Coordination Approach to Mitigate Composition Attack

被引:0
|
作者
Wahida, Farah [1 ]
Sattar, A. H. M. Sarowar [1 ]
Hossain, Md Muktar [1 ]
机构
[1] Rajshahi Univ Engn & Technol, Dept Comp Sci & Engn, Rajshahi, Bangladesh
来源
2020 23RD INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT 2020) | 2020年
关键词
Privacy; Composition Attack; Coordination; Anonymization; PRIVACY;
D O I
10.1109/ICCIT51783.2020.9392661
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data anonymization is one of the primary techniques, which is used in privacy preserving data publishing. Numerous methods have been proposed to anonymize data sets, that are used by different organizations to publish their data sets independently. However, in actuality, a data set is infrequently isolated, and data sets published by multiple organizations may obtain a record of the same person. An individually published data set may have a small privacy risk. However, the combination of two published data sets may breach individuals' privacy, who are common in both data sets by composition attack. A few researches have been carried out to prevent it without considering coordination among multiple organizations before data publishing. Though coordination is an excellent way to avoid such problems, organizations do not want to share their customer data sets with others. In this work, we introduce a coordination method where complete data sharing is not necessary. This will effectively overcome privacy concerns. It has been shown experimentally that the proposed technique anonymizes data set to satisfy the privacy requirement and preserves high data utility.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] A Novel k-Anonymization Approach to Prevent Insider Attack in Collaborative Social Network Data Publishing
    Kadhiwala, Bintu
    Patel, Sankita J.
    INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 255 - 275
  • [32] Convergence and coordination in the EU: A dynamic games approach
    Douven, RC
    Plasmans, JEJ
    CONTROL ENGINEERING PRACTICE, 1997, 5 (04) : 561 - 566
  • [33] A generic coordination approach applied to a manufacturing environment
    Coates, G
    Duffy, AHB
    Hills, W
    Whitfield, RI
    JOURNAL OF MATERIALS PROCESSING TECHNOLOGY, 2000, 107 (1-3) : 404 - 411
  • [34] An Adaptive Approach for the Coordination of Autonomous Vehicles at Intersections
    Glorio, Nicholas
    Mariani, Stefano
    Cabri, Giacomo
    Zambonelli, Franco
    2021 IEEE 30TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE 2021), 2021, : 1 - 6
  • [35] An Approach to Mitigate the Impact of Distributed Generation on the Overcurrent Protection Scheme for Radial Feeders
    Funmilayo, Hamed B.
    Butler-Purry, Karen L.
    2009 IEEE/PES POWER SYSTEMS CONFERENCE AND EXPOSITION, VOLS 1-3, 2009, : 1939 - 1949
  • [36] Toward Design of an Intelligent Cyber Attack Detection System using Hybrid Feature Reduced Approach for IoT Networks
    Kumar, Prabhat
    Gupta, Govind P.
    Tripathi, Rakesh
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (04) : 3749 - 3778
  • [37] The Network Signal Setting Problem: the Coordination approach vs. the Synchronisation approach
    Cantarella, Giulio Erberto
    Di Pace, Roberta
    Memoli, Silvio
    de Luca, Stefano
    UKSIM-AMSS 15TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM 2013), 2013, : 575 - 579
  • [38] Semantic approach to RIoT autonomous robots mission coordination
    Nejkovic, Valentina
    Petrovic, Nenad
    Tosic, Milorad
    Milosevic, Nenad
    ROBOTICS AND AUTONOMOUS SYSTEMS, 2020, 126
  • [39] Care and Coordination in Algorithmic Systems: An Economies of Worth Approach
    Rudnik, John
    Brewer, Robin
    PROCEEDINGS OF THE 6TH ACM CONFERENCE ON FAIRNESS, ACCOUNTABILITY, AND TRANSPARENCY, FACCT 2023, 2023, : 627 - 638