CFP last date
20 January 2025
Reseach Article

A Survey on Privacy Preserving Methods against Composition Attack in Non-Coordinate System

by Tamanna Rahaman, Md. Muktar Hossain, Fahmida Haque Mim
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 25
Year of Publication: 2021
Authors: Tamanna Rahaman, Md. Muktar Hossain, Fahmida Haque Mim
10.5120/ijca2021921180

Tamanna Rahaman, Md. Muktar Hossain, Fahmida Haque Mim . A Survey on Privacy Preserving Methods against Composition Attack in Non-Coordinate System. International Journal of Computer Applications. 174, 25 ( Mar 2021), 54-60. DOI=10.5120/ijca2021921180

@article{ 10.5120/ijca2021921180,
author = { Tamanna Rahaman, Md. Muktar Hossain, Fahmida Haque Mim },
title = { A Survey on Privacy Preserving Methods against Composition Attack in Non-Coordinate System },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2021 },
volume = { 174 },
number = { 25 },
month = { Mar },
year = { 2021 },
issn = { 0975-8887 },
pages = { 54-60 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number25/31834-2021921180/ },
doi = { 10.5120/ijca2021921180 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:23:06.650248+05:30
%A Tamanna Rahaman
%A Md. Muktar Hossain
%A Fahmida Haque Mim
%T A Survey on Privacy Preserving Methods against Composition Attack in Non-Coordinate System
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 25
%P 54-60
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Anonymizing data for safe publication has become a growing research field in recent years. Most of the earlier work in this field focused on independent publication. But these acquiring privacy methods fall short when considering the real-life situation of multiple releases of data by different organization. Numerous independent publications can contain information about the same person, and joining these separate publications can disclose that person’s identity. This is called a composition attack. Several strategies have been developed to solve this problem and still it is in developing phase. Our paper will survey the most prominent methods proposed to anonymize common data of multiple independent publications. We hope to help the researchers come up with new ideas to mitigate the risk of a composition attack in non-coordinated system by summarizing the work that has already been done up to this point.

References
  1. L. Sweeney, “k-anonymity: a model for protecting privacy”, International Journal on Uncertainty, Fuzziness and Knowledge based Systems, 2002, pp. 557-570
  2. Hillol Kargupta, Souptik Datta, etal, “On the Privacy Preserving Properties of Random Data Perturbation Techniques”, Proceedings of the Third IEEE International Conference on Data Mining. Nov. 2003
  3. A.Machanavajjhala, J.Gehrke, and D.Kifer, et al, “ℓ-diversity: Privacy beyond k-anonymity”, In Proc. of ICDE, Apr.2006
  4. LeFevre K, DeWitt D J, Ramakrishnan R, “Mondrian multidimensional K-anonymity”, In Proc of the International Conference on Data Engineering(ICDE’06), Atlanta, GA, USA, April.2006, pp. 25-35
  5. K. Wang and B. C. M. Fung. Anonymizing sequential releases. In KDD, pages 414–423. ACM Press, 2006.
  6. C. Dwork. Differential privacy. In ICALP, pages 1–12. Springer, 2006
  7. Xiaokui Xiao and Yufei Tao. m-Invariance : Towards Privacy Preserving Re-publication of Dynamic Datasets. In SIGMOD, pages 689-700, (2007)
  8. N. Li, T. Li, and S. Venkatasubramanian, “t-Closeness: Privacy Beyond k-anonymity and l-Diversity”, In Proc. of ICDE, 2007, pp. 106-115
  9. David J Martin, Daniel Kifer, Ashwin Machanavajjhala, Johannes Gehrke, and Joseph Y Halpern. Worst-Case Background Knowledge for Privacy-Preserving Data Publishing. In ICDE, pages 126-135 (2007)
  10. Yingyi Bu, Ada Wai-Chee Fu,et al, “Privacy Preserving Serial Data Publishing By Role Composition”, In VLDB, 2008, pp. 845-856.
  11. S.R.Ganta, S.P.Kasiviswanathan, Adam Smith : Composition attacks and auxiliary information in data privacy. In: KDD 2008, pp. 265–273 (2008)
  12. Yan Zhao, Ming Du, Jiajin Le : A survey on privacy preserving approaches in data publishing. In: Proceedings - 2009 1st International Workshop on Database Technology and Applications, DBTA 2009, pp.128-131volume 2, Issue 1 (2009)
  13. R.C.-W. Wong, A.W.-C. Fu, Jia Liu, Ke Wang, and Yabo Xu. Global privacy guarantee in serial data publishing. In ICDE, pages 956-959 (2010)
  14. Benjamin C.M. Fung, Ke Wang, Rui Chen, Philip S. Yu : Privacy-preserving data publishing: a survey of recent developments. In: ACM Comput. Surv. 42 (4) (2010)
  15. M.M.Baig, J.Li, J.Liu, H.Wang : Cloning for privacy protection in multiple independent data publications. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management, pp. 885–894, Glasgow (2011)
  16. Muzammil Baig, Jiuyong Li, Jixue Liu, Xiaofeng Ding,HuaWang : Data privacy Against composition attack. In:KDD 2012, pp. 320-334
  17. A. H.M. Sarowar Sattar, Jiuyong Li, Jixue Liu, Raymond Heatherly, Bradley Malin : A probabilistic approach to mitigate composition attacks on privacy in non-coordinated environments. In: Knowledge-Based Systems, pp. 361-372 volume 67 (2014)
  18. Jiuyong Li, Muzammil M. Baig, A.H.M. Sarowar Sattar, Xiaofeng Ding, Jixue Liu, Millist W. Vincent : A hybrid approach to prevent composition attacks for independent data releases. In: Information Sciences, 2016, volume 367-368, pp 324-336 (2016)
  19. A S M Touhidul Hasan, Qingshan Jiang, Hui Chen and Shengrui Wang : A new approach to privacy preserving multiple independent data publishing. In:KDD,2018,pp.1-22 volume 8, Issue 5(2018)
Index Terms

Computer Science
Information Sciences

Keywords

Composition attack Non-coordinate system Independent publishing Anonymization