Browse > Article
http://dx.doi.org/10.13089/JKIISC.2011.21.1.125

Prohibiting internal data leakage to mass storage device in mobile device  

Chung, Bo-Heung (Electronics and Telecommunications Research Institute)
Kim, Jung-Nyu (Electronics and Telecommunications Research Institute)
Abstract
According to proliferation of mobile devices, security threats have been continuously increased such as illegal or unintentional file transmission of important data to an external mass-storage device. Therefore, we propose a protection method to prohibit an illegal outflow to this device and implement this method. This method extracts signatures from random locations of important file and uses them to detect and block illegal file transmission. To get signatures, a target file is divided by extracting window size and more than one signatures are extracted in this area. To effective signature sampling, various extraction ways such as full, binomial distribution-based and dynamic sampling are implemented and evaluated. The proposed method has some advantages. The one is that an attacker cannot easily predict the signature and its extraction location. The other is that it doesn't need to modify original data to protect it. With the help of these advantages, we can say that this method can increase efficiency of easy-to-use and it is a proper way leakage prevention in a mobile device.
Keywords
Data leakage protection; Mobile Security; Signature Sampling;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Geetha, R., Delbert, H., A P2P Intrusion Detection System based on Mobile Agents, ACM ACME'04, pp. 185-195, April 2004.
2 National Center for Biotechnology Information, http://www.ncbi.nlm.nih.gov
3 Smith, T.F., Waterman, M.s., Identification of Common Molecular Subsequences, J. Mol. Biol. 147, pp. 195-197, July 1981.   DOI
4 Benjamin, H., Mobile Device Security, ACM InfoSecCD Conference'04, pp. 99-101, September 2004.
5 Dan, B., James, S., Collusion-Secure Fingerprinting for Digital Data, IEEE Transactions on Information Theory, Vol. 44, No. 5, September 1998.
6 Binomial Distribution, http://en.wikipedia.org/wiki/Binomial_distribution
7 Digital Rights Management, http://en.wikipedia.org/wiki/Digital_rights_management
8 Narayanan Shivakuma, Hector Garcia- Molina, "Building a scalable and accurate copy detection mechanism", DL'96 Proceedings of the first ACM international conference on Digital libraries, pp. 160-168, March 1996.
9 Yogesh Prem, S., Hannes, T., Protecting Mobile Devices from TCP Flooding Attacks, ACM mobiarch'06, pp. 63-68, December 2006.
10 Ingemar, J. Ton, K., Georg, P., Information Transmission and Steganography, IWDW 2005, LNCS 3710, pp. 15-29, 2005.
11 Young-guang, Z., Wenke, L., Yi-an, H., Intrusion Detection Technique for Mobile Wireless Networks, ACM MONET, pp. 545-556, November. 2004.
12 David, C., Sebastian, H., Pasquale, M., Quantitative Analysis of the Leakage of Confidential Data, Electronic Notes in Theoretical Computer Science 59 No. 3., November 2003.
13 Christian, C., An Information Theoretic Model for Steganography, Information Hiding 1998, LNCS 1525, pp. 306-318, 1998.
14 Shi, Z., Ji, Z., Hu, M., A Novel Distributed Intrusion Detection Model Based on Mobile Agent, ACM InfoSecu04, pp. 155-159, November 2006.
15 Deepak, V., An Efficient Signature Representation and Matching Method for Mobile Devices, Proceedings of the 2nd annual international workshop on Wireless internet, Vol 220, August 2006.