Privacy Risk Against Composition Attack
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2018, Vol 6, Issue 2
Abstract
Privacy in multiple independent data publishing has attracted considerable research interest in recent years. Although each published data set poses a small privacy risk to individuals, recent studies show that this risk increases when different organizations have some common records and they publish their data sets independently without any coordination with each other. If an individual can be detected from disparate providers, the individual's privacy is compromised. This type of privacy breach is called composition attack. A few studies have done to mitigate this attack. However, none of them studies the risk against this attack from a single data set. Motivated by this gap, this paper uses a probabilistic model to estimate the risk against composition attack from a single data. Therefore, a publisher can predict the risk against composition attack of a data set prior to publication. To evaluate the effectiveness of our model we also perform empirical analysis to show that the estimated risk can give us the pattern of the real risk.
Authors and Affiliations
A H M Sarowar Sattar, Sumyea Helal
Sentimental Analysis of a Sentence
Sentimental examination or assessment mining is a procedure of regular language handling which is utilized to decide the extremity of the content ( i.e, regardless of whether the content is good , negative , or impartia...
Constraints over Greenhouse Detection using Wireless Sensor Networks
Due to uneven natural distribution of rain water it is very crucial for farmers to monitor and control the equal distribution of water to all crops in the whole farm or as per the requirement of the crop. There is no ide...
A New Approach for Task Scheduling of Cloud Computing Using Fuzzy
Cloud Computing is the distributed computing on internet or delivery of computing services over the internet. Cloud computing involves deploying groups of remote servers and software networks that allow centralized data...
Review on Teaching Ethical Hacking
The word hacker generally characterize the practice or performance of investigating & carry out trial with computer networks as computer communications grew more ubiquitous with the emergence of the Internet. However, wh...
Hybrid Application Development using Ionic Framework & AngularJS
A new framework is being used nowadays in order to develop cross platform application since it is extremely cumbersome to form applications for various platforms specifically due to the complications of using Java, Objec...