Economics of Privacy: A Model for Protecting Against Cyber Data Disclosure Attacks

被引:3
|
作者
Miaoui, Yosra [1 ]
Boudriga, Noureddine [1 ]
Abaoub, Ezzeddine [2 ]
机构
[1] Univ Carthage, Commun Networks & Secur Res Lab, Carthage, Tunisia
[2] Taif Univ, Coll Adm & Financial Sci, At Taif, Saudi Arabia
关键词
Outsourcing; economics of privacy; optimal security investment; privacy threats modeling; INFORMATION SECURITY INVESTMENT;
D O I
10.1016/j.procs.2015.12.165
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The majority of research works on the the economics of data privacy are not suitable for firms that outsource their business operations. In particular, the computation of security investment does not consider the bilateral security risk, and the used threat models do not consider the particular aspects of privacy threats and attacks, which show the use of multiple steps to thief and misuse the information, and depend on the type of the stolen information and its lifetime. We provide in this work an economic security investment model, allowing firms, which outsource their IT business functions, to determine their optimal security investment and the related residual risk. In this work, threats on data privacy are modeled considering the particular aspects of privacy attacks. A numerical analysis is conducted to analyze the impact of the quality of detection and reaction to privacy breaches, on optimal investment and residual risk. The analysis shows that the amount of optimal investment depends on the minimal time period to detect a security breach, the ability of the customer firm to react to such an attack as quickly as possible, and also on the type of threat on private data. In particular it has been shown that for threats related to private information theft, the customer firm can take advantage from the delay in detecting attacks at the outsourcing provider side. Moreover, it should not also put a lot of security investment effort in reducing the reaction time to these privacy attacks. In the contrary, for threats related to privacy exploitation by self-propagating malware, the customer firm has not to contact with an outsourcing company which is not committed to report an attack occurrence within a short delay, and should not to put a lot of security investment effort in reducing the reaction time to these attacks. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:569 / 579
页数:11
相关论文
共 50 条
  • [41] Protecting Locations with Differential Privacy against Location-Dependent Attacks in Continuous LBS Queries
    Wen, Ruxue
    Zhang, Rui
    Peng, Kai
    Wang, Chen
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 379 - 386
  • [42] Protecting personalized privacy against sensitivity homogeneity attacks over road networks in mobile services
    Xiao PAN
    Weizhang CHEN
    Lei WU
    Chunhui PIAO
    Zhaojun HU
    Frontiers of Computer Science, 2016, 10 (02) : 370 - 386
  • [43] Sharing data - protecting privacy
    不详
    R&D MAGAZINE, 2006, 48 (06): : 14 - 14
  • [44] Protecting privacy credentials from phishing and spyware attacks
    Price, Sean M.
    2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 167 - 174
  • [45] Protecting Mobile Users from Visual Privacy Attacks
    Ali, Mohammed Eunus
    Anwar, Anika
    Ahmed, Ishrat
    Hashem, Tanzima
    Kulik, Lars
    Tanin, Egemen
    PROCEEDINGS OF THE 2014 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING (UBICOMP'14 ADJUNCT), 2014, : 1 - 4
  • [46] Citadel: Protecting Data Privacy and Model Confidentiality for Collaborative Learning
    Zhang, Chengliang
    Xia, Junzhe
    Yang, Baichen
    Puyang, Huancheng
    Wang, Wei
    Chen, Ruichuan
    Akkus, Istemi Ekin
    Aditya, Paarijaat
    Yan, Feng
    PROCEEDINGS OF THE 2021 ACM SYMPOSIUM ON CLOUD COMPUTING (SOCC '21), 2021, : 546 - 561
  • [47] Protecting Obfuscation against Algebraic Attacks
    Barak, Boaz
    Garg, Sanjam
    Kalai, Yael Tauman
    Paneth, Omer
    Sahai, Amit
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 221 - 238
  • [48] A Recipe for Protecting Against Speculation Attacks
    Sherwood, Timothy
    COMMUNICATIONS OF THE ACM, 2021, 64 (12) : 104 - 104
  • [49] Protecting users against phishing attacks
    Kirda, Engin
    Kruegel, Christopher
    COMPUTER JOURNAL, 2006, 49 (05): : 554 - 561
  • [50] Protecting against attacks on open systems
    Dalrymple, PW
    I&CS-INSTRUMENTATION & CONTROL SYSTEMS, 1998, 71 (02): : 51 - 55