[go: up one dir, main page]

Skip to main content

Biometrically Linking Document Leakage to the Individuals Responsible

  • Conference paper
  • First Online:
Trust, Privacy and Security in Digital Business (TrustBus 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11033))

Included in the following conference series:

Abstract

Insider threats are a significant security issue. The last decade has witnessed countless instances of data loss and exposure in which data has become publicly available and easily accessible. Losing or disclosing sensitive data or confidential information may cause substantial financial and reputational damage to a company. Whilst more recent research has specifically focused on the insider misuse problem, it has tended to focus on the information itself – either through its protection or approaches to detect leakage. In contrast, this paper presents a proactive approach to the attribution of misuse via information leakage using biometrics and a locality-sensitive hashing scheme. The hash digest of the object (e.g. a document) is mapped with the given biometric information of the person who interacted with it and generates a digital imprint file that represents the correlation between the two parties. The proposed approach does not directly store or preserve any explicit biometric information nor document copy in a repository. It is only the established correlation (imprint) is kept for the purpose of reconstructing the mapped information once an incident occurred. Comprehensive experiments for the proposed approach have shown that it is highly possible to establish this correlation even when the original version has undergone significant file modification. In many scenarios, such as changing the file format r removing parts of the document, including words and sentences, it was possible to extract and reconstruct the correlated biometric information out of a modified document (e.g. 100 words were deleted) with an average success rate of 89.31%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Titcomb, J.: WikiLeaks releases thousands of hacked Macron campaign emails (2017). http://www.telegraph.co.uk/news/2017/07/31/wikileaks-releases-thousands-hacked-macron-campaign-emails/. Accessed 07 Sept 2017

  2. WikiLeaks publishes ‘biggest ever leak of secret CIA documents’ (2017). https://www.theguardian.com/media/2017/mar/07/wikileaks-publishes-biggest-ever-leak-of-secret-cia-documents-hacking-surveillance. Accessed 09 Sept 2017

  3. Moshinsky, B.: LEAKED DOCUMENT: Bank of England has ‘significant concern’ over post-Brexit approval for Deutsche Bank’s UK branch (2017). http://uk.businessinsider.com/bank-of-england-document-deutsche-bank-post-brexit-uk-2017-8. Accessed 07 Sept 2017

  4. Rahayu Selamat, S., Sahib, S., Hafeizah, N., Yusof, R., Faizal Abdollah, M.: A forensic traceability index in digital forensic investigation. J. Inf. Secur. 4(1), 19–32 (2013)

    Google Scholar 

  5. Homem, I., Dosis, S., Popov, O.: LEIA: the live evidence information aggregator: towards efficient cyber-law enforcement. In: World Congress on Internet Security (WorldCIS-2013), pp. 156–161 (2013)

    Google Scholar 

  6. Magklaras, G., Furnell, S., Papadaki, M.: LUARM – an audit engine for insider misuse detection. Int. J. Digit. Crime Forensics 3(3), 37–49 (2011)

    Article  Google Scholar 

  7. Homem, I., Dosis, S., Popov, O.: The network factor in proactive digital evidence acquisition. Int. J. Intell. Comput. Res. 6(1), 517–526 (2015)

    Article  Google Scholar 

  8. Quick, D., Choo, K.-K.R.: Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata? Digit. Investig. 10(3), 266–277 (2013)

    Article  Google Scholar 

  9. Pilli, E.S., Joshi, R.C., Niyogi, R.: Network forensic frameworks: survey and research challenges. Digit. Invest. 7(1–2), 14–27 (2010)

    Article  Google Scholar 

  10. Khan, S., Gani, A., Wahab, A.W.A., Shiraz, M., Ahmad, I.: Network forensics: review, taxonomy, and open challenges. J. Netw. Comput. Appl. 66, 214–235 (2016)

    Article  Google Scholar 

  11. Birk, D., Wegener, C.: Technical issues of forensic investigations in cloud computing environments. In: 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 1–10 (2011)

    Google Scholar 

  12. Hashem, Y., Takabi, H., GhasemiGol, M., Dantu, R.: Towards insider threat detection using psychophysiological signals. In: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats - MIST 2015, vol. 6, no. 1, pp. 71–74 (2015)

    Google Scholar 

  13. Almehmadi, A., El-Khatib, K.: On the possibility of insider threat detection using physiological signal monitoring. In: Proceedings of the 7th International Conference on Security of Information and Networks - SIN 2014, pp. 223–230 (2014)

    Google Scholar 

  14. Bouslimi, D., Coatrieux, G.: A crypto-watermarking system for ensuring reliability control and traceability of medical images. Sig. Process. Image Commun. 47, 160–169 (2016)

    Article  Google Scholar 

  15. Chaabane, F., Charfeddine, M., Ben Amar, C.: A survey on digital tracing traitors schemes. In: 2013 9th International Conference on Information Assurance and Security (IAS), pp. 85–90 (2013)

    Google Scholar 

  16. Macq, B., Alface, P.R., Montanola, M.: Applicability of watermarking for intellectual property rights protection in a 3D printing scenario. In: Proceedings of the 20th International Conference on 3D Web Technology - Web3D 2015, pp. 89–95 (2015)

    Google Scholar 

  17. Alruban, A., Clarke, N., Li, F., Furnell, S.: Insider misuse attribution using biometrics. In: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES 2017, pp. 1–7 (2017)

    Google Scholar 

  18. Oliver, J., Cheng, C., Chen, Y.: TLSH – a locality sensitive hash. In: 2013 Fourth Cybercrime and Trustworthy Computing Workshop, pp. 7–13, November 2013

    Google Scholar 

  19. Kornblum, J.: Identifying almost identical files using context triggered piecewise hashing. Digit. Investig. 3(SUPPL), 91–97 (2006)

    Article  Google Scholar 

  20. Roussev, V.: Data fingerprinting with similarity digests. In: Chow, K.-P., Shenoi, S. (eds.) DigitalForensics 2010. IAICT, vol. 337, pp. 207–226. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15506-2_15

    Chapter  Google Scholar 

  21. Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P.: An open digest-based technique for spam detection. In: Proceedings of 2004 International Workshop Security in Parallel and Distributed Systems, vol. 1, no. 1, pp. 559–564 (2004)

    Google Scholar 

  22. Oliver, J., Forman, S., Cheng, C.: Using randomization to attack similarity digests. In: Batten, L., Li, G., Niu, W., Warren, M. (eds.) ATIS 2014. CCIS, vol. 490, pp. 199–210. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45670-5_19

    Chapter  Google Scholar 

  23. WikiLeaks. https://wikileaks.org. Accessed 05 Sept 2017

  24. A billion in secret Congressional reports (2009). https://wikileaks.org/wiki/Change_you_can_download:_a_billion_in_secret_Congressional_reports. Accessed 04 Sept 2017

  25. The Intercept. https://theintercept.com/. Accessed 05 Sept 2017

  26. Belhumeur, P.N., Hespanha, J.P., Kriegman, D.J.: Eigenfaces vs. fisherfaces: recognition using class specific linear projection. IEEE Trans. Pattern Anal. Mach. Intell. 19(7), 711–720 (1997)

    Article  Google Scholar 

  27. Smith, R.: An overview of the tesseract OCR engine. In: Ninth International Conference on Document Analysis and Recognition (ICDAR 2007), vol. 2, pp. 629–633 (2007)

    Google Scholar 

Download references

Acknowledgements

This research was undertaken with the support of the Majmaah University, Majmaah city, Saudi Arabia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdulrahman Alruban .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alruban, A., Clarke, N., Li, F., Furnell, S. (2018). Biometrically Linking Document Leakage to the Individuals Responsible. In: Furnell, S., Mouratidis, H., Pernul, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2018. Lecture Notes in Computer Science(), vol 11033. Springer, Cham. https://doi.org/10.1007/978-3-319-98385-1_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-98385-1_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-98384-4

  • Online ISBN: 978-3-319-98385-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics