{"title":"一种新的协同防御组合攻击方法","authors":"Farah Wahida, A. S. Sattar, Md. Muktar Hossain","doi":"10.1109/ICICT4SD50815.2021.9396903","DOIUrl":null,"url":null,"abstract":"Data anonymization is one of the essential strategies, which is utilized in security protecting data publication. Numerous techniques have been proposed to anonymize various associations' data sets to distribute them autonomously. In any case, a data set is infrequently confined, a nd distributed by numerous associations may get a record of a similar individual. An independently distributed data set may have a little security hazard. Notwithstanding, the blend of two distributed data sets may penetrate people's security, common in informational collections, by composition attack. A couple of researches have been done to forestall it without considering coordination among different associations before data publishing. Even though coordination is a magnificent method to keep away from such issues, associations would prefer not to share their client informational collections with others. In this work, we present a coordination strategy where complete information sharing is not essential. This will successfully beat security concerns. It has been demonstrated tentatively that the proposed strategy anonymizes information to fulfill the security necessity and preserve high data utility than previously proposed models.","PeriodicalId":239251,"journal":{"name":"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A New Coordination Approach to Mitigate Composition Attack\",\"authors\":\"Farah Wahida, A. S. Sattar, Md. Muktar Hossain\",\"doi\":\"10.1109/ICICT4SD50815.2021.9396903\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data anonymization is one of the essential strategies, which is utilized in security protecting data publication. Numerous techniques have been proposed to anonymize various associations' data sets to distribute them autonomously. In any case, a data set is infrequently confined, a nd distributed by numerous associations may get a record of a similar individual. An independently distributed data set may have a little security hazard. Notwithstanding, the blend of two distributed data sets may penetrate people's security, common in informational collections, by composition attack. A couple of researches have been done to forestall it without considering coordination among different associations before data publishing. Even though coordination is a magnificent method to keep away from such issues, associations would prefer not to share their client informational collections with others. In this work, we present a coordination strategy where complete information sharing is not essential. This will successfully beat security concerns. It has been demonstrated tentatively that the proposed strategy anonymizes information to fulfill the security necessity and preserve high data utility than previously proposed models.\",\"PeriodicalId\":239251,\"journal\":{\"name\":\"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-02-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICT4SD50815.2021.9396903\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICT4SD50815.2021.9396903","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A New Coordination Approach to Mitigate Composition Attack
Data anonymization is one of the essential strategies, which is utilized in security protecting data publication. Numerous techniques have been proposed to anonymize various associations' data sets to distribute them autonomously. In any case, a data set is infrequently confined, a nd distributed by numerous associations may get a record of a similar individual. An independently distributed data set may have a little security hazard. Notwithstanding, the blend of two distributed data sets may penetrate people's security, common in informational collections, by composition attack. A couple of researches have been done to forestall it without considering coordination among different associations before data publishing. Even though coordination is a magnificent method to keep away from such issues, associations would prefer not to share their client informational collections with others. In this work, we present a coordination strategy where complete information sharing is not essential. This will successfully beat security concerns. It has been demonstrated tentatively that the proposed strategy anonymizes information to fulfill the security necessity and preserve high data utility than previously proposed models.