Presentation | 2010-06-17 Proposal and Consideration for An Anonymity Method for Widespred High-Speed Incident Analysis System (II) Ryoichi ISAWA, Masakatu MORII, Sadako TAKASUKA, Koji NAKAO, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Some organizations need to collaborate each other to analyze the computer security incidents which become complex. The network data which they captured include some privacy information, and they has to anonymize the network data to share. Order preserving encryption is able to anonymize the network data preserving its order and identity. However, the original data can be leaked from a distribution of anonymized data. This is the reason why order preserving encryption maps all plain text space to all cipher text space. In this paper, we propose an anonymity method preserving order and identity. Our basic idea to solve the problem like order preserving encryption is to preserve an order of only one data set. We can preserve order and identity safely using our method. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Anonymity / Privacy-preserving / Network data sharing / Incident analysis |
Paper # | IA2010-6,ICSS2010-6 |
Date of Issue |
Conference Information | |
Committee | IA |
---|---|
Conference Date | 2010/6/10(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Internet Architecture(IA) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Proposal and Consideration for An Anonymity Method for Widespred High-Speed Incident Analysis System (II) |
Sub Title (in English) | |
Keyword(1) | Anonymity |
Keyword(2) | Privacy-preserving |
Keyword(3) | Network data sharing |
Keyword(4) | Incident analysis |
1st Author's Name | Ryoichi ISAWA |
1st Author's Affiliation | CRYPTO CO., LTD() |
2nd Author's Name | Masakatu MORII |
2nd Author's Affiliation | Graduate School of Engineering, Kobe University |
3rd Author's Name | Sadako TAKASUKA |
3rd Author's Affiliation | CRYPTO CO., LTD |
4th Author's Name | Koji NAKAO |
4th Author's Affiliation | National Institute of Information and Communications Technology |
Date | 2010-06-17 |
Paper # | IA2010-6,ICSS2010-6 |
Volume (vol) | vol.110 |
Number (no) | 78 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |