A privacy data leakage prevention method in P2P networks
Registered peers to a P2P service can share and exchange information with other peers without servers using P2P network. In such P2P networks, there are frequent leaks of the internal privacy data of an organization through P2P file sharing. Today, DLP which is a privacy data leakage prevention tech...
Gespeichert in:
Veröffentlicht in: | Peer-to-peer networking and applications 2016-05, Vol.9 (3), p.508-519 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 519 |
---|---|
container_issue | 3 |
container_start_page | 508 |
container_title | Peer-to-peer networking and applications |
container_volume | 9 |
creator | Chae, Cheol-Joo Shin, YongJu Choi, Kiseok Kim, Ki-Bong Choi, Kwang-Nam |
description | Registered peers to a P2P service can share and exchange information with other peers without servers using P2P network. In such P2P networks, there are frequent leaks of the internal privacy data of an organization through P2P file sharing. Today, DLP which is a privacy data leakage prevention technology is applied P2P network blocking and file encryption methods. However restricting all the services and normal users is difficult due to the number of ports used by P2P including the port 80. Thus, we propose a privacy data leakage prevention method by releasing a P2P sharing file that does not include privacy data using a privacy data removing technology with a privacy data leaking risk factor. The proposed method provides higher security and performance compared with a DLP method as privacy data is removed from a P2P sharing file. |
doi_str_mv | 10.1007/s12083-015-0371-x |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1800498578</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1800498578</sourcerecordid><originalsourceid>FETCH-LOGICAL-c419t-899e6a13d73c1919e74f650afae20491094d2fcb238b4bfa3d0ddcfbd68897a93</originalsourceid><addsrcrecordid>eNp1kE1LAzEQhoMoWKs_wNuCFy_RmWR3kxxL8QsEe9BzyG6yddvtbk22tf33pqyICJ5mGJ73ZXgIuUS4QQBxG5CB5BQwo8AF0t0RGaHiOc3TDI5_9pSdkrMQFgA58oyNiJwka19vTblPrOlN0jizNHMXj27r2r7u2mTl-vfOJnWbzNgsaV3_2fllOCcnlWmCu_ieY_J2f_c6faTPLw9P08kzLVNUPZVKudwgt4KXqFA5kVZ5BqYyjkGqEFRqWVUWjMsiLSrDLVhbVoXNpVTCKD4m10Pv2ncfGxd6vapD6ZrGtK7bBI0SYo_MhIzo1R900W18G7_TKARGERxEpHCgSt-F4F2lo4CV8XuNoA8u9eBSR5f64FLvYoYNmRDZdu78r-Z_Q1_UxXW4</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1771450307</pqid></control><display><type>article</type><title>A privacy data leakage prevention method in P2P networks</title><source>Springer Nature - Complete Springer Journals</source><creator>Chae, Cheol-Joo ; Shin, YongJu ; Choi, Kiseok ; Kim, Ki-Bong ; Choi, Kwang-Nam</creator><creatorcontrib>Chae, Cheol-Joo ; Shin, YongJu ; Choi, Kiseok ; Kim, Ki-Bong ; Choi, Kwang-Nam</creatorcontrib><description>Registered peers to a P2P service can share and exchange information with other peers without servers using P2P network. In such P2P networks, there are frequent leaks of the internal privacy data of an organization through P2P file sharing. Today, DLP which is a privacy data leakage prevention technology is applied P2P network blocking and file encryption methods. However restricting all the services and normal users is difficult due to the number of ports used by P2P including the port 80. Thus, we propose a privacy data leakage prevention method by releasing a P2P sharing file that does not include privacy data using a privacy data removing technology with a privacy data leaking risk factor. The proposed method provides higher security and performance compared with a DLP method as privacy data is removed from a P2P sharing file.</description><identifier>ISSN: 1936-6442</identifier><identifier>EISSN: 1936-6450</identifier><identifier>DOI: 10.1007/s12083-015-0371-x</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Blocking ; Communications Engineering ; Computer Communication Networks ; Computer information security ; Computer privacy ; Engineering ; Exchange ; Information Systems and Communication Service ; Leakage ; Networks ; Peer to peer computing ; Ports ; Privacy ; Risk analysis ; Signal,Image and Speech Processing ; Technology</subject><ispartof>Peer-to-peer networking and applications, 2016-05, Vol.9 (3), p.508-519</ispartof><rights>Springer Science+Business Media New York 2015</rights><rights>Springer Science+Business Media New York 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c419t-899e6a13d73c1919e74f650afae20491094d2fcb238b4bfa3d0ddcfbd68897a93</citedby><cites>FETCH-LOGICAL-c419t-899e6a13d73c1919e74f650afae20491094d2fcb238b4bfa3d0ddcfbd68897a93</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12083-015-0371-x$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s12083-015-0371-x$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,777,781,27905,27906,41469,42538,51300</link.rule.ids></links><search><creatorcontrib>Chae, Cheol-Joo</creatorcontrib><creatorcontrib>Shin, YongJu</creatorcontrib><creatorcontrib>Choi, Kiseok</creatorcontrib><creatorcontrib>Kim, Ki-Bong</creatorcontrib><creatorcontrib>Choi, Kwang-Nam</creatorcontrib><title>A privacy data leakage prevention method in P2P networks</title><title>Peer-to-peer networking and applications</title><addtitle>Peer-to-Peer Netw. Appl</addtitle><description>Registered peers to a P2P service can share and exchange information with other peers without servers using P2P network. In such P2P networks, there are frequent leaks of the internal privacy data of an organization through P2P file sharing. Today, DLP which is a privacy data leakage prevention technology is applied P2P network blocking and file encryption methods. However restricting all the services and normal users is difficult due to the number of ports used by P2P including the port 80. Thus, we propose a privacy data leakage prevention method by releasing a P2P sharing file that does not include privacy data using a privacy data removing technology with a privacy data leaking risk factor. The proposed method provides higher security and performance compared with a DLP method as privacy data is removed from a P2P sharing file.</description><subject>Blocking</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Computer information security</subject><subject>Computer privacy</subject><subject>Engineering</subject><subject>Exchange</subject><subject>Information Systems and Communication Service</subject><subject>Leakage</subject><subject>Networks</subject><subject>Peer to peer computing</subject><subject>Ports</subject><subject>Privacy</subject><subject>Risk analysis</subject><subject>Signal,Image and Speech Processing</subject><subject>Technology</subject><issn>1936-6442</issn><issn>1936-6450</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp1kE1LAzEQhoMoWKs_wNuCFy_RmWR3kxxL8QsEe9BzyG6yddvtbk22tf33pqyICJ5mGJ73ZXgIuUS4QQBxG5CB5BQwo8AF0t0RGaHiOc3TDI5_9pSdkrMQFgA58oyNiJwka19vTblPrOlN0jizNHMXj27r2r7u2mTl-vfOJnWbzNgsaV3_2fllOCcnlWmCu_ieY_J2f_c6faTPLw9P08kzLVNUPZVKudwgt4KXqFA5kVZ5BqYyjkGqEFRqWVUWjMsiLSrDLVhbVoXNpVTCKD4m10Pv2ncfGxd6vapD6ZrGtK7bBI0SYo_MhIzo1R900W18G7_TKARGERxEpHCgSt-F4F2lo4CV8XuNoA8u9eBSR5f64FLvYoYNmRDZdu78r-Z_Q1_UxXW4</recordid><startdate>20160501</startdate><enddate>20160501</enddate><creator>Chae, Cheol-Joo</creator><creator>Shin, YongJu</creator><creator>Choi, Kiseok</creator><creator>Kim, Ki-Bong</creator><creator>Choi, Kwang-Nam</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>88I</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M2O</scope><scope>M2P</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20160501</creationdate><title>A privacy data leakage prevention method in P2P networks</title><author>Chae, Cheol-Joo ; Shin, YongJu ; Choi, Kiseok ; Kim, Ki-Bong ; Choi, Kwang-Nam</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c419t-899e6a13d73c1919e74f650afae20491094d2fcb238b4bfa3d0ddcfbd68897a93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Blocking</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Computer information security</topic><topic>Computer privacy</topic><topic>Engineering</topic><topic>Exchange</topic><topic>Information Systems and Communication Service</topic><topic>Leakage</topic><topic>Networks</topic><topic>Peer to peer computing</topic><topic>Ports</topic><topic>Privacy</topic><topic>Risk analysis</topic><topic>Signal,Image and Speech Processing</topic><topic>Technology</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chae, Cheol-Joo</creatorcontrib><creatorcontrib>Shin, YongJu</creatorcontrib><creatorcontrib>Choi, Kiseok</creatorcontrib><creatorcontrib>Kim, Ki-Bong</creatorcontrib><creatorcontrib>Choi, Kwang-Nam</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Science Database (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Science Database</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Peer-to-peer networking and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Chae, Cheol-Joo</au><au>Shin, YongJu</au><au>Choi, Kiseok</au><au>Kim, Ki-Bong</au><au>Choi, Kwang-Nam</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A privacy data leakage prevention method in P2P networks</atitle><jtitle>Peer-to-peer networking and applications</jtitle><stitle>Peer-to-Peer Netw. Appl</stitle><date>2016-05-01</date><risdate>2016</risdate><volume>9</volume><issue>3</issue><spage>508</spage><epage>519</epage><pages>508-519</pages><issn>1936-6442</issn><eissn>1936-6450</eissn><abstract>Registered peers to a P2P service can share and exchange information with other peers without servers using P2P network. In such P2P networks, there are frequent leaks of the internal privacy data of an organization through P2P file sharing. Today, DLP which is a privacy data leakage prevention technology is applied P2P network blocking and file encryption methods. However restricting all the services and normal users is difficult due to the number of ports used by P2P including the port 80. Thus, we propose a privacy data leakage prevention method by releasing a P2P sharing file that does not include privacy data using a privacy data removing technology with a privacy data leaking risk factor. The proposed method provides higher security and performance compared with a DLP method as privacy data is removed from a P2P sharing file.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s12083-015-0371-x</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1936-6442 |
ispartof | Peer-to-peer networking and applications, 2016-05, Vol.9 (3), p.508-519 |
issn | 1936-6442 1936-6450 |
language | eng |
recordid | cdi_proquest_miscellaneous_1800498578 |
source | Springer Nature - Complete Springer Journals |
subjects | Blocking Communications Engineering Computer Communication Networks Computer information security Computer privacy Engineering Exchange Information Systems and Communication Service Leakage Networks Peer to peer computing Ports Privacy Risk analysis Signal,Image and Speech Processing Technology |
title | A privacy data leakage prevention method in P2P networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T05%3A24%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20privacy%20data%20leakage%20prevention%20method%20in%20P2P%20networks&rft.jtitle=Peer-to-peer%20networking%20and%20applications&rft.au=Chae,%20Cheol-Joo&rft.date=2016-05-01&rft.volume=9&rft.issue=3&rft.spage=508&rft.epage=519&rft.pages=508-519&rft.issn=1936-6442&rft.eissn=1936-6450&rft_id=info:doi/10.1007/s12083-015-0371-x&rft_dat=%3Cproquest_cross%3E1800498578%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1771450307&rft_id=info:pmid/&rfr_iscdi=true |