Cargando…
Improved angelization technique against background knowledge attack for 1:M microdata
With the advent of modern information systems, sharing Electronic Health Records (EHRs) with different organizations for better medical treatment, and analysis is beneficial for both academic as well as for business development. However, an individual’s personal privacy is a big concern because of t...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280459/ https://www.ncbi.nlm.nih.gov/pubmed/37346655 http://dx.doi.org/10.7717/peerj-cs.1255 |
_version_ | 1785060798991695872 |
---|---|
author | Fazal, Rabeeha Khan, Razaullah Anjum, Adeel Syed, Madiha Haider Khan, Abid Rehman, Semeen |
author_facet | Fazal, Rabeeha Khan, Razaullah Anjum, Adeel Syed, Madiha Haider Khan, Abid Rehman, Semeen |
author_sort | Fazal, Rabeeha |
collection | PubMed |
description | With the advent of modern information systems, sharing Electronic Health Records (EHRs) with different organizations for better medical treatment, and analysis is beneficial for both academic as well as for business development. However, an individual’s personal privacy is a big concern because of the trust issue across organizations. At the same time, the utility of the shared data that is required for its favorable use is also important. Studies show that plenty of conventional work is available where an individual has only one record in a dataset (1:1 dataset), which is not the case in many applications. In a more realistic form, an individual may have more than one record in a dataset (1:M). In this article, we highlight the high utility loss and inapplicability for the 1:M dataset of the θ-Sensitive k-Anonymity privacy model. The high utility loss and low data privacy of (p, l)-angelization, and (k, l)-diversity for the 1:M dataset. As a mitigation solution, we propose an improved (θ(∗), k)-utility algorithm to preserve enhanced privacy and utility of the anonymized 1:M dataset. Experiments on the real-world dataset reveal that the proposed approach outperforms its counterpart, in terms of utility and privacy for the 1:M dataset. |
format | Online Article Text |
id | pubmed-10280459 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-102804592023-06-21 Improved angelization technique against background knowledge attack for 1:M microdata Fazal, Rabeeha Khan, Razaullah Anjum, Adeel Syed, Madiha Haider Khan, Abid Rehman, Semeen PeerJ Comput Sci Security and Privacy With the advent of modern information systems, sharing Electronic Health Records (EHRs) with different organizations for better medical treatment, and analysis is beneficial for both academic as well as for business development. However, an individual’s personal privacy is a big concern because of the trust issue across organizations. At the same time, the utility of the shared data that is required for its favorable use is also important. Studies show that plenty of conventional work is available where an individual has only one record in a dataset (1:1 dataset), which is not the case in many applications. In a more realistic form, an individual may have more than one record in a dataset (1:M). In this article, we highlight the high utility loss and inapplicability for the 1:M dataset of the θ-Sensitive k-Anonymity privacy model. The high utility loss and low data privacy of (p, l)-angelization, and (k, l)-diversity for the 1:M dataset. As a mitigation solution, we propose an improved (θ(∗), k)-utility algorithm to preserve enhanced privacy and utility of the anonymized 1:M dataset. Experiments on the real-world dataset reveal that the proposed approach outperforms its counterpart, in terms of utility and privacy for the 1:M dataset. PeerJ Inc. 2023-03-15 /pmc/articles/PMC10280459/ /pubmed/37346655 http://dx.doi.org/10.7717/peerj-cs.1255 Text en ©2023 Fazal et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Security and Privacy Fazal, Rabeeha Khan, Razaullah Anjum, Adeel Syed, Madiha Haider Khan, Abid Rehman, Semeen Improved angelization technique against background knowledge attack for 1:M microdata |
title | Improved angelization technique against background knowledge attack for 1:M microdata |
title_full | Improved angelization technique against background knowledge attack for 1:M microdata |
title_fullStr | Improved angelization technique against background knowledge attack for 1:M microdata |
title_full_unstemmed | Improved angelization technique against background knowledge attack for 1:M microdata |
title_short | Improved angelization technique against background knowledge attack for 1:M microdata |
title_sort | improved angelization technique against background knowledge attack for 1:m microdata |
topic | Security and Privacy |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280459/ https://www.ncbi.nlm.nih.gov/pubmed/37346655 http://dx.doi.org/10.7717/peerj-cs.1255 |
work_keys_str_mv | AT fazalrabeeha improvedangelizationtechniqueagainstbackgroundknowledgeattackfor1mmicrodata AT khanrazaullah improvedangelizationtechniqueagainstbackgroundknowledgeattackfor1mmicrodata AT anjumadeel improvedangelizationtechniqueagainstbackgroundknowledgeattackfor1mmicrodata AT syedmadihahaider improvedangelizationtechniqueagainstbackgroundknowledgeattackfor1mmicrodata AT khanabid improvedangelizationtechniqueagainstbackgroundknowledgeattackfor1mmicrodata AT rehmansemeen improvedangelizationtechniqueagainstbackgroundknowledgeattackfor1mmicrodata |