Literature DB >> 25598581

A Probabilistic Approach to Mitigate Composition Attacks on Privacy in Non-Coordinated Environments.

A H M Sarowar Sattar1, Jiuyong Li1, Jixue Liu1, Raymond Heatherly2, Bradley Malin3.   

Abstract

Organizations share data about individuals to drive business and comply with law and regulation. However, an adversary may expose confidential information by tracking an individual across disparate data publications using quasi-identifying attributes (e.g., age, geocode and sex) associated with the records. Various studies have shown that well-established privacy protection models (e.g., k-anonymity and its extensions) fail to protect an individual's privacy against this "composition attack". This type of attack can be thwarted when organizations coordinate prior to data publication, but such a practice is not always feasible. In this paper, we introduce a probabilistic model called (d, α)-linkable, which mitigates composition attack without coordination. The model ensures that d confidential values are associated with a quasi-identifying group with a likelihood of α. We realize this model through an efficient extension to k-anonymization and use extensive experiments to show our strategy significantly reduces the likelihood of a successful composition attack and can preserve more utility than alternative privacy models, such as differential privacy.

Entities:  

Keywords:  Anonymization; Composition attack; Data publication; Databases; Privacy

Year:  2014        PMID: 25598581      PMCID: PMC4295121          DOI: 10.1016/j.knosys.2014.04.019

Source DB:  PubMed          Journal:  Knowl Based Syst        ISSN: 0950-7051            Impact factor:   8.038


  4 in total

1.  How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems.

Authors:  Bradley Malin; Latanya Sweeney
Journal:  J Biomed Inform       Date:  2004-06       Impact factor: 6.317

2.  Organizational fragmentation and care quality in the U.S healthcare system.

Authors:  Randall D Cebul; James B Rebitzer; Lowell J Taylor; Mark E Votruba
Journal:  J Econ Perspect       Date:  2008

3.  Validation of electronic medical record-based phenotyping algorithms: results and lessons learned from the eMERGE network.

Authors:  Katherine M Newton; Peggy L Peissig; Abel Ngo Kho; Suzette J Bielinski; Richard L Berg; Vidhu Choudhary; Melissa Basford; Christopher G Chute; Iftikhar J Kullo; Rongling Li; Jennifer A Pacheco; Luke V Rasmussen; Leslie Spangler; Joshua C Denny
Journal:  J Am Med Inform Assoc       Date:  2013-03-26       Impact factor: 4.497

4.  Secure construction of k-unlinkable patient records from distributed providers.

Authors:  Bradley Malin
Journal:  Artif Intell Med       Date:  2009-10-28       Impact factor: 5.326

  4 in total
  1 in total

1.  A Novel Privacy Paradigm for Improving Serial Data Privacy.

Authors:  Ayesha Shaukat; Adeel Anjum; Saif U R Malik; Munam Ali Shah; Carsten Maple
Journal:  Sensors (Basel)       Date:  2022-04-06       Impact factor: 3.576

  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.