Privacy Risk Against Composition Attack

Abstract

Privacy in multiple independent data publishing has attracted considerable research interest in recent years. Although each published data set poses a small privacy risk to individuals, recent studies show that this risk increases when different organizations have some common records and they publish their data sets independently without any coordination with each other. If an individual can be detected from disparate providers, the individual's privacy is compromised. This type of privacy breach is called composition attack. A few studies have done to mitigate this attack. However, none of them studies the risk against this attack from a single data set. Motivated by this gap, this paper uses a probabilistic model to estimate the risk against composition attack from a single data. Therefore, a publisher can predict the risk against composition attack of a data set prior to publication. To evaluate the effectiveness of our model we also perform empirical analysis to show that the estimated risk can give us the pattern of the real risk.

Authors and Affiliations

A H M Sarowar Sattar, Sumyea Helal

Keywords

Related Articles

PV Power Generation for an Agricultural Load

India is the 6th largest economy of the world. As per the data 49% of manpower is employed in farming, where as the farming sector contribution to the GDP is merely 16%. This is because of two main causes one is the disg...

Automation of Electroplating Technique Using P.L.C.

Electroplating technique is widely utilized in various industries for the purpose of coating metal objects with a thin layer of a different metal’s. The layer of metal deposited has some desired property, which the metal...

A Review on Image Segmentation Technique

Making a segment of an image or any object is what segmentation is all about. The first stages in image segmentation are pattern recognition and picture analysis. We may conduct significant research topics in the segment...

Image Processing for Signature Verification

As signature is the primary mechanism both for authentication and authorization in legal transactions, the need for efficient auto-mated solutions for signature verification has increased [3]. Unlike a password, PIN, PKI...

Comparisons of Standard Time and MOST for Mill and Skive Housing Operation

The purpose of this study was to compare time study and motion study for mill and skive housing operation and to recommend the improvement methodologies for the productivity of the operation. The original time study and...

Download PDF file
  • EP ID EP748154
  • DOI 10.21276/ijircst.2018.6.2.3
  • Views 27
  • Downloads 0

How To Cite

A H M Sarowar Sattar, Sumyea Helal (2018). Privacy Risk Against Composition Attack. International Journal of Innovative Research in Computer Science and Technology, 6(2), -. https://europub.co.uk/articles/-A-748154