k-anonymity based framework for privacy preserving data collection in wireless sensor networks

被引:4
|
作者
Bahsi, Hayretdin [1 ]
Levi, Albert
机构
[1] Natl Res Inst Elect & Cryptol, Gebze, Izmit, Turkey
关键词
Anonymity; Wireless Sensor Networks; Data Privacy;
D O I
10.3906/elk-0907-120
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper; k-anonymity notion is adopted to be used in wireless sensor networks (WSN) as a security framework with two levels of privacy. A base level of privacy is provided for the data shared with semi-trusted sink and a deeper level of privacy is provided against eavesdroppers. In the proposed method, some portions of data are encrypted and the rest is generalized. Generalization shortens the size of the data transmitted in the network causing energy saving at the cost of information loss. On the other hand, encryption provides anonymization with no information loss and without saving energy. Thus, there is a tradeoff between information loss and energy saving. In our system, this tradeoff is intelligently managed by a system parameter, which adjusts the amount of data portions to be encrypted. We use a method based on bottom up clustering that chooses the data portions to be encrypted among the ones that cause maximum information loss when generalized. In this way; a high degree of energy saving is realized within the given limits of information loss. Our analysis shows that the proposed method achieves the desired privacy levels with low information loss and with considerable energy saving.
引用
收藏
页码:241 / 271
页数:31
相关论文
共 50 条
  • [1] Betweenness Centrality Based k-Anonymity for Privacy Preserving in Social Networks
    Tian, Hui
    Lu, Yue
    Liu, Jingtian
    Yu, Jingjing
    16TH INTERNATIONAL CONFERENCE ON ADVANCES IN MOBILE COMPUTING AND MULTIMEDIA (MOMM 2018), 2014, : 3 - 7
  • [2] (k, ε, δ)-Anonymization: privacy-preserving data release based on k-anonymity and differential privacy
    Tsou, Yao-Tung
    Alraja, Mansour Naser
    Chen, Li-Sheng
    Chang, Yu-Hsiang
    Hu, Yung-Li
    Huang, Yennun
    Yu, Chia-Mu
    Tsai, Pei-Yuan
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2021, 15 (03) : 175 - 185
  • [3] Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity
    Chai, Guofei
    Xu, Miao
    Xu, Wenyuan
    Lin, Zhiyun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [4] A personalized k-anonymity privacy preserving method
    Xu, Yong
    Qin, Xiaolin
    Yang, Zhongxue
    Yang, Yitao
    Li, Kun
    Journal of Information and Computational Science, 2013, 10 (01): : 139 - 155
  • [5] Privacy-preserving distributed k-anonymity
    Jiang, W
    Clifton, C
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 166 - 177
  • [6] User k-anonymity for privacy preserving data mining of query logs
    Navarro-Arribas, Guillermo
    Torra, Vicenc
    Erola, Arnau
    Castella-Roca, Jordi
    INFORMATION PROCESSING & MANAGEMENT, 2012, 48 (03) : 476 - 487
  • [7] A k-anonymity privacy-preserving approach in wireless medical monitoring environments
    Belsis, Petros
    Pantziou, Grammati
    PERSONAL AND UBIQUITOUS COMPUTING, 2014, 18 (01) : 61 - 74
  • [8] A k-anonymity privacy-preserving approach in wireless medical monitoring environments
    Petros Belsis
    Grammati Pantziou
    Personal and Ubiquitous Computing, 2014, 18 : 61 - 74
  • [9] Novel Approaches for Privacy Preserving Data Mining in k-Anonymity Model
    Bhaladhare, Pawan R.
    Jinwala, Devesh C.
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (01) : 63 - 78
  • [10] Investigation on Privacy Preserving using K-Anonymity Techniques
    Kumar, B. Santhosh
    Daniya, T.
    Sathya, N.
    Cristin, R.
    2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 318 - 324