Title of article :
Online Randomization Strategies to Obfuscate User
Behavioral Patterns
Author/Authors :
Juan E. Tapiador، نويسنده , , Julio C. Hernandez-Castro •
Pedro Peris-Lopez، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2012
Abstract :
When operating from the cloud, traces of user activities and behavioral
patterns are accessible to anyone with enough privileges within the system. This could
be, for example, the case of dishonest technical staff who may well be interested in
selling user logs to competitors. In this paper, we investigate some of the security and
privacy leakages derived from the analysis of user activities.Weshow that the working
behavioral patterns exhibited by users can be easily captured into computationally
useful representations that would allow an adversary to predict future activities, detect
the occurrence of events of interest, or infer the organization’s internal structure. We
then introduce the idea of obfuscating user behaviour through Online Action Randomization
Algorithms. In doing so, we introduce an indistinguishability-based definition
for perfectly obfuscated actions and a concrete scheme to randomize user traces
in an incremental way. We report experimental results confirming the obfuscation
quality and other properties of the proposed schemes.
Keywords :
Cloud computing security Insider threats User modeling Anonymity Privacy
Journal title :
Journal of Network and Systems Management
Journal title :
Journal of Network and Systems Management