Tracing the diffusion of classified information triggered by file open system call

Yoshinari Nomura, Satoshi Hakomori, Kazutoshi Yokoyama, Hideo Taniguchi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Recently, leakage of classified information such as personal information has become serious problem. To prevent the leakage, it is important to know how the information diffuses in a computer system. In this paper, we propose a method for tracing the diffusion of the classified information. We assumed that the classified information exists in a set of files on a file system. These files will be diffused by processes (programs). Once a process touched any classified file, it becomes a suspicious carrier process. The carrier process will make other classified files. Therefore, to keep track of the diffusion, we have to watch all processes to see if they touch any classified files. That is, we have to insert some probes into an operating system to watch file manipulation system-calls of processes such as OPEN and CLOSE. We describe the algorithm of the method and an implementation of the method on the Linux kernel. We also show that the performance of our implementation is efficient.

Original languageEnglish
Title of host publicationCITSA 2006 - 3rd Int. Conf. on Cybernetics and Information Technol., Systems and Applications, Jointly with the 4th Int. Conf. on Computing, Communications and Control Technologies, CCCT 2006 - Proc.
PublisherInternational Institute of Informatics and Systemics, IIIS
Pages312-317
Number of pages6
ISBN (Print)9806560841, 9789806560840
Publication statusPublished - Jan 1 2006
Event3rd International Conference on Cybernetics and Information Technologies, Systems and Applications, CITSA 2006, Jointly with the 4th International Conference on Computing, Communications and Control Technologies, CCCT 2006 - Orlando, FL, United States
Duration: Jul 20 2006Jul 23 2006

Publication series

NameCITSA 2006 - 3rd Int. Conf. on Cybernetics and Information Technol., Systems and Applications, Jointly with the 4th Int. Conf. on Computing, Communications and Control Technologies, CCCT 2006 - Proc.
Volume2

Other

Other3rd International Conference on Cybernetics and Information Technologies, Systems and Applications, CITSA 2006, Jointly with the 4th International Conference on Computing, Communications and Control Technologies, CCCT 2006
Country/TerritoryUnited States
CityOrlando, FL
Period7/20/067/23/06

Keywords

  • Diffusion of classified information
  • Operating system
  • Security
  • System software

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems

Fingerprint

Dive into the research topics of 'Tracing the diffusion of classified information triggered by file open system call'. Together they form a unique fingerprint.

Cite this