(τ, m)‐slicedBucket privacy model for sequential anonymization for improving privacy and utility

Razaullah Khan, Xiaofeng Tao*, Adeel Anjum, Saif Ur Rehman Malik, Shui Yu, Abid Khan, Waheed ur Rahman, HASSAN MALIK

*Corresponding author for this work

Research output: Contribution to journalArticle (journal)peer-review

3 Citations (Scopus)
214 Downloads (Pure)

Abstract

In a real‐world scenario for privacy‐preserving data publishing, the original data are anonymized and released periodically. Each release may vary in number of records due to insert, update, and delete operations. An intruder can combine, that is, correlate different releases to compromise the privacy of the individual records. Most of the literature, such as τ‐safety, τ‐safe (l, k)‐diversity, have an inconsistency in record signatures and adds counterfeit tuples with high generalization that causes privacy breach and information loss. In this paper, we propose an improved privacy model (τ, m)‐slicedBucket, having a novel idea of “Cache” table to address these limitations. We indicate that a collusion attack can be performed for breaching the privacy of τ‐safe (l, k)‐diversity privacy model, and demonstrate it through formal modeling. The objective of the proposed (τ, m)‐slicedBucket privacy model is to set a tradeoff between strong privacy and enhanced utility. Furthermore, we formally model and analyze the proposed model to show that the collusion attack is no longer applicable. Extensive experiments reveal that the proposed approach outperforms the existing models.
Original languageEnglish
JournalTransactions on Emerging Telecommunications Technologies
DOIs
Publication statusPublished - 22 Oct 2020

Keywords

  • Big data
  • Electronic Health Records
  • k-anonymity
  • Privacy Preserving Data Publishing
  • Privacy
  • security

Fingerprint

Dive into the research topics of '(τ, m)‐slicedBucket privacy model for sequential anonymization for improving privacy and utility'. Together they form a unique fingerprint.

Cite this