    Wang, Jing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1196 - 1213
  • [30] Dynamical model for individual defence against cyber epidemic attacks
    Yan, Dingyu
    Liu, Feng
    Zhang, Yaqin
    Jia, Kun
    IET INFORMATION SECURITY, 2019, 13 (06) : 541 - 551