Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3195258.3195262acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

Challenges for the design of a privacy-preserving, multi-domain telemetry system for widely-spread network security appliances

Published: 23 April 2018 Publication History
First page of PDF

References

[1]
L. Andrey, O. Festor, A. Lahmadi, A. Pras, and J. Schönwälder. Survey of SNMP performance analysis studies. International journal of network management, 19 (6):527--548, 2009.
[2]
Barracuda Networks. Telemetry Data. Technical documentation. Last visited on 01/26/18.
[3]
M. Burkhart. Enabling collaborative network security with privacy-preserving data aggregation. PhD thesis, ETH Zurich, 2011.
[4]
S. S. Chow, J.-H. Lee, and L. Subramanian. Two-party computation model for privacy-preserving queries over distributed databases. In NDSS, 2009.
[5]
S. E. Coull, F. Monrose, M. K. Reiter, and M. Bailey. The challenges of effectively anonymizing network data. In CATCH, 2009.
[6]
G. Danezis, J. Domingo-Ferrer, M. Hansen, J.-H. Hoepman, D. L. Metayer, R. Tirtea, and S. Schiffner. Privacy and data protection by design-from policy to engineering. Technical report, ENISA, 2015.
[7]
J. M. de Fuentes, L. González-Manzano, J. Tapiador, and P. Peris-Lopez. PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing. Computers & Security, 2016.
[8]
C. Dwork. Differential privacy: A survey of results. In TAMC. Springer, 2008.
[9]
D. Gavalas, G. E. Tsekouras, and C. Anagnostopoulos. A mobile agent platform for distributed network and systems management. Journal of Systems and Software, 82(2):355--371, 2009.
[10]
K. V. Jónsson, G. Kreitz, and M. Uddin. Secure multi-party sorting and applications. IACR Cryptology ePrint Archive, 2011:122, 2011.
[11]
N. M. Karnik and A. R. Tripathi. Design issues in mobile agent programming systems. IEEE concurrency, 6(3):52--61, 1998.
[12]
G. Kreitz, M. Dam, and D. Wikström. Practical private information aggregation in large networks. In NordSec, volume 7127, pages 89--103. Springer, 2010.
[13]
G. Meng, Y. Liu, J. Zhang, A. Pokluda, and R. Boutaba. Collaborative security: A survey and taxonomy. ACM Computing Surveys (CSUR), 48(1):1, 2015.
[14]
P. Ohm. Broken promises of privacy: Responding to the surprising failure of anonymization. 2009.
[15]
Palo Alto. Telemetry and Threat Intelligence Sharing. Technical documentation. Last visited on 01/26/18.
[16]
E. I. Papagiannakopoulou, M. N. Koukovini, G. V. Lioudakis, J. Garcia-Alfaro, D. I. Kaklamani, I. S. Venieris, F. Cuppens, and N. Cuppens-Boulahia. A privacy-aware access control model for distributed network monitoring. Computers & Electrical Engineering, 39(7):2263--2281, 2013.
[17]
D. P. Team. Learning with privacy at scale. Technical report, Apple, 2017.
[18]
C. Wagner, A. Dulaunoy, G. Wagener, and A. Iklody. MISP: The design and implementation of a collaborative threat intelligence sharing platform. In WISCS. ACM, 2016.
  1. Challenges for the design of a privacy-preserving, multi-domain telemetry system for widely-spread network security appliances

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      W-P2DS'18: Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems
      April 2018
      39 pages
      ISBN:9781450356541
      DOI:10.1145/3195258
      © 2018 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 23 April 2018

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      EuroSys '18
      Sponsor:
      EuroSys '18: Thirteenth EuroSys Conference 2018
      April 23 - 26, 2018
      Porto, Portugal

      Upcoming Conference

      EuroSys '25
      Twentieth European Conference on Computer Systems
      March 30 - April 3, 2025
      Rotterdam , Netherlands

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 143
        Total Downloads
      • Downloads (Last 12 months)42
      • Downloads (Last 6 weeks)26
      Reflects downloads up to 16 Oct 2024

      Other Metrics

      Citations

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media