(τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility

Razaullah Khan, Xiaofeng Tao*, Adeel Anjum, Saifur Rehman Malik, Shui Yu, Abid Khan, Waheedur Rahman, Hassan Malik

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)
8 Downloads (Pure)

Abstract

In a real-world scenario for privacy-preserving data publishing, the original data are anonymized and released periodically. Each release may vary in number of records due to insert, update, and delete operations. An intruder can combine, that is, correlate different releases to compromise the privacy of the individual records. Most of the literature, such as τ-safety, τ-safe (l, k)-diversity, have an inconsistency in record signatures and adds counterfeit tuples with high generalization that causes privacy breach and information loss. In this paper, we propose an improved privacy model (τ, m)-slicedBucket, having a novel idea of “Cache” table to address these limitations. We indicate that a collusion attack can be performed for breaching the privacy of τ-safe (l, k)-diversity privacy model, and demonstrate it through formal modeling. The objective of the proposed (τ, m)-slicedBucket privacy model is to set a tradeoff between strong privacy and enhanced utility. Furthermore, we formally model and analyze the proposed model to show that the collusion attack is no longer applicable. Extensive experiments reveal that the proposed approach outperforms the existing models.

Original languageEnglish
Article numbere4130
Number of pages32
JournalTransactions on Emerging Telecommunications Technologies
Volume33
Issue number6
Early online date22 Oct 2020
DOIs
Publication statusPublished - 15 Jun 2022

Fingerprint

Dive into the research topics of '(τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility'. Together they form a unique fingerprint.

Cite this