Anonymization of Network Traces Data through Condensation-based Differential Privacy

被引:4
|
作者
Aleroud A. [1 ,3 ]
Yang F. [2 ]
Pallaprolu S.C. [2 ]
Chen Z. [2 ]
Karabatis G. [2 ]
机构
[1] School of Computer and Cyber Sciences, Augusta University, 2500 Walton Way, Augusta, 30904, GA
[2] Department of Information Systems, University of Maryland, Baltimore, 21250, MD
[3] Augusta University, GA
来源
Digital Threats: Research and Practice | 2021年 / 2卷 / 04期
关键词
Data Injection attacks; differential privacy; information security; intrusion detection; netflow; semantic link network; trace anonymization;
D O I
10.1145/3425401
中图分类号
学科分类号
摘要
Network traces are considered a primary source of information to researchers, who use them to investigate research problems such as identifying user behavior, analyzing network hierarchy, maintaining network security, classifying packet flows, and much more. However, most organizations are reluctant to share their data with a third party or the public due to privacy concerns. Therefore, data anonymization prior to sharing becomes a convenient solution to both organizations and researchers. Although several anonymization algorithms are available, few of them allow sufficient privacy (organization need), acceptable data utility (researcher need), and efficient data analysis at the same time. This article introduces a condensation-based differential privacy anonymization approach that achieves an improved tradeoff between privacy and utility compared to existing techniques and produces anonymized network trace data that can be shared publicly without lowering its utility value. Our solution also does not incur extra computation overhead for the data analyzer. A prototype system has been implemented, and experiments have shown that the proposed approach preserves privacy and allows data analysis without revealing the original data even when injection attacks are launched against it. When anonymized datasets are given as input to graph-based intrusion detection techniques, they yield almost identical intrusion detection rates as the original datasets with only a negligible impact. © 2021 Association for Computing Machinery.
引用
收藏
相关论文
共 50 条
  • [31] Data Level Privacy Preserving: A Stochastic Perturbation Approach Based on Differential Privacy
    Ma, Chuan
    Yuan, Long
    Han, Li
    Ding, Ming
    Bhaskar, Raghav
    Li, Jun
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (04) : 3619 - 3631
  • [32] Information entropy differential privacy: A differential privacy protection data method based on rough set theory
    Li, Xianxian
    Luo, Chunfeng
    Liu, Peng
    Wang, Li-E
    IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 918 - 923
  • [33] An Effective Data Privacy Protection Algorithm Based on Differential Privacy in Edge Computing
    Qiao, Yi
    Liu, Zhaobin
    Lv, Haoze
    Li, Minghui
    Huang, Zhiyi
    Li, Zhiyang
    Liu, Weijiang
    IEEE ACCESS, 2019, 7 : 136203 - 136213
  • [34] A differential approach and deep neural network based data privacy-preserving model in cloud environment
    Gupta R.
    Gupta I.
    Saxena D.
    Singh A.K.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (05) : 4659 - 4674
  • [35] Equivalent mechanism: Releasing location data with errors through differential privacy
    Wang, Tao
    Zheng, Zhigao
    Elhoseny, Mohamed
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 98 : 600 - 608
  • [36] Differential Privacy Images Protection Based on Generative Adversarial Network
    Yang, Ren
    Ma, Xuebin
    Bai, Xiangyu
    Su, Xiangdong
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1688 - 1695
  • [37] Blockchain and differential privacy-based data processing system for data security and privacy in urban computing
    Heo, Gabin
    Doh, Inshil
    COMPUTER COMMUNICATIONS, 2024, 222 : 161 - 176
  • [38] Personal big data pricing method based on differential privacy
    Shen, Yuncheng
    Guo, Bing
    Shen, Yan
    Duan, Xuliang
    Dong, Xiangqian
    Zhang, Hong
    Zhang, Chuanwu
    Jiang, Yuming
    COMPUTERS & SECURITY, 2022, 113
  • [39] Federated Data Integration for Heterogeneous Partitions Based on Differential Privacy
    Huang, Jinghao
    Sang, Yingpeng
    Cai, Chaoxin
    Li, Weizheng
    Zhang, Maliang
    PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT 2021, 2022, 13148 : 568 - 575
  • [40] Research on Government Data Publishing Based on Differential Privacy Model
    Piao, Chunhui
    Shi, Yajuan
    Zhang, Yunzuo
    Jiang, Xuehong
    2017 IEEE 14TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE 2017), 2017, : 76 - 83