1. Ensuring confidentiality and availability of sensitive data over a network system under cyber threats
- Author
-
Gaofeng Da, Peng Zhao, Xiaoyu Zhang, and Maochao Xu
- Subjects
Flexibility (engineering) ,021110 strategic, defence & security studies ,021103 operations research ,Computer science ,0211 other engineering and technologies ,Pareto principle ,02 engineering and technology ,Data breach ,Computer security ,computer.software_genre ,Network topology ,Partition (database) ,Industrial and Manufacturing Engineering ,Scalability ,Confidentiality ,Safety, Risk, Reliability and Quality ,computer ,Cyber threats - Abstract
The online storage of sensitive data enjoys many benefits such as flexibility, cost-savings, scalability, and convenience but it also poses a big concern on the data confidentiality and availability. To ensure the confidentiality and availability of sensitive data over a network system, the data partition technique is often employed. We study the optimal data partition strategy over an arbitrary network under cyber threats. Both the outside attack and the risk propagation (i.e., inside attack) are considered for the data partition. The data breach probability and retrieve probability are discussed under both limited and unlimited risk propagation for various scenarios. It is discovered that the risk propagation can have much more impact on the optimal partition strategy than that of outside attacks, and the unlimited risk propagation leads to more severer cyber risk. The network topology significantly impacts the partition strategy which hints that the network topology should never be overlooked in practice. The corruption due to compromise can lead to different partition strategies. An optimal partition model is developed for determining the optimal strategy and the pareto non-dominated solutions are recommended for practical use.
- Published
- 2021