Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection

  • Authors:
  • Joachim Biskup;Ulrich Flegel

  • Affiliations:
  • -;-

  • Venue:
  • RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
  • Year:
  • 2000

Quantified Score

Hi-index 0.00

Visualization

Abstract

Privacy and surveillance by intrusion detection are potentially conflicting organizational and legal requirements. In order to support a balanced solution, audit data is inspected for personal data and identifiers referring to real persons are substituted by transaction-based pseudonyms.Th ese pseudonyms are constructed as shares for a suitably adapted version of Shamir's cryptographic approach to secret sharing. Under sufficient suspicion, expressed as a threshold on shares, audit analyzers can perform reidentification.