DCNL: Disclosure Control of Natural Language Information to Enable Secure and Enjoyable E-Communications

نویسندگان

  • Haruno Kataoka
  • Natsuki Watanabe
  • Keiko Mizutani
  • Hiroshi Yoshiura
چکیده

Natural language communications using social networking and blogging services can result in the undesired revelation of private information. Existing disclosure control is tedious and error-prone because the user must set the disclosure level manually and must reconsider the level every time a new text is to be uploaded. This can lead to the revelation of private information or reduced enjoyment of the communication due to either disclosing too much text or hiding text that is meant to be shared. To solve these problems, we are developing a new disclosure control mechanism called DCNL or disclosure control of natural language information. DCNL automatically checks texts uploaded to social networking services or blog pages, detects words that might reveal private information, and warns the user about them. The granularity of DCNL is not the text but the words in the text. Consequently, it is not tiresome for the user and balances the protection of privacy with the enjoyment of communications. DCNL checks not only words that directly represent private information but also those that indirectly suggest it. Combinations of words are also checked. Analysis of the co-occurrence between words and reachability analysis with a search engine are used to infer what words imply what information.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet

Disclosure control of natural language information (DCNL), which we are trying to realize, is described. DCNL will be used for securing human communications over the internet, such as through blogs and social network services. Before sentences in the communications are disclosed, they are checked by DCNL and any phrases that could reveal sensitive information are transformed or omitted so that ...

متن کامل

Mitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion

Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

Authorization models for secure information sharing: a survey and research agenda

This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010