Privacy-preserving model and generalization correlation attacks for 1:M data with multiple sensitive attributes

Tehsin Kanwal, Sayed Ali Asjad Shaukat, Adeel Anjum*, Saif ur Rehman Malik, Kim Kwang Raymond Choo, Abid Khan, Naveed Ahmad, Mansoor Ahmad, Samee U. Khan

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

25 Scopus citations

Abstract

Preserved privacy and enhanced utility are two competing requirements in data publishing. For maintaining a trade-off between the two; a plethora of research work exist in 1:1 scenario (each individual has a single record) with a single sensitive attribute (SA). However, some practical scenarios i.e., data having 1:M records (an individual can have multiple records) with multiple sensitive attributes (MSAs), have been relatively understudied. In our current interconnected and digitalized society, the capability to deal with such scenarios is increasingly important due to the ever-increasing sources of data that could be drawn together and infer one's information (e.g. profile and lifestyle) and consequently, compromising one's privacy. In this paper, we present a new type of attack on 1:M records with MSAs, coined as MSAs generalization correlation attacks and perform formal modeling and analysis of these attacks. Then, we propose a privacy-preserving technique “(p, l)-Angelization” for 1:M–MSAs data publication. Extensive experiments over real-world datasets advocate the outperformance of our technique over its counterparts.

Original languageEnglish
Pages (from-to)238-256
Number of pages19
JournalInformation Sciences
Volume488
DOIs
StatePublished - Jul 2019
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2019 Elsevier Inc.

Keywords

  • 1:m generalization
  • Formal analysis and verification
  • Multiple sensitive attributes
  • Multiple sensitive attributes correlation attacks
  • Privacy disclosures
  • Privacy-preserving

ASJC Scopus subject areas

  • Software
  • Control and Systems Engineering
  • Theoretical Computer Science
  • Computer Science Applications
  • Information Systems and Management
  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'Privacy-preserving model and generalization correlation attacks for 1:M data with multiple sensitive attributes'. Together they form a unique fingerprint.

Cite this