Coordination Approach to Mitigate Composition Attack

被引:0
|
作者
Wahida, Farah [1 ]
Sattar, A. H. M. Sarowar [1 ]
Hossain, Md Muktar [1 ]
机构
[1] Rajshahi Univ Engn & Technol, Dept Comp Sci & Engn, Rajshahi, Bangladesh
来源
2020 23RD INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT 2020) | 2020年
关键词
Privacy; Composition Attack; Coordination; Anonymization; PRIVACY;
D O I
10.1109/ICCIT51783.2020.9392661
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data anonymization is one of the primary techniques, which is used in privacy preserving data publishing. Numerous methods have been proposed to anonymize data sets, that are used by different organizations to publish their data sets independently. However, in actuality, a data set is infrequently isolated, and data sets published by multiple organizations may obtain a record of the same person. An individually published data set may have a small privacy risk. However, the combination of two published data sets may breach individuals' privacy, who are common in both data sets by composition attack. A few researches have been carried out to prevent it without considering coordination among multiple organizations before data publishing. Though coordination is an excellent way to avoid such problems, organizations do not want to share their customer data sets with others. In this work, we introduce a coordination method where complete data sharing is not necessary. This will effectively overcome privacy concerns. It has been shown experimentally that the proposed technique anonymizes data set to satisfy the privacy requirement and preserves high data utility.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Coordination-theoretic approach to modelling grid service composition process
    Qian, Meng
    Liu, Zhong
    Wang, Jing
    Yao, Li
    Zhang, Weiming
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2010, 21 (04) : 713 - 720
  • [32] Authenticated group communication to mitigate collusion attack in key sharing
    Annlin Jeba, S.V., 1600, Asian Network for Scientific Information (12):
  • [33] A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments
    Rajesh Kumar Dhanaraj
    SK Hafizul Islam
    Vani Rajasekar
    Wireless Networks, 2022, 28 : 3127 - 3142
  • [34] An Efficient system to stumble on and Mitigate DDoS attack in cloud Environment
    Mohan, Manju K.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1855 - 1857
  • [35] Mitigate a Subtle Cause of High-Temperature Hydrogen Attack
    Mathias, Paul M.
    Jacobs, Garry E.
    Shargay, Cathleen
    CHEMICAL ENGINEERING PROGRESS, 2021, 117 (04) : 24 - 31
  • [36] Formal local government coordination to mitigate climate change
    Armstrong, John H.
    URBAN CLIMATE, 2023, 51
  • [37] Mitigate Black Hole Attack using Trust with AODV in MANET
    Keerthika, V.
    Malarvizhi, N.
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 470 - 474
  • [38] A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments
    Dhanaraj, Rajesh Kumar
    Islam, S. K. Hafizul
    Rajasekar, Vani
    WIRELESS NETWORKS, 2022, 28 (07) : 3127 - 3142
  • [39] A Novel Architecture to Mitigate Wireless LAN based Phishing Attack
    Singh, Niraj Kumar
    Sridaran, R.
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 1212 - 1217
  • [40] A convenient way to mitigate DDoS TCP SYN flood attack
    Toyeer-E-Ferdoush
    Rahman, Habibur
    Hasan, Mahmud
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (07): : 2069 - 2077