1. A hybrid approach to prevent composition attacks for independent data releases
- Author
-
Jixue Liu, Jiuyong Li, Millist W. Vincent, Muzammil M. Baig, A.H.M. Sarowar Sattar, Xiaofeng Ding, Li, Jiuyong, Baig, Muzammil M, Sarowar, Sattar AHM, Ding, Xiaofeng, Liu, Jixue, and Vincent, Millist W
- Subjects
Information privacy ,Information Systems and Management ,Data anonymization ,Computer science ,Data_MISCELLANEOUS ,02 engineering and technology ,Data publishing ,computer.software_genre ,Hybrid approach ,Computer Science Applications ,Theoretical Computer Science ,Data set ,Artificial Intelligence ,Control and Systems Engineering ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Data mining ,Independent data ,computer ,Software - Abstract
Data anonymization is one of the main techniques used in privacy preserving data publishing, and many methods have been proposed to anonymize both individual data sets and multiple data sets. In real life, a data set is rarely isolated and two data sets published by different organizations may contain records pertaining to the same individual. For example, some patients might have visited two hospitals for the same disease, and their records are independently anonymized and published by the two hospitals. Although each published data set alone might pose a small privacy risk, the combination of two data sets may severely compromise the privacy of the individuals common to both data sets. An attack on individual privacy which uses independent data sets is called a composition attack. The topic of how to anonymize data sets to prevent a composition attack using independent data releases has not been widely investigated. In this paper, we propose a new principle to protect data sets from composition attacks. We propose a hybrid algorithm, which combines sampling, perturbation and generalization to protect data privacy from composition attacks. We experimentally demonstrate that the proposed anonymization technique significantly reduces the risk of composition attacks and also preserves good data utility. Refereed/Peer-reviewed
- Published
- 2016