Enhancing Utility in Anonymized Data against the Adversary’s Background Knowledge

N/ACitations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

Recent studies have shown that data are some of the most valuable resources for making government policies and business decisions in different organizations. In privacy preserving, the challenging task is to keep an individual’s data protected and private, and at the same time the modified data must have sufficient accuracy for answering data mining queries. However, it is difficult to implement sufficient privacy where re-identification of a record is claimed to be impossible because the adversary has background knowledge from different sources. The k-anonymity model is prone to attribute disclosure, while the t-closeness model does not prevent identity disclosure. Moreover, both models do not consider background knowledge attacks. This paper proposes an anonymization algorithm called the utility-based hierarchical algorithm (UHRA) for producing k-anonymous t-closed data that can prevent background knowledge attacks. The proposed framework satisfies the privacy requirements using a hierarchical approach. Finally, to enhance utility of the anonymized data, records are moved between different anonymized groups, while the requirements of the privacy model are not violated. Our experiments indicate that our proposed algorithm outperforms its counterparts in terms of data utility and privacy.

Cite

CITATION STYLE

APA

Amiri, F., Khan, R., Anjum, A., Syed, M. H., & Rehman, S. (2023). Enhancing Utility in Anonymized Data against the Adversary’s Background Knowledge. Applied Sciences (Switzerland), 13(7). https://doi.org/10.3390/app13074091

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free