一种新的协同防御组合攻击方法

Farah Wahida, A. S. Sattar, Md. Muktar Hossain
{"title":"一种新的协同防御组合攻击方法","authors":"Farah Wahida, A. S. Sattar, Md. Muktar Hossain","doi":"10.1109/ICICT4SD50815.2021.9396903","DOIUrl":null,"url":null,"abstract":"Data anonymization is one of the essential strategies, which is utilized in security protecting data publication. Numerous techniques have been proposed to anonymize various associations' data sets to distribute them autonomously. In any case, a data set is infrequently confined, a nd distributed by numerous associations may get a record of a similar individual. An independently distributed data set may have a little security hazard. Notwithstanding, the blend of two distributed data sets may penetrate people's security, common in informational collections, by composition attack. A couple of researches have been done to forestall it without considering coordination among different associations before data publishing. Even though coordination is a magnificent method to keep away from such issues, associations would prefer not to share their client informational collections with others. In this work, we present a coordination strategy where complete information sharing is not essential. This will successfully beat security concerns. It has been demonstrated tentatively that the proposed strategy anonymizes information to fulfill the security necessity and preserve high data utility than previously proposed models.","PeriodicalId":239251,"journal":{"name":"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A New Coordination Approach to Mitigate Composition Attack\",\"authors\":\"Farah Wahida, A. S. Sattar, Md. Muktar Hossain\",\"doi\":\"10.1109/ICICT4SD50815.2021.9396903\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data anonymization is one of the essential strategies, which is utilized in security protecting data publication. Numerous techniques have been proposed to anonymize various associations' data sets to distribute them autonomously. In any case, a data set is infrequently confined, a nd distributed by numerous associations may get a record of a similar individual. An independently distributed data set may have a little security hazard. Notwithstanding, the blend of two distributed data sets may penetrate people's security, common in informational collections, by composition attack. A couple of researches have been done to forestall it without considering coordination among different associations before data publishing. Even though coordination is a magnificent method to keep away from such issues, associations would prefer not to share their client informational collections with others. In this work, we present a coordination strategy where complete information sharing is not essential. This will successfully beat security concerns. It has been demonstrated tentatively that the proposed strategy anonymizes information to fulfill the security necessity and preserve high data utility than previously proposed models.\",\"PeriodicalId\":239251,\"journal\":{\"name\":\"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-02-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICT4SD50815.2021.9396903\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICT4SD50815.2021.9396903","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

数据匿名化是数据发布安全保护的基本策略之一。已经提出了许多技术来匿名化各种关联的数据集,以自主分发它们。在任何情况下,数据集通常是有限的,由许多协会分布的数据集可能得到相似个体的记录。独立分布的数据集可能存在一点安全隐患。尽管如此,两个分布式数据集的混合可能会通过组合攻击穿透信息集合中常见的人们的安全性。已经做了一些研究来防止它,而没有考虑在数据发布之前不同协会之间的协调。尽管协调是避免此类问题的绝佳方法,但协会宁愿不与他人分享其客户信息集合。在这项工作中,我们提出了一种不需要完全信息共享的协调策略。这将成功地消除安全担忧。初步证明,与先前提出的模型相比,所提出的策略可以匿名化信息以满足安全需求并保持较高的数据效用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A New Coordination Approach to Mitigate Composition Attack
Data anonymization is one of the essential strategies, which is utilized in security protecting data publication. Numerous techniques have been proposed to anonymize various associations' data sets to distribute them autonomously. In any case, a data set is infrequently confined, a nd distributed by numerous associations may get a record of a similar individual. An independently distributed data set may have a little security hazard. Notwithstanding, the blend of two distributed data sets may penetrate people's security, common in informational collections, by composition attack. A couple of researches have been done to forestall it without considering coordination among different associations before data publishing. Even though coordination is a magnificent method to keep away from such issues, associations would prefer not to share their client informational collections with others. In this work, we present a coordination strategy where complete information sharing is not essential. This will successfully beat security concerns. It has been demonstrated tentatively that the proposed strategy anonymizes information to fulfill the security necessity and preserve high data utility than previously proposed models.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信