Skip to main content

Privacy Preservation Technique Based on Sensitivity Levels for Multiple Numerical Sensitive Overlapped Attributes

  • Conference paper
  • First Online:
Hybrid Intelligent Systems (HIS 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 420))

Included in the following conference series:

  • 617 Accesses

Abstract

In today’s world, information is a hot topic to discuss and explore. We all strive to get more information and utilize it for advancement. Data is the main object to get information. Data is considered as a big data nowadays as it contains a massive amount of information. Knowing the benefits of knowledge does not mean an adversary cannot use the same information to harm an individual. Protecting data from the intrusion of an adversary can be done through Privacy Preserving Data Publishing Methods. When there is a combination of sensitive data in a data set that is correlated to each other, several models are not efficient for protecting data. We propose a novel model K-MNSSOA for preserving data privacy based on the concept of K-anonymity in this paper. An in-depth study of the K-MNSOA model for Privacy Preserving Data Publishing is presented in this article, which protects sensitive data privacy breaches even when the set of data has multiple overlapping sensitive numerical attributes. Using this model, levels of sensitivity are designed, and generalization is performed on overlapping attributes based on the sensitivity in sensitive attributes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, Q., Shen, H., Sang, Y.: Privacy-preserving data publishing for multiple numerical sensitive attributes in Tsinghua. Sci. Technol. 20(3), 246–254 (2015).https://doi.org/10.1109/TST.2015.7128936, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7128936&isnumber=7128931

  2. Maheshwarkar, N., Maheshwarkar, B., Patidar, P., Rawat, M.K.: K-AMOA: k-anonymity model for multiple overlapped attributes. In: Conference ICTCS 2016, 04–05 March 2016, Udaipur, India\(\copyright \)2016 ACM. ISBN 978-1-4503-3962-9/16/03,https://doi.org/10.1145/2905055.2905142

  3. Li, T., Li, N., Zhang, J., Molloy, M.I.: Slicing: A new approach for privacy preserving data publishing. IEEE Trans. KDE 24(3), 561–574, March 2012

    Google Scholar 

  4. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)

    Google Scholar 

  5. Latanya Sweeney:Achieving k-Anonymity Privacy Protection Using Generalization and Suppression. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 571–588 (2002)

    Google Scholar 

  6. Samarati, P., Sweeney, L.: Protecting Privacy when Disclosing Information: K-Anonymity and its enforcement through Generalization and Suppression (1998)

    Google Scholar 

  7. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. In: Proceedings of 22nd International Conference Data Engineering (ICDE), p. 24 (2006)

    Google Scholar 

  8. Hu, X., Sun, Z., Wu, Y., Hu, W., Dong, J.: K-anonymity based on sensitive tuples. In: 2009 First International Workshop on Database Technology and Applications, 978-0-7695-3604-0/09 /2009 IEEE. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science (1989).https://doi.org/10.1109/DBTA.2009.74M

  9. Geetha, R., Karthika, S., Kumaraguru, P.: Tweet-scan-post: a system for analysis of sensitive private data disclosure in online social media. Knowl. Inf. Syst. 63, 2365–2404 (2021). https://doi.org/10.1007/s10115-021-01592-2

    Article  Google Scholar 

  10. Geetha, T., Serna, J., Rannenberg, K.: PrivacyBot: detecting privacy sensitive information in unstructured texts. In: 2019 Sixth International Conference on Social Networks Analysis, Management and Security (SNAMS), pp. 53–60 (2019). https://doi.org/10.1109/SNAMS.2019.8931855

  11. Wu, Y., Ruan, X., Liao, S., Wang, X.: P-Cover K-anonymity model for protecting multiple sensitive attributes. In: IEEE,The 5th International Conference on Computer Science & Education Hefei, China. 24–27 August 2010, IEEE. 978-1-4244-6005-2/10/2010

    Google Scholar 

  12. Dewri, R., Ray, I., Ray, I., Whitley, D.: On the optimal selection of k in the k-anonymity problem. In: IEEE,The 6th International Conference on Computer Science & Education Hefei, China. IEEE, 24–27 May 2014. 978-1-4244-6005-2/10/2014

    Google Scholar 

  13. Aggarwal, G., et al.: k- Anonymity: Algorithms and hardness. Technical report, Stanford University (2004)

    Google Scholar 

  14. Xu, Q., Xu, C., Qu, L.: Privacy monitoring service for conversations. In: Proceedings of the 14th ACM International Conference on Web Search and Data Mining (WSDM 2021), pp. 1093–1096. Association for Computing Machinery, New York, NY, USA (2021). https://doi.org/10.1145/3437963.3441706

  15. Cozza, F., et al.: Hybrid and lightweight detection of third party tracking: design, implementation, evaluation. Comput. Netw. 167, 106993 (2020). ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2019.106993

  16. Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secur. Comput. 15, 577–590 (2018)

    Google Scholar 

  17. Bayardo, R.J., Agrawal, R.: Data privacy through optimal k - anonymization. In: ICDE-2005 (2005)

    Google Scholar 

  18. LeFevre, K., DeWitt, D., Ramakrishnan, R.: Incognito: efficient fulldomain k-anonymity. In: SIGMOD (2005)

    Google Scholar 

  19. Meyerson, A., Williams, R.: On the complexity of Optimal k anonymity. In: PODS (2004)

    Google Scholar 

  20. Samarati, P.: Protecting respondents’ identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)

    Google Scholar 

  21. Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)

    Article  MathSciNet  Google Scholar 

  22. Zhong, S., Yang, Z., Wright, R.N.: Privacy-enhancing kanonymization of customer data. In: PODS (2005)

    Google Scholar 

  23. Dobra, A.: Statistical Tools for Disclosure Limitation in Multiway Contingency Tables. PhD thesis , Carnegie Mellon University (2002)

    Google Scholar 

  24. Widodo, W., Wibowo, W.C.: A distributional model of sensitive values on p-sensitive in multiple sensitive attributes. In: Proceedings of the 2nd International Conference on Informatics and Computational Sciences (ICICoS), Semarang, Indonesia, pp. 1–5, 30-31 October 2018

    Google Scholar 

  25. Kullback, S.L., Leibler, R.A.: On information and sufficiency. Ann. Math. Stat. 22, 79–86 (1951)

    Article  MathSciNet  Google Scholar 

  26. Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information (Abstract). In: Proceedings of the 17th ACM-SIGMOD, vol. 98, no. 188, pp. 10–1145 (1998)

    Google Scholar 

  27. Wang, T., Zheng, Z., Rehmani, M.H., Yao, S., Huo, Z.: Privacy preservation in big data from the communication perspective-A survey. IEEE Commun. Surv. Tutorials 21(1), 753–778 (2019). https://doi.org/10.1109/COMST.2018.2865107

    Article  Google Scholar 

  28. Liu, H., Yao, X., Yang, T., Ning, H.: Cooperative privacy preservation for wearable devices in hybrid computing-based smart health. IEEE Internet Things J. 6(2), 1352–1362 (2019). https://doi.org/10.1109/JIOT.2018.2843561

    Article  Google Scholar 

  29. Wang, L., Zhu, Q.: Utility-based anonymization for dataset with multiple sensitive attributes information. Int. J. High. Perform. Comput. Netw. 9, 401–415 (2016)

    Article  Google Scholar 

  30. Sahi, M.A., et al.: Privacy preservation in e-healthcare environments: state of the art and future directions. IEEE Access, vol. 6, no. c, pp. 464–478 (2017). https://doi.org/10.1109/ACCESS.2017.2767561

  31. Ram Mohan Rao, P., Murali Krishna, S., Siva Kumar, A.P.: Privacy preservation techniques in big data analytics: a survey. J. Big Data, vol. 5, no. 1 (2018). https://doi.org/10.1186/s40537-018-0141-8

  32. Wang, Q., et al.: Privacy-preserving collaborative model learning: the case of word vector training. IEEE Trans. Knowl. Data Eng. 30(12), 2381–2393 (2018). https://doi.org/10.1109/TKDE.2018.2819673

    Article  Google Scholar 

  33. Zhu, N., Chen, B., Wang, S., et al.: Ontology-based approach for the measurement of privacy disclosure. Inf. Syst. Front. (2021). https://doi.org/10.1007/s10796-021-10180-2

    Article  Google Scholar 

  34. Sherif, A.B.T., Rabieh, K., Mahmoud, M.M.E.A., Liang, X.: Privacy-preserving ride sharing scheme for autonomous vehicles in big data era. IEEE Internet Things J. 4(2), 611–618 (2017). https://doi.org/10.1109/JIOT.2016.2569090

    Article  Google Scholar 

  35. Hu, C., Huo, Y.: Efficient privacy-preserving dot-product computation for mobile big data. IET Commun. 11(5), 704–712 (2017). https://doi.org/10.1049/iet-com.2016.0782

    Article  Google Scholar 

  36. Tsai, P., Nguyen, T., Dao, T.: Genetic and evolutionary robot path planning optimization based on multiobjective grey wolf optimizer. In: International Conference on Genetic and Evolutionary Computing, vol. 4, pp. 166–173 (2016). https://doi.org/10.1007/978-3-319-48490-7

  37. Prabu Kanna, G., Vasudevan, V.: A fully homomorphic-elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data. Cluster Comput. 22, 9561–9569 (2019). https://doi.org/10.1007/s10586-018-2723-9

  38. Pu, Y., Luo, J., Wang, Y., Hu, C., Huo, H., Zhang, J.: Privacy-preserving scheme for location-based services using cryptographic approach. In: Proceedings of - 2018 2nd IEEE Symposium Privacy-Aware Computing PAC, pp. 125–126 (2018) https://doi.org/10.1109/PAC.2018.00022

  39. SIvanna, K., Prabhu Deva, S., Santoshkumar, M.: Privacy Preservation in Cloud Computing with Double Encryption, vol. 5, pp. 149–156 (2017). https://doi.org/10.1007/978-981-10-3226-4

  40. Top Ten Big Data Security and Privacy Challenges: Cloud Security Alliance (2012)

    Google Scholar 

  41. Singh, J.: Real time big data analytic: security concern and challenges with machine learning algorithm. In: 2014 Conference on IT in Business, Industry and Government (CSIBIG), pp. 1–4. IEEE (2014)

    Google Scholar 

  42. Cloud Security Alliance. Expanded Top Ten Security and Privacy Challenges (2013). https://downloads.cloudsecurityalliance

  43. Tankard, C.: Big data security. Netw. Secur. 2012(7), 5–8 (2012). https://doi.org/10.1016/S1353-4858(12)70063-6

  44. Kindervag, J., Balaouras, S., Hill, B., Mak, K.: Control And Protect Sensitive Information In the Era of Big Data (2012)

    Google Scholar 

  45. Juels, A., Oprea, A.: New approaches to security and availability for cloud data. Commun. ACM 56(2), 64 (2013). https://doi.org/10.1145/2408776.2408793

    Article  Google Scholar 

  46. Luo, H., Lin, Y., Zhang, H., Zukerman, M.: Preventing DDoS attacks by identifier/locator separation. IEEE Netw. 27(6), 60–65 (2013). https://doi.org/10.1109/MNET.2013.6678928

    Article  Google Scholar 

  47. Hasan, O., Habegger, B., Brunie, L., Bennani, N., Damiani, E.: A discussion of privacy challenges in user profiling with big data techniques: The EEXCESS use case. In: 2013 IEEE International Congress on Big Data, pp. 25-30. IEEE. https://doi.org/10.1109/BigData.Congress.2013.13

  48. Maheshwarkar, N., Maheshwarkar, B.: K-AMSOA: privacy preserving technique for multiple co-related sensitive numeric attributes using dynamic data set. Int. J. Biomed. Data Min. https://doi.org/10.4172/2090-4924.1000134

  49. Maheshwarkar, N., Maheshwarkar, B.: SIUQAPTT: SQL injection Union query attacks prevention using tokenization technique. In: Conference ICTCS 2016, 04-05 March 2016, Udaipur, India\(\copyright \)2016 ACM. ISBN 978-1-4503-3962-9/16/03, https://doi.org/10.1145/2905055

  50. Maheshwarkar, N., Maheshwarkar, B., Patidar, P., Rawat, M.K.: K- AMOA: k-anonymity model for multiple overlapped attributes. In: Conference ICTCS 2016, 04-05 March 2016, Udaipur, India\(\copyright \)2016 ACM. ISBN 978-1-4503- 3962-9/16/03, https://doi.org/10.1145/2905055.2905142

  51. Maheshwarkar, N., Pathak, K., Chourey, V.: N-SA kanonymity model: a model exclusive of tuple suppression technique. In: IEEE, 2012 Third Global Congress on Intelligent Systems, Wuhan, China 6-8 November 2012, pp. 229–232. 987-0-7695-4860-9/12 https://doi.org/10.1109/GCIS.2012.77

  52. Maheshwarkar, N., Pathak, K., Choudhari, N.S.: Article:K-anonymity model for multiple sensitive attributes. Int. J. Comput. Appl. (IJCA)1(1), 51–56 (2012). Published by Foundation of Computer Science, New York, USA

    Google Scholar 

  53. Maheshwarkar, N., Pathak, K., Chourey, V.: Performance evaluation of various k-anonymity techniques. In: Proceedings of SPIE 8350, Fourth International Conference on Machine Vision (ICMV2011): Computer Vision and Image Analysis; Pattern Recognition and Basic Technology 83501Y. https://doi.org/10.1117/12.921002, https://doi.org/10.1117/12.921002

  54. Maheshwarkar, N., Pathak, K., Chourey, V.: Privacy issues for k-anonymity model. Int. J. Eng. Res. Appl. 1(4). ISSN No. 1857–1861, 2248–9622 (2011)

    Google Scholar 

  55. Maheshwarkar, N., Pathak, K., Chourey, V.: Performance issues of various K-anonymity strategies. In: International Journal of Computer Technology and Electronics Engineering (IJCTEE) (2011). ISSN No. 2249-6343

    Google Scholar 

  56. Lin, J.C.W., Fournier-Viger, P., Liu, Q., Djenouri, Y., Zhang, J.: Anonymization of multiple and personalized sensitive attributes. In: Proceedings of the 20th International Conference on Big Data Analytics and Knowledge Discovery, Regensburg, Germany, pp. 204–215, 3–6 September 2018

    Google Scholar 

  57. Anjum, A., Ahmad, N., Malik, S.U.R., Zubair, S., Shahzad, B.: An efficient approach for publishing microdata for multiple sensitive attributes. J. Super. Comput. 74, 5127–5155 (2018)

    Article  Google Scholar 

  58. Kanwal, T., et al.: Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes. Inf. Sci. 488, 238–256 (2019)

    Article  Google Scholar 

  59. Wang, R., Zhu, Y., Chen, T., Chang, C.: Privacy-preserving algorithms for multiple sensitive attributes satisfying t-closeness. J. Comput. Sci. Technol. 33, 1231–1242 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chourey, N.M., Soni, R. (2022). Privacy Preservation Technique Based on Sensitivity Levels for Multiple Numerical Sensitive Overlapped Attributes. In: Abraham, A., et al. Hybrid Intelligent Systems. HIS 2021. Lecture Notes in Networks and Systems, vol 420. Springer, Cham. https://doi.org/10.1007/978-3-030-96305-7_5

Download citation

Publish with us

Policies and ethics