Coordination Approach to Mitigate Composition Attack

被引:0
|
作者
Wahida, Farah [1 ]
Sattar, A. H. M. Sarowar [1 ]
Hossain, Md Muktar [1 ]
机构
[1] Rajshahi Univ Engn & Technol, Dept Comp Sci & Engn, Rajshahi, Bangladesh
来源
2020 23RD INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT 2020) | 2020年
关键词
Privacy; Composition Attack; Coordination; Anonymization; PRIVACY;
D O I
10.1109/ICCIT51783.2020.9392661
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data anonymization is one of the primary techniques, which is used in privacy preserving data publishing. Numerous methods have been proposed to anonymize data sets, that are used by different organizations to publish their data sets independently. However, in actuality, a data set is infrequently isolated, and data sets published by multiple organizations may obtain a record of the same person. An individually published data set may have a small privacy risk. However, the combination of two published data sets may breach individuals' privacy, who are common in both data sets by composition attack. A few researches have been carried out to prevent it without considering coordination among multiple organizations before data publishing. Though coordination is an excellent way to avoid such problems, organizations do not want to share their customer data sets with others. In this work, we introduce a coordination method where complete data sharing is not necessary. This will effectively overcome privacy concerns. It has been shown experimentally that the proposed technique anonymizes data set to satisfy the privacy requirement and preserves high data utility.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks
    Michalas, Antonis
    Komninos, Nikos
    Prasad, Neeli R.
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2011, 3 (01) : 14 - 36
  • [42] An Effective Mechanism to Mitigate Real-Time DDoS Attack
    Abubakar, Rana
    Aldegheishem, Abdulaziz
    Majeed, Muhammad Faran
    Mehmood, Amjad
    Maryam, Hafsa
    Alrajeh, Nabil Ali
    Maple, Carsten
    Jawad, Muhammad
    IEEE ACCESS, 2020, 8 : 126215 - 126227
  • [43] I-EDRI Scheme to Mitigate Grayhole Attack in MANETs
    Patel, Ankit D.
    Jhaveri, Rutvij H.
    Shah, Shaishav N.
    INTELLIGENT COMPUTING, COMMUNICATION AND DEVICES, 2015, 309 : 39 - 43
  • [44] A novel architecture to mitigate wireless LAN based phishing attack
    Singh, Niraj Kumar
    Sridaran, R.
    Proceedings of the 2019 6th International Conference on Computing for Sustainable Global Development, INDIACom 2019, 2019, : 1212 - 1217
  • [45] Resilient Wide-Area Damping Control to Mitigate Strong Cyber Attack: A Multiple-Controller Switching Approach
    Zhao, Yifan
    Yao, Wei
    Zhang, Chuan-Ke
    Ai, Xiaomeng
    Wen, Jinyu
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (03) : 2326 - 2337
  • [46] COORDINATION AND COMPOSITION OF CRYSTALS
    GREKOV, FF
    JOURNAL OF STRUCTURAL CHEMISTRY, 1986, 27 (01) : 83 - 87
  • [47] Coordination for Component Composition
    Arbab, Farhad
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 160 (01) : 15 - 40
  • [48] A Coordination-Theory Driven Approach for Manufacturing Web Services Composition Process
    Qian, Meng
    Liu, Zhong
    Yao, Li
    Zhang, Weiming
    IEEM: 2008 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1-3, 2008, : 2071 - 2076
  • [49] Coordination Protocol Composition Approach Using Metadata in Multi-agent Systems
    Takahashi, Ryuichi
    Tei, Kenji
    Fukazawa, Yoshiaki
    Ishikawa, Fuyuki
    Honiden, Shinichi
    EDOC 2008: 12TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING, PROCEEDINGS, 2008, : 372 - +
  • [50] A Hybrid Cyber Defense Mechanism to Mitigate the Persistent Scan and Foothold Attack
    Wang, Shuo
    Pei, Qingqi
    Zhang, Yuchen
    Liu, Xiaohu
    Tang, Guangming
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020