Differentiated security levels for personal identifiable information in identity management system
نویسندگان
چکیده
With the rapid development of Internet services, identity management (IdM) has got widely attraction as the credit agency between users and service providers. It facilitates users to use the Internet service, promotes service providers to enrich services, and makes Internet more security. Personally identifiable information (PII) is the most important information asset with which identity provider (IdP) can provide various services. Since PII is sensitive to users, it has become a serious problem that PII is leaked, illegal selected, illegal accessed. In order to improve security of PII, this study develops a novel framework using data mining to forecast information asset value and find appropriate security level for protecting user PII. The framework has two stages. In the first stage, user information asset is forecasted by data mining tool (decision tree) from PII database. Then security level for user PII is determined by the information asset value assuming that the higher information asset is, the more security requirement of PII is. In the second stage, with time being, number of illegal access and attack can be accumulated. It can be used to reconstruct the decision tree and update the knowledge base combined with the result of the first stage. Thus security level of PII can be timely adjusted and the protection of PII can be guaranteed even when security threat changes. Furthermore, an empirical case was studied in a user dataset to demonstrate the protection decision derived from the framework for various PII. Simulation results show that the framework with data mining can protect PII effectively. Our work can benefit the development of e-business service. 2011 Elsevier Ltd. All rights reserved.
منابع مشابه
Mobile Identity Management
Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their customers. Users may benefit from identity management to simplify logging in to websites and computer ...
متن کاملMobile Devices to the Identity Rescue
Identity management is defined as the set of processes related to identity and access information for the whole identity life cycle in a system. In the open internet users need new methods for identity management that supply reliable authentication and sufficient user control. Currently applied methods often lack a proper level of security (e.g., passwords) and privacy (e.g., diverse processing...
متن کاملPersonal Information Databases
One of the most important aspects of security organization is to establish a framework to identify securitysignificant points where policies and procedures are declared. The (information) security infrastructure comprises entities, processes, and technology. All are participants in handling information, which is the item that needs to be protected. Privacy and security information technology is...
متن کاملPersönliches digitales Identitätsmanagement: Untersuchung und Entwicklung von Konzepten und Systemarchitekturen für die kontrollierte Selbstdarstellung in digitalen Netzen
Digital identity management helps users and service providers to manage, control and transmit personal data within digital communication systems. The diversity of these complex tasks that always involve security issues, is currently distributed on many different applications and systems. Digital identity management ties these tasks into one single concept for a system level component which can ...
متن کاملA user-centric PKI based-protocol to manage FC2 digital identities
The proliferation of e-services (e.g. e-commerce, e-health, e-government) within the emerging digital Identity Management Systems make Internet an undeniable convenient and powerful tool for users. However in this environment, users are required to manage several digital identities and a great number of personal data. As such, simplification of users’ involvement is highly needed while increasi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Expert Syst. Appl.
دوره 38 شماره
صفحات -
تاریخ انتشار 2011