An architecture for privacy-preserving sharing of CTI with 3rd party analysis services

Fabio Giubilo, Ali Sajjad, Mark Shackleton, David W. Chadwick, Wenjun Fan, Rogerio De Lemos

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

6 Citations (Scopus)

Abstract

Increasing numbers of Small and Medium Enterprises (SME) are outsourcing or hosting their services on different Cloud Service Providers (CSP). They are also using different security services from these CSPs such as firewalls, intrusion detection/prevention systems and anti-malware. Although for the SMEs the main purpose of using these security services is to protect their cyber assets, either physical or virtual, from security threats and compromises, a very useful and valuable by-product of these security services is the wealth of Cyber Threat Information (CTI) that is collected over time. However, a common problem faced by SMEs is that they lack the resources and expertise for monitoring, analysing and reacting to any security notifications, alerts or events generated by the security services they have subscribed to. An obvious solution to this problem is that the SMEs outsource this problem to a cloud based service as well, by sharing their CTI with this service and allowing it to analyse the information and generate actionable reports or patches. The more CTI obtained from different SMEs, the better the analysis result. In this paper, we try to address some of the privacy and confidentiality issues that arise as a result of different SMEs sharing their CTI with such a third party analysis service for the aggregate analysis scenario we just described. We present the design and architecture of our solution that aims to allow SMEs to perform policy-based sharing of CTI, while also offering them flexible privacy and confidentiality controls.

Original languageEnglish
Title of host publication2017 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages293-297
Number of pages5
ISBN (Electronic)9781908320933
DOIs
Publication statusPublished - 8 May 2018
Externally publishedYes
Event12th International Conference for Internet Technology and Secured Transactions, ICITST 2017 - Cambridge, United Kingdom
Duration: 11 Dec 201714 Dec 2017

Publication series

Name2017 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017

Conference

Conference12th International Conference for Internet Technology and Secured Transactions, ICITST 2017
Country/TerritoryUnited Kingdom
CityCambridge
Period11/12/1714/12/17

Keywords

  • analysis services
  • cyber threat information
  • data privacy and confidentiality
  • infrastructure architecture
  • policy based sharing

Fingerprint

Dive into the research topics of 'An architecture for privacy-preserving sharing of CTI with 3rd party analysis services'. Together they form a unique fingerprint.

Cite this