Cargando…

Improved angelization technique against background knowledge attack for 1:M microdata

With the advent of modern information systems, sharing Electronic Health Records (EHRs) with different organizations for better medical treatment, and analysis is beneficial for both academic as well as for business development. However, an individual’s personal privacy is a big concern because of t...

Descripción completa

Detalles Bibliográficos
Autores principales: Fazal, Rabeeha, Khan, Razaullah, Anjum, Adeel, Syed, Madiha Haider, Khan, Abid, Rehman, Semeen
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280459/
https://www.ncbi.nlm.nih.gov/pubmed/37346655
http://dx.doi.org/10.7717/peerj-cs.1255
_version_ 1785060798991695872
author Fazal, Rabeeha
Khan, Razaullah
Anjum, Adeel
Syed, Madiha Haider
Khan, Abid
Rehman, Semeen
author_facet Fazal, Rabeeha
Khan, Razaullah
Anjum, Adeel
Syed, Madiha Haider
Khan, Abid
Rehman, Semeen
author_sort Fazal, Rabeeha
collection PubMed
description With the advent of modern information systems, sharing Electronic Health Records (EHRs) with different organizations for better medical treatment, and analysis is beneficial for both academic as well as for business development. However, an individual’s personal privacy is a big concern because of the trust issue across organizations. At the same time, the utility of the shared data that is required for its favorable use is also important. Studies show that plenty of conventional work is available where an individual has only one record in a dataset (1:1 dataset), which is not the case in many applications. In a more realistic form, an individual may have more than one record in a dataset (1:M). In this article, we highlight the high utility loss and inapplicability for the 1:M dataset of the θ-Sensitive k-Anonymity privacy model. The high utility loss and low data privacy of (p, l)-angelization, and (k, l)-diversity for the 1:M dataset. As a mitigation solution, we propose an improved (θ(∗), k)-utility algorithm to preserve enhanced privacy and utility of the anonymized 1:M dataset. Experiments on the real-world dataset reveal that the proposed approach outperforms its counterpart, in terms of utility and privacy for the 1:M dataset.
format Online
Article
Text
id pubmed-10280459
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-102804592023-06-21 Improved angelization technique against background knowledge attack for 1:M microdata Fazal, Rabeeha Khan, Razaullah Anjum, Adeel Syed, Madiha Haider Khan, Abid Rehman, Semeen PeerJ Comput Sci Security and Privacy With the advent of modern information systems, sharing Electronic Health Records (EHRs) with different organizations for better medical treatment, and analysis is beneficial for both academic as well as for business development. However, an individual’s personal privacy is a big concern because of the trust issue across organizations. At the same time, the utility of the shared data that is required for its favorable use is also important. Studies show that plenty of conventional work is available where an individual has only one record in a dataset (1:1 dataset), which is not the case in many applications. In a more realistic form, an individual may have more than one record in a dataset (1:M). In this article, we highlight the high utility loss and inapplicability for the 1:M dataset of the θ-Sensitive k-Anonymity privacy model. The high utility loss and low data privacy of (p, l)-angelization, and (k, l)-diversity for the 1:M dataset. As a mitigation solution, we propose an improved (θ(∗), k)-utility algorithm to preserve enhanced privacy and utility of the anonymized 1:M dataset. Experiments on the real-world dataset reveal that the proposed approach outperforms its counterpart, in terms of utility and privacy for the 1:M dataset. PeerJ Inc. 2023-03-15 /pmc/articles/PMC10280459/ /pubmed/37346655 http://dx.doi.org/10.7717/peerj-cs.1255 Text en ©2023 Fazal et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Security and Privacy
Fazal, Rabeeha
Khan, Razaullah
Anjum, Adeel
Syed, Madiha Haider
Khan, Abid
Rehman, Semeen
Improved angelization technique against background knowledge attack for 1:M microdata
title Improved angelization technique against background knowledge attack for 1:M microdata
title_full Improved angelization technique against background knowledge attack for 1:M microdata
title_fullStr Improved angelization technique against background knowledge attack for 1:M microdata
title_full_unstemmed Improved angelization technique against background knowledge attack for 1:M microdata
title_short Improved angelization technique against background knowledge attack for 1:M microdata
title_sort improved angelization technique against background knowledge attack for 1:m microdata
topic Security and Privacy
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280459/
https://www.ncbi.nlm.nih.gov/pubmed/37346655
http://dx.doi.org/10.7717/peerj-cs.1255
work_keys_str_mv AT fazalrabeeha improvedangelizationtechniqueagainstbackgroundknowledgeattackfor1mmicrodata
AT khanrazaullah improvedangelizationtechniqueagainstbackgroundknowledgeattackfor1mmicrodata
AT anjumadeel improvedangelizationtechniqueagainstbackgroundknowledgeattackfor1mmicrodata
AT syedmadihahaider improvedangelizationtechniqueagainstbackgroundknowledgeattackfor1mmicrodata
AT khanabid improvedangelizationtechniqueagainstbackgroundknowledgeattackfor1mmicrodata
AT rehmansemeen improvedangelizationtechniqueagainstbackgroundknowledgeattackfor1mmicrodata