Coordination Approach to Mitigate Composition Attack

被引:0
|
作者
Wahida, Farah [1 ]
Sattar, A. H. M. Sarowar [1 ]
Hossain, Md Muktar [1 ]
机构
[1] Rajshahi Univ Engn & Technol, Dept Comp Sci & Engn, Rajshahi, Bangladesh
来源
2020 23RD INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT 2020) | 2020年
关键词
Privacy; Composition Attack; Coordination; Anonymization; PRIVACY;
D O I
10.1109/ICCIT51783.2020.9392661
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data anonymization is one of the primary techniques, which is used in privacy preserving data publishing. Numerous methods have been proposed to anonymize data sets, that are used by different organizations to publish their data sets independently. However, in actuality, a data set is infrequently isolated, and data sets published by multiple organizations may obtain a record of the same person. An individually published data set may have a small privacy risk. However, the combination of two published data sets may breach individuals' privacy, who are common in both data sets by composition attack. A few researches have been carried out to prevent it without considering coordination among multiple organizations before data publishing. Though coordination is an excellent way to avoid such problems, organizations do not want to share their customer data sets with others. In this work, we introduce a coordination method where complete data sharing is not necessary. This will effectively overcome privacy concerns. It has been shown experimentally that the proposed technique anonymizes data set to satisfy the privacy requirement and preserves high data utility.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] A service governance and isolation based approach to mitigate internal collateral damages in cloud caused by DDoS attack
    Priyanka Verma
    Shashikala Tapaswi
    W. Wilfred Godfrey
    Wireless Networks, 2021, 27 : 2529 - 2548
  • [22] A service governance and isolation based approach to mitigate internal collateral damages in cloud caused by DDoS attack
    Verma, Priyanka
    Tapaswi, Shashikala
    Godfrey, W. Wilfred
    WIRELESS NETWORKS, 2021, 27 (04) : 2529 - 2548
  • [23] A coordination-theoretic modeling approach for web service composition
    Qian, Meng
    Liu, Zhong
    Yao, Li
    Zhang, Wei-Ming
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1553 - 1559
  • [24] Mitigate Data Poisoning Attack by Partially Federated Learning
    Dam, Khanh Huu The
    Legay, Axel
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [25] A Survey of Ransomware as a Service (RaaS) and Methods to Mitigate the Attack
    Alwashali, Ali Ahmed Mohammed Ali
    Abd Rahman, Nor Azlina
    Ismail, Noris
    2021 14TH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE), 2021, : 92 - 96
  • [26] Reputation Systems to Mitigate DoS Attack in Vehicular Network
    Costantino, Gianpiero
    Martinelli, Fabio
    Matteucci, Ilaria
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2017), 2018, 10707 : 261 - 265
  • [27] Secure Routing in DSR to Mitigate Black Hole Attack
    Bhardwaj, Ashutosh
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 985 - 989
  • [28] ITCA, an IDS and Trust Solution Collaborated with ACK Based Approach to Mitigate Network Layer Attack on MANET Routing
    Marathe, Nilesh
    Shinde, Subhash K.
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (01) : 393 - 416
  • [29] ITCA, an IDS and Trust Solution Collaborated with ACK Based Approach to Mitigate Network Layer Attack on MANET Routing
    Nilesh Marathe
    Subhash K. Shinde
    Wireless Personal Communications, 2019, 107 : 393 - 416
  • [30] Coordination-theoretic approach to modelling grid service composition process
    Meng Qian1
    2.Institute of Intelligence Equipment
    Journal of Systems Engineering and Electronics, 2010, 21 (04) : 713 - 720