Presentation 2010-06-17
Proposal and Consideration for An Anonymity Method for Widespred High-Speed Incident Analysis System (II)
Ryoichi ISAWA, Masakatu MORII, Sadako TAKASUKA, Koji NAKAO,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Some organizations need to collaborate each other to analyze the computer security incidents which become complex. The network data which they captured include some privacy information, and they has to anonymize the network data to share. Order preserving encryption is able to anonymize the network data preserving its order and identity. However, the original data can be leaked from a distribution of anonymized data. This is the reason why order preserving encryption maps all plain text space to all cipher text space. In this paper, we propose an anonymity method preserving order and identity. Our basic idea to solve the problem like order preserving encryption is to preserve an order of only one data set. We can preserve order and identity safely using our method.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Anonymity / Privacy-preserving / Network data sharing / Incident analysis
Paper # IA2010-6,ICSS2010-6
Date of Issue

Conference Information
Committee IA
Conference Date 2010/6/10(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Internet Architecture(IA)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Proposal and Consideration for An Anonymity Method for Widespred High-Speed Incident Analysis System (II)
Sub Title (in English)
Keyword(1) Anonymity
Keyword(2) Privacy-preserving
Keyword(3) Network data sharing
Keyword(4) Incident analysis
1st Author's Name Ryoichi ISAWA
1st Author's Affiliation CRYPTO CO., LTD()
2nd Author's Name Masakatu MORII
2nd Author's Affiliation Graduate School of Engineering, Kobe University
3rd Author's Name Sadako TAKASUKA
3rd Author's Affiliation CRYPTO CO., LTD
4th Author's Name Koji NAKAO
4th Author's Affiliation National Institute of Information and Communications Technology
Date 2010-06-17
Paper # IA2010-6,ICSS2010-6
Volume (vol) vol.110
Number (no) 78
Page pp.pp.-
#Pages 6
Date of Issue