TY - JOUR
T1 - An efficient privacy preserving protocol for dynamic continuous data collection
AU - Sajjad, Haider
AU - Kanwal, Tehsin
AU - Anjum, A.
AU - Malik, Saif ur Rehman
AU - Khan, A.
AU - Khan, Abid
AU - Manzoor, Umar
PY - 2019/9
Y1 - 2019/9
N2 - Past and ongoing decades have witnessed significant uplift in data generation due to ever growing sources of data. Collection and aggradation of such huge data have triggered serious concerns on privacy of data-owners’ sensitive information. Catering this, several existing anonymization models proffer privacy-preserving data collection. However, the models put-forth either strict or unrealistic assumptions regarding leaders’ selection (the concept of first and last leaders in data collection process). In this paper, we have identified and formally defined a privacy attack, Leader Collusion Attack (LCA); where first and second leaders may collude to breech individuals’ privacy during data collection process. In this regard, we have proposed a novel k-anonymity based dynamic data collection protocol (presented single leader election) to mitigate LCA. Moreover, we have formally modelled and analysed the proposed protocol through HLPNs and demonstrated the mitigation of LCA. Experimentations on real-world datasets advocate the outperformance of our protocol over existing model in terms of better utility and privacy levels.
AB - Past and ongoing decades have witnessed significant uplift in data generation due to ever growing sources of data. Collection and aggradation of such huge data have triggered serious concerns on privacy of data-owners’ sensitive information. Catering this, several existing anonymization models proffer privacy-preserving data collection. However, the models put-forth either strict or unrealistic assumptions regarding leaders’ selection (the concept of first and last leaders in data collection process). In this paper, we have identified and formally defined a privacy attack, Leader Collusion Attack (LCA); where first and second leaders may collude to breech individuals’ privacy during data collection process. In this regard, we have proposed a novel k-anonymity based dynamic data collection protocol (presented single leader election) to mitigate LCA. Moreover, we have formally modelled and analysed the proposed protocol through HLPNs and demonstrated the mitigation of LCA. Experimentations on real-world datasets advocate the outperformance of our protocol over existing model in terms of better utility and privacy levels.
KW - Anonymization
KW - Data privacy
KW - k-anonymity
KW - Privacy preserving data collection
UR - https://www.sciencedirect.com/science/article/pii/S0167404819301312
UR - http://www.scopus.com/inward/record.url?scp=85068738598&partnerID=8YFLogxK
U2 - 10.1016/j.cose.2019.06.017
DO - 10.1016/j.cose.2019.06.017
M3 - Article
AN - SCOPUS:85068738598
SN - 0167-4048
VL - 86
SP - 358
EP - 371
JO - Computers and Security
JF - Computers and Security
ER -