Coordination Approach to Mitigate Composition Attack

被引:0
|
作者
Wahida, Farah [1 ]
Sattar, A. H. M. Sarowar [1 ]
Hossain, Md Muktar [1 ]
机构
[1] Rajshahi Univ Engn & Technol, Dept Comp Sci & Engn, Rajshahi, Bangladesh
来源
2020 23RD INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT 2020) | 2020年
关键词
Privacy; Composition Attack; Coordination; Anonymization; PRIVACY;
D O I
10.1109/ICCIT51783.2020.9392661
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data anonymization is one of the primary techniques, which is used in privacy preserving data publishing. Numerous methods have been proposed to anonymize data sets, that are used by different organizations to publish their data sets independently. However, in actuality, a data set is infrequently isolated, and data sets published by multiple organizations may obtain a record of the same person. An individually published data set may have a small privacy risk. However, the combination of two published data sets may breach individuals' privacy, who are common in both data sets by composition attack. A few researches have been carried out to prevent it without considering coordination among multiple organizations before data publishing. Though coordination is an excellent way to avoid such problems, organizations do not want to share their customer data sets with others. In this work, we introduce a coordination method where complete data sharing is not necessary. This will effectively overcome privacy concerns. It has been shown experimentally that the proposed technique anonymizes data set to satisfy the privacy requirement and preserves high data utility.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A DEFENSIVE TIMESTAMP APPROACH TO DETECT AND MITIGATE THE SYBIL ATTACK IN VANET
    Sharma, Shikha
    Sharma, Shivani
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 386 - 389
  • [2] An approach to mitigate wormhole attack in wireless ad hoc networks
    Lee, Gunhee
    Kim, Dong-kyoo
    Seo, Jungtaek
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 220 - +
  • [3] Food and immunity: a pragmatic approach to mitigate corona viruses attack
    Chughtai, Muhammad Farhan Jahangir
    Tanweer, Saira
    Ahsan, Samreen
    Mehmood, Tariq
    Liaqat, Atif
    Khaliq, Adnan
    Zahoor, Tahir
    Nadeem, Muhammad
    Khalid, Nazia
    Zainab, Saadia
    Junaid-ur-Rahman, Syed
    NUTRITION & FOOD SCIENCE, 2022, 52 (02): : 346 - 365
  • [4] How to Mitigate Theme Park Crowding? A Prospective Coordination Approach
    Yuan, Yuguo
    Zheng, Weimin
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2018, 2018
  • [5] A cooperative multilayer end-point approach to mitigate DDoS attack
    Renuka Devi, S.
    Saraswathi, S.
    Yogesh, P.
    1600, World Scientific and Engineering Academy and Society, Ag. Ioannou Theologou 17-23, Zographou, Athens, 15773, Greece (11): : 1 - 11
  • [6] ONOS Flood Defender: An Intelligent Approach to Mitigate DDoS Attack in SDN
    Aslam, Naziya
    Srivastava, Shashank
    Gore, M. M.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (09)
  • [7] A Non-deterministic Approach to Mitigate Replay Attack and Database Attack Simultaneously on Iris Recognition System
    Gupta, Richa
    Sehgal, Priti
    INTELLIGENT HUMAN COMPUTER INTERACTION, 2018, 11278 : 239 - 250
  • [8] A Preventive Approach to Mitigate the Effects of Gray Hole Attack using Genetic Algorithm
    Kaur, Gurleen
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND AUTOMATION (ICACCA 2016), 2016, : 241 - 248
  • [9] To Mitigate Black Hole Attack in AODV
    Kumar, Raushan
    Quyoom, Abdul
    Gouttam, Devki Nandan
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 307 - 311
  • [10] Bayesian game approach to mitigate dos attack in vehicular Ad-Hoc networks
    Anandaraj I.
    Krishnamurthy S.
    Recent Patents on Engineering, 2021, 15 (02) : 150 - 160