Coordination Approach to Mitigate Composition Attack

被引:0
|
作者
Wahida, Farah [1 ]
Sattar, A. H. M. Sarowar [1 ]
Hossain, Md Muktar [1 ]
机构
[1] Rajshahi Univ Engn & Technol, Dept Comp Sci & Engn, Rajshahi, Bangladesh
来源
2020 23RD INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT 2020) | 2020年
关键词
Privacy; Composition Attack; Coordination; Anonymization; PRIVACY;
D O I
10.1109/ICCIT51783.2020.9392661
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data anonymization is one of the primary techniques, which is used in privacy preserving data publishing. Numerous methods have been proposed to anonymize data sets, that are used by different organizations to publish their data sets independently. However, in actuality, a data set is infrequently isolated, and data sets published by multiple organizations may obtain a record of the same person. An individually published data set may have a small privacy risk. However, the combination of two published data sets may breach individuals' privacy, who are common in both data sets by composition attack. A few researches have been carried out to prevent it without considering coordination among multiple organizations before data publishing. Though coordination is an excellent way to avoid such problems, organizations do not want to share their customer data sets with others. In this work, we introduce a coordination method where complete data sharing is not necessary. This will effectively overcome privacy concerns. It has been shown experimentally that the proposed technique anonymizes data set to satisfy the privacy requirement and preserves high data utility.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A probabilistic approach to mitigate composition attacks on privacy in non-coordinated environments
    Sattar, A. H. M. Sarowar
    Li, Jiuyong
    Liu, Jixue
    Heatherly, Raymond
    Malin, Bradley
    KNOWLEDGE-BASED SYSTEMS, 2014, 67 : 361 - 372
  • [2] A Non-deterministic Approach to Mitigate Replay Attack and Database Attack Simultaneously on Iris Recognition System
    Gupta, Richa
    Sehgal, Priti
    INTELLIGENT HUMAN COMPUTER INTERACTION, 2018, 11278 : 239 - 250
  • [3] Composition attack against social network data
    Medkova, Jana
    COMPUTERS & SECURITY, 2018, 74 : 115 - 129
  • [4] A Noise Parameter Configuration Technique to Mitigate Detour Inference Attack on Differential
    Jung, Taebo
    Jung, Kangsoo
    Park, Sehwa
    Park, Seog
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2017, : 186 - 192
  • [5] A hybrid approach to prevent composition attacks for independent data releases
    Li, Jiuyong
    Baig, Muzammil M.
    Sattar, A. H. M. Sarowar
    Ding, Xiaofeng
    Liu, Jixue
    Vincent, Millist W.
    INFORMATION SCIENCES, 2016, 367 : 324 - 336
  • [6] A deep learning based intelligent framework to mitigate DDoS attack in fog environment
    Priyadarshini, Rojalina
    Barik, Rabindra Kumar
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (03) : 825 - 831
  • [7] Prevention of Traffic Analysis Attack in Friend in the Middle using Dummy Traffic Approach
    Sharma, Mansi
    Mishra, Nishchol
    Sharma, Sanjeev
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 62 - 69
  • [8] Interactions between dynamic team composition and coordination: an agent-based modeling approach
    Blanco-Fernandez, Dario
    Leitner, Stephan
    Rausch, Alexandra
    REVIEW OF MANAGERIAL SCIENCE, 2025, 19 (01) : 1 - 37
  • [9] DDOS attack prevention and validation with metric based ensemble approach
    Dogra, Amit
    Taqdir
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (28) : 44147 - 44154
  • [10] An Attack Tree Based Risk Evaluation Approach For The Internet of Things
    Asif, Waqar
    Ray, Indranil Ghosh
    Rajarajan, Muttukrishnan
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS (IOT'18), 2018,