Privacy Risk Against Composition Attack
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2018, Vol 6, Issue 2
Abstract
Privacy in multiple independent data publishing has attracted considerable research interest in recent years. Although each published data set poses a small privacy risk to individuals, recent studies show that this risk increases when different organizations have some common records and they publish their data sets independently without any coordination with each other. If an individual can be detected from disparate providers, the individual's privacy is compromised. This type of privacy breach is called composition attack. A few studies have done to mitigate this attack. However, none of them studies the risk against this attack from a single data set. Motivated by this gap, this paper uses a probabilistic model to estimate the risk against composition attack from a single data. Therefore, a publisher can predict the risk against composition attack of a data set prior to publication. To evaluate the effectiveness of our model we also perform empirical analysis to show that the estimated risk can give us the pattern of the real risk.
Authors and Affiliations
A H M Sarowar Sattar, Sumyea Helal
PV Power Generation for an Agricultural Load
India is the 6th largest economy of the world. As per the data 49% of manpower is employed in farming, where as the farming sector contribution to the GDP is merely 16%. This is because of two main causes one is the disg...
Automation of Electroplating Technique Using P.L.C.
Electroplating technique is widely utilized in various industries for the purpose of coating metal objects with a thin layer of a different metal’s. The layer of metal deposited has some desired property, which the metal...
A Review on Image Segmentation Technique
Making a segment of an image or any object is what segmentation is all about. The first stages in image segmentation are pattern recognition and picture analysis. We may conduct significant research topics in the segment...
Image Processing for Signature Verification
As signature is the primary mechanism both for authentication and authorization in legal transactions, the need for efficient auto-mated solutions for signature verification has increased [3]. Unlike a password, PIN, PKI...
Comparisons of Standard Time and MOST for Mill and Skive Housing Operation
The purpose of this study was to compare time study and motion study for mill and skive housing operation and to recommend the improvement methodologies for the productivity of the operation. The original time study and...