Improvement of Privacy Preserved Rule-Based Risk Analysis via Secure Multi-Party Computation
Title | Improvement of Privacy Preserved Rule-Based Risk Analysis via Secure Multi-Party Computation |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Sakumoto, S., Kanaoka, A. |
Conference Name | 2017 12th Asia Joint Conference on Information Security (AsiaJCIS) |
Date Published | aug |
ISBN Number | 978-1-5386-2132-5 |
Keywords | Attack Tree Analysis, confidential information abuse, confidential information leakage, cryptography, data privacy, Engines, expert systems, human factors, Ports (Computers), privacy, privacy preserved rule-based risk analysis, privacy protection, Protocols, Prototypes, pubcrawl, Random access memory, risk analysis, Scalability, secret sharing, secure multiparty computation, secure risk analysis method, Servers |
Abstract | Currently, when companies conduct risk analysis of own networks and systems, it is common to outsource risk analysis to third-party experts. At that time, the company passes the information used for risk analysis including confidential information such as network configuration to third-party expert. It raises the risk of leakage and abuse of confidential information. Therefore, a method of risk analysis by using secure computation without passing confidential information of company has been proposed. Although Liu's method have firstly achieved secure risk analysis method using multiparty computation and attack tree analysis, it has several problems to be practical. In this paper, improvement of secure risk analysis method is proposed. It can dynamically reduce compilation time, enhance scale of target network and system without increasing execution time. Experimental work is carried out by prototype implementation. As a result, we achieved improved performance in compile time and enhance scale of target with equivalent performance on execution time. |
URL | https://ieeexplore.ieee.org/document/8026035 |
DOI | 10.1109/AsiaJCIS.2017.18 |
Citation Key | sakumoto_improvement_2017 |
- privacy protection
- Servers
- secure risk analysis method
- secure multiparty computation
- secret sharing
- Scalability
- risk analysis
- Random access memory
- pubcrawl
- Prototypes
- Protocols
- Attack Tree Analysis
- privacy preserved rule-based risk analysis
- privacy
- Ports (Computers)
- Human Factors
- expert systems
- Engines
- data privacy
- Cryptography
- confidential information leakage
- confidential information abuse