SUHDSA: Secure, Useful, and High-Performance Data Stream Anonymization

被引:0
作者
Joo, Yongwan [1 ]
Kim, Soonseok [2 ]
机构
[1] Gangneung Wonju Natl Univ, Ind Univ Cooperat Fdn, Wonju 26403, South Korea
[2] Halla Univ, Dept AI Informat Secur, Wonju 26464, South Korea
关键词
Data privacy; Real-time systems; Information integrity; Information filtering; Delays; Clustering algorithms; Security; Data models; Runtime; Protection; Anonymization; privacy; real-time stream data; utility; RENYI DIVERGENCE; MODEL;
D O I
10.1109/TKDE.2024.3476684
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This study addresses privacy concerns in real-time streaming data, including personal biometric signals and private information from sources such as real-time crime reporting, online sales transactions, and hospital patient-monitoring devices. Anonymization is crucial because it hides sensitive personal data. Achieving anonymity in real-time streaming data involves satisfying the unique demands of real-time scenarios, which is distinct from traditional methods. Specifically, security and minimal information loss must be maintained within a specified timeframe (referred to as the average delay time). The most recent solution in this context is the utility-based approach to data stream anonymization (UBDSA) algorithm developed by Sopaoglu and Abul. This study aims to enhance the performance of UBDSA by introducing a secure, useful, and high-performance data stream anonymization (SUHDSA) algorithm. SUHDSA outperforms UBDSA in terms of runtime and information loss while still ensuring privacy protection and an average delay time. The experimental results, using the same dataset and cluster size as in a previous UBDSA study, demonstrate significant performance improvements with the proposed algorithm. It achieves a minimum runtime of 24.05 s and a maximum runtime of 29.88 s, with information loss rates ranging from 14% to 77%. These results surpass the performance of the previous UBDSA algorithm.
引用
收藏
页码:9336 / 9347
页数:12
相关论文
共 50 条
  • [21] Lightning: Utility-Driven Anonymization of High-Dimensional Data
    Prasser, Fabian
    Bild, Raffael
    Eicher, Johanna
    Spengler, Helmut
    Kohlmayer, Florian
    Kuhn, Klaus A.
    [J]. TRANSACTIONS ON DATA PRIVACY, 2016, 9 (02) : 161 - 185
  • [22] Representing a Model for the Anonymization of Big Data Stream Using In-Memory Processing
    Shamsinejad E.
    Banirostam T.
    Pedram M.M.
    Rahmani A.M.
    [J]. Annals of Data Science, 2025, 12 (1) : 223 - 252
  • [23] Sequre: a high-performance framework for rapid development of secure bioinformatics pipelines
    Smajlovic, Haris
    Shajii, Ariya
    Berger, Bonnie
    Cho, Hyunghoon
    Numanagic, Ibrahim
    [J]. 2022 IEEE 36TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW 2022), 2022, : 164 - 165
  • [24] A High-Performance and Secure TRNG Based on Chaotic Cellular Automata Topology
    Luo, Yukui
    Wang, Wenhao
    Best, Scott
    Wang, Yanzhi
    Xu, Xiaolin
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2020, 67 (12) : 4970 - 4983
  • [25] Randomization for Safer, more Reliable and Secure, High-Performance Automotive Processors
    Trilla, David
    Cazorla, Francisco J.
    Hernandez, Carles
    Abella, Jaume
    [J]. IEEE DESIGN & TEST, 2019, 36 (06) : 39 - 47
  • [26] A secure Web application providing public access to high-performance data intensive scientific resources - ScalaBLAST Web Application
    Curtis, Darren
    Peterson, Elena
    Oehmen, Christopher
    [J]. WEBIST 2008: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, 2008, : 244 - 251
  • [27] On the identity anonymization of high-dimensional rating data
    Sun, Xiaoxun
    Wang, Hua
    Zhang, Yanchun
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (10) : 1108 - 1122
  • [28] Adaptive Utility-based Anonymization Model: Performance Evaluation on Big Data Sets
    Panackal, Jisha Jose
    Pillai, Anitha S.
    [J]. BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 : 347 - 352
  • [29] Artificial intelligence and secure use of health data in the KI-FDZ project: anonymization, synthetization, and secure processing of real-world data
    Prasser, Fabian
    Riedel, Nico
    Wolter, Steven
    Corr, Doerte
    Ludwig, Marion
    [J]. BUNDESGESUNDHEITSBLATT-GESUNDHEITSFORSCHUNG-GESUNDHEITSSCHUTZ, 2024, 67 (02) : 171 - 179
  • [30] CephArmor: A Lightweight Cryptographic Interface for Secure High-Performance Ceph Storage Systems
    Khoda Parast, Fatemeh
    Kelly, Brett
    Hakak, Saqib
    Wang, Yang
    Kent, Kenneth B.
    [J]. IEEE ACCESS, 2022, 10 : 127911 - 127927