Tapiador, Juan E. and Hernandez-Castro, Julio C. and Peris-Lopez, Pedro (2012) Online Randomization Strategies to Obfuscate User Behavioral Patterns. Journal of Network and Systems Management,, 20 (4). pp. 561-578. ISSN 1064-7570 .
- Published Version
Restricted to Repository staff only
| Contact us about this Publication
When operating from the cloud, traces of user activities and behavioral patterns are accessible to anyone with enough privileges within the system. This could be, for example, the case of dishonest technical staff who may well be interested in selling user logs to competitors. In this paper, we investigate some of the security and privacy leakages derived from the analysis of user activities.Weshow that the working behavioral patterns exhibited by users can be easily captured into computationally useful representations that would allow an adversary to predict future activities, detect the occurrence of events of interest, or infer the organization's internal structure. We then introduce the idea of obfuscating user behaviour through Online Action Randomization Algorithms. In doing so, we introduce an indistinguishability-based definition for perfectly obfuscated actions and a concrete scheme to randomize user traces in an incremental way. We report experimental results confirming the obfuscation quality and other properties of the proposed schemes.
|Uncontrolled keywords:||Anonymity; Cloud computing security; Insider threats; Privacy; User modeling|
|Subjects:||Q Science > QA Mathematics (inc Computing science) > QA 75 Electronic computers. Computer science|
|Divisions:||Faculties > Science Technology and Medical Studies > School of Computing > Security Group|
|Depositing User:||Julio Hernandez-Castro|
|Date Deposited:||24 Oct 2012 12:35|
|Last Modified:||18 Mar 2013 15:59|
|Resource URI:||http://kar.kent.ac.uk/id/eprint/31939 (The current URI for this page, for reference purposes)|
- Depositors only (login required):