IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v214y2021ics0951832021002337.html
   My bibliography  Save this article

Ensuring confidentiality and availability of sensitive data over a network system under cyber threats

Author

Listed:
  • Zhang, Xiaoyu
  • Xu, Maochao
  • Da, Gaofeng
  • Zhao, Peng

Abstract

The online storage of sensitive data enjoys many benefits such as flexibility, cost-savings, scalability, and convenience but it also poses a big concern on the data confidentiality and availability. To ensure the confidentiality and availability of sensitive data over a network system, the data partition technique is often employed. We study the optimal data partition strategy over an arbitrary network under cyber threats. Both the outside attack and the risk propagation (i.e., inside attack) are considered for the data partition. The data breach probability and retrieve probability are discussed under both limited and unlimited risk propagation for various scenarios. It is discovered that the risk propagation can have much more impact on the optimal partition strategy than that of outside attacks, and the unlimited risk propagation leads to more severer cyber risk. The network topology significantly impacts the partition strategy which hints that the network topology should never be overlooked in practice. The corruption due to compromise can lead to different partition strategies. An optimal partition model is developed for determining the optimal strategy and the pareto non-dominated solutions are recommended for practical use.

Suggested Citation

  • Zhang, Xiaoyu & Xu, Maochao & Da, Gaofeng & Zhao, Peng, 2021. "Ensuring confidentiality and availability of sensitive data over a network system under cyber threats," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
  • Handle: RePEc:eee:reensy:v:214:y:2021:i:c:s0951832021002337
    DOI: 10.1016/j.ress.2021.107697
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832021002337
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2021.107697?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Heping Jia & Rui Peng & Yi Ding & Changzheng Shao, 2020. "Reliability analysis of distributed storage systems considering data loss and theft," Journal of Risk and Reliability, , vol. 234(2), pages 303-321, April.
    2. Xing, Liudong & Levitin, Gregory, 2017. "Balancing theft and corruption threats by data partition in cloud system with independent server protection," Reliability Engineering and System Safety, Elsevier, vol. 167(C), pages 248-254.
    3. Levitin, Gregory & Xing, Liudong & Dai, Yuanshun, 2018. "Co-residence based data vulnerability vs. security in cloud computing system with random server assignment," European Journal of Operational Research, Elsevier, vol. 267(2), pages 676-686.
    4. Mo, Yuchang & Liu, Yu & Cui, Lirong, 2018. "Performability analysis of multi-state series-parallel systems with heterogeneous components," Reliability Engineering and System Safety, Elsevier, vol. 171(C), pages 48-56.
    5. Chołda, Piotr & Følstad, Eirik L. & Helvik, Bjarne E. & Kuusela, Pirkko & Naldi, Maurizio & Norros, Ilkka, 2013. "Towards risk-aware communications networking," Reliability Engineering and System Safety, Elsevier, vol. 109(C), pages 160-174.
    6. Zhang, Chao & Xu, Xin & Dui, Hongyan, 2020. "Analysis of network cascading failure based on the cluster aggregation in cyber-physical systems," Reliability Engineering and System Safety, Elsevier, vol. 202(C).
    7. Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
    8. Xiang, Yanping & Levitin, Gregory, 2011. "Service task partition and distribution in star topology computer grid subject to data security constraints," Reliability Engineering and System Safety, Elsevier, vol. 96(11), pages 1507-1514.
    9. Luo, Liang & Xing, Liudong & Levitin, Gregory, 2019. "Optimizing dynamic survivability and security of replicated data in cloud systems under co-residence attacks," Reliability Engineering and System Safety, Elsevier, vol. 192(C).
    10. Maochao Xu & Lei Hua, 2019. "Cybersecurity Insurance: Modeling and Pricing," North American Actuarial Journal, Taylor & Francis Journals, vol. 23(2), pages 220-249, April.
    11. Levitin, Gregory & Hausken, Kjell & Taboada, Heidi A. & Coit, David W., 2012. "Data survivability vs. security in information systems," Reliability Engineering and System Safety, Elsevier, vol. 100(C), pages 19-27.
    12. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    13. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Optimal defense of a distributed data storage system against hackers’ attacks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    14. Zhao, Guilin & Xing, Liudong, 2020. "Reliability analysis of IoT systems with competitions from cascading probabilistic function dependence," Reliability Engineering and System Safety, Elsevier, vol. 198(C).
    15. Lisnianski, Anatoly & Ding, Yi, 2009. "Redundancy analysis for repairable multi-state system by using combined stochastic processes methods and universal generating function technique," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1788-1795.
    16. Fu, Xiuwen & Yang, Yongsheng, 2020. "Modeling and analysis of cascading node-link failures in multi-sink wireless sensor networks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    17. Gregory Levitin & Liudong Xing & Hong‐Zhong Huang, 2019. "Security of Separated Data in Cloud Systems with Competing Attack Detection and Data Theft Processes," Risk Analysis, John Wiley & Sons, vol. 39(4), pages 846-858, April.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Raúl M. Falcón & Nagaraj Mohanapriya & Venkitachalam Aparna, 2022. "Optimal Shadow Allocations of Secret Sharing Schemes Arisen from the Dynamic Coloring of Extended Neighborhood Coronas," Mathematics, MDPI, vol. 10(12), pages 1-14, June.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Optimal defense of a distributed data storage system against hackers’ attacks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    2. Levitin, Gregory & Xing, Liudong & Dai, Yanshun, 2021. "Security and reliability of N-version cloud-based task solvers with individual version cancellation under data theft attacks," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    3. Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2020. "Optimal early warning defense of N-version programming service against co-resident attacks in cloud system," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    4. Levitin, Gregory & Xing, Liudong & Dai, Yuanshun, 2022. "Co-residence based data theft game in cloud system with virtual machine replication and cancellation," Reliability Engineering and System Safety, Elsevier, vol. 222(C).
    5. Heping Jia & Rui Peng & Yi Ding & Changzheng Shao, 2020. "Reliability analysis of distributed storage systems considering data loss and theft," Journal of Risk and Reliability, , vol. 234(2), pages 303-321, April.
    6. Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2020. "Optimization of time constrained N-version programming service components with competing task execution and version corruption processes," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    7. Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2021. "Minimization of Expected User Losses Considering Co-resident Attacks in Cloud System with Task Replication and Cancellation," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    8. Luo, Liang & Xing, Liudong & Levitin, Gregory, 2019. "Optimizing dynamic survivability and security of replicated data in cloud systems under co-residence attacks," Reliability Engineering and System Safety, Elsevier, vol. 192(C).
    9. Gregory Levitin & Liudong Xing & Hong‐Zhong Huang, 2019. "Security of Separated Data in Cloud Systems with Competing Attack Detection and Data Theft Processes," Risk Analysis, John Wiley & Sons, vol. 39(4), pages 846-858, April.
    10. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    11. Chen, Yiming & Liu, Yu & Jiang, Tao, 2021. "Optimal maintenance strategy for multi-state systems with single maintenance capacity and arbitrarily distributed maintenance time," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    12. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    13. Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
    14. Dui, Hongyan & Chen, Shuanshuan & Wang, Jia, 2021. "Failure-oriented maintenance analysis of nodes and edges in network systems," Reliability Engineering and System Safety, Elsevier, vol. 215(C).
    15. Fu, Xiuwen & Wang, Ye & Yang, Yongsheng & Postolache, Octavian, 2022. "Analysis on cascading reliability of edge-assisted Internet of Things," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    16. Huang, Wencheng & Zhou, Bowen & Yu, Yaocheng & Sun, Hao & Xu, Pengpeng, 2021. "Using the disaster spreading theory to analyze the cascading failure of urban rail transit network," Reliability Engineering and System Safety, Elsevier, vol. 215(C).
    17. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    18. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    19. Fu, Xiuwen & Li, Qing & Li, Wenfeng, 2023. "Modeling and analysis of industrial IoT reliability to cascade failures: An information-service coupling perspective," Reliability Engineering and System Safety, Elsevier, vol. 239(C).
    20. Gabriel Kuper & Fabio Massacci & Woohyun Shim & Julian Williams, 2020. "Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports," Risk Analysis, John Wiley & Sons, vol. 40(5), pages 1001-1019, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:214:y:2021:i:c:s0951832021002337. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.