Privacy Risk Against Composition Attack
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2018, Vol 6, Issue 2
Abstract
Privacy in multiple independent data publishing has attracted considerable research interest in recent years. Although each published data set poses a small privacy risk to individuals, recent studies show that this risk increases when different organizations have some common records and they publish their data sets independently without any coordination with each other. If an individual can be detected from disparate providers, the individual's privacy is compromised. This type of privacy breach is called composition attack. A few studies have done to mitigate this attack. However, none of them studies the risk against this attack from a single data set. Motivated by this gap, this paper uses a probabilistic model to estimate the risk against composition attack from a single data. Therefore, a publisher can predict the risk against composition attack of a data set prior to publication. To evaluate the effectiveness of our model we also perform empirical analysis to show that the estimated risk can give us the pattern of the real risk.
Authors and Affiliations
A H M Sarowar Sattar, Sumyea Helal
A New Residual Convolutional Neural Network-Based Speech Improvement
Among the most crucial methods for denoising a noisy voice signal and enhancing its quality is speech enhancement. This study makes use of Adaptive Residual Neural Network technique to reduces maximum off background nois...
Older Adults Vs Middle-Aged Adults: Step Length
The objective of the present study was to evaluate step length of middle-aged adults and older adults. Ten adults (14 middle age adults and 14 older adults) were recruited from a local community. They were all physically...
FPGA Implementation of High Throughput Lossless Canonical Huffman Machine Decoder
Because there are more data bits and memory operations in modern digital networks, data transport and reception are more complicated, resulting in more data loss and lower throughputs. As a result, the suggested work of...
Detail Study of Cloud Infrastructure Attacks and Security Techniques
Cloud computing is Internet-based computing and the next stage in the evolution of the internet. The uses of the cloud attract different industries in the recent decade, but this brings security challenges against attack...
Adaptive E-Learning Based on Technology of Learning Navigation
E-learning as we know it has been around for ten years or so. During that time, it has emerged from being a radical idea---the effectiveness of which was yet to be proven---to something that is widely regarded as mainstr...