Arafat, N.H.M. and Pramanik, Md Ileas and Abu Jafar, Md Muzahid and Lu, Bibo and Jahan, Sumaiya and Murad, Saydul Akbar (2021) A conceptual anonymity model to ensure privacy for sensitive network data. In: 2021 Emerging Technology in Computing, Communication and Electronics, ETCCE 2021. 2021 Emerging Technology in Computing, Communication and Electronics, ETCCE 2021 , 21 - 23 December 2021 , Dhaka. pp. 1-7.. ISBN 978-166548364-3 (Published)
Pdf
A conceptual anonymity model to ensure privacy.pdf Restricted to Repository staff only Download (857kB) | Request a copy |
||
|
Pdf
A conceptual anonymity model to ensure privacy for sensitive network data_ABS.pdf Download (596kB) | Preview |
Abstract
In today's world, a great amount of people, devices, and sensors are well connected through various online platforms, and the interactions between these entities produce massive amounts of useful information. This process of data production and sharing appears to be on the rise. The growing popularity of this industry, as well as the required development of data sharing tools and technology, pose major threats to an individual's sensitive information privacy. These privacy-related issues may elicit a regularly strong negative reaction and restrain further organizational invention. Researchers have identified the privacy implications of large data collections and contributed to the preservation of data from unauthorised exposure to solve the challenge of information privacy. However, the majority of privacy strategies concentrate solely on traditional data models, such as micro-data. The academe and industry are paying more attention to network data privacy challenges. In this paper, we offer (ℓ, k)-anonymity, a novel privacy paradigm for network data that focuses on maintaining the privacy of both node and link information. Here, original network data will turn to attribute generalization nodes through a complex process, where several algorithms, clustering, node generalization, link generalization and ℓ-diversification will be applied. As a result, (ℓ, k)-anonymous network will be generated and will filter original network data to ensure publishable (ℓ, k)-anonymize data. Hopefully, this anonymity model will have a stronger role against homogeneity attacks of intruders, which will prevent the unauthorized disclosure of sensitive network data for several areas, such as - health sector. This model will also be cost effective and data loss will be controlled using two different ways.
Item Type: | Conference or Workshop Item (Lecture) |
---|---|
Additional Information: | Indexed by Scopus |
Uncontrolled Keywords: | Data publishing; Information Loss; k-anonymity; Network-data; Privacy |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software T Technology > T Technology (General) T Technology > TA Engineering (General). Civil engineering (General) |
Faculty/Division: | Institute of Postgraduate Studies Faculty of Computing |
Depositing User: | Mr Muhamad Firdaus Janih@Jaini |
Date Deposited: | 30 Oct 2024 04:38 |
Last Modified: | 30 Oct 2024 04:38 |
URI: | http://umpir.ump.edu.my/id/eprint/42380 |
Download Statistic: | View Download Statistics |
Actions (login required)
View Item |