Download presentation
Presentation is loading. Please wait.
1
Offline Auditing for Privacy
17/09/2018 Offline Auditing for Privacy Jeff Dwoskin, Bill Horne, Tomas Sander Trusted Systems Laboratory Princeton HP_presentation_template
2
Why Auditing for Privacy?
Potential advantages Collect and analyze log data to detect privacy violations offline May also work where enforcement doesn’t Create trail of what happened to privacy sensitive data for Documentation Forensics Demonstrate compliance with internal privacy policy Watch the watchers 17 September 2018
3
Two challenges How can we audit for the benefit of privacy?
Privacy violation detection system functionality Compliance functionality How can auditing itself be performed in a privacy-friendly and secure way. Integrity Encrypted storage Pseudonymization and anonymization of audit file data Etc. 17 September 2018
4
What can we collect? Data access Privacy sensitive activities
User, Application, Time, Data record accessed Source E.g. machine the request came from, internal/external etc. Part of the data record itself E.g. age of data record subject Consent information present Opt in, opt out Privacy sensitive activities Deletion of records Consequences e.g. alert issued, where enforcement inappropriate 17 September 2018
5
How can we analyze collected data?
Against simple privacy policy rules (e.g., expressed in languages like EPAL) Have counters and collect statistics about behaviors that might be suspicious. Organize them into reports. Hope: Offline auditing can be more sophisticated due to lack of real-time requirements. 17 September 2018
6
What does HIPAA say about auditing?
We propose that audit control mechanisms be put in place to record and examine system activity. We adopt this requirement in the final rule. 17 September 2018
7
How is this interpreted?
Create events creation of records that contain PHI import of records that contain PHI Modify events editing of data re-association of data de-identifying of PHI View events access to PHI by any user export of PHI to digital media or network print or FAX of PHI Delete events user command to delete PHI automated command to delete PHI Non-PHI events user login & logout changes to user accounts detection of a virus network link failures changes to network security configuration etc.. 17 September 2018
8
What kinds of things might you look for?
access to PHI by anyone not directly related to the patients treatment, payment of healthcare operation access to information not corresponding to the role of the user access to PHI of VIPs or community figures access to records that have not been accessed in a long time access to PHI of an employee access to PHI or a terminated employee access to sensitive records such as psychiatric records access to PHI of minors data recorded without a corresponding order 17 September 2018
9
Pseudonymization Work by Flegel:
17/09/2018 Pseudonymization Work by Flegel: Audit data is intercepted by a local pseudonymiser and then forwarded by syslog to remote hosts or stored Pseudonymiser substitutes (predefined) identifying features (types of identifying info) by shares, generated via Shamir’s secret sharing scheme. Record encrypted under key K. K can be reconstructed if at least k shares are found. 17 September 2018 HP_presentation_template
10
Further work on pseudonymization
17/09/2018 Further work on pseudonymization Anonymouse log file anonymiser: analysis possible, but anonymised data cannot be recovered Privacy enhanced IDS supports the recovery of pseudonymised info e.g. IDA, AID Anonymouse log file anonymiser [Eckert & Pircher] is a customisable Perl script that anonymises all privacy critical data in log files in such a way that they may still be analysed, but the anonymised data cannot be recovered. IDA (Intrusion Detection and Avoidance) prototype pseudonymises the subject fields within audit records by encryption. AID (Adaptive Intrusion Detection) system uses encryption by a secret (shared) key for the pseudonymisation process; this key is changed from time to time. 17 September 2018 HP_presentation_template
11
Searching encrypted log data
Ex: public key based solutions: IBE based solutions Waters, Balfanz, Durfee, Smetters Boneh, Crescenszo, Ostrovsky,Persiano Idea: In Identity Based Encryption (IBE) every string can be used as a public key for encryption Corresponding decryption key supplied by key distribution center (KDC) 17 September 2018
12
Searching Encrypted Log Files II
Encryption: For each document m choose random sym. key K and encrypt m under K For keywords w1,….wl in m encrypt (FLAG, K) with public keys w1...wl. Store results c1, …cl with encrypted document. Keyword search: For keyword w investigator request private key corresponding to w from KDC For each doc m investigator attempts decryption of c1…cl If FLAG is found, doc contains w and K is found. 17 September 2018
13
17/09/2018 HP_presentation_template
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.