Score, Arrange, and Cluster: A Novel Clustering-Based Technique for Privacy-Preserving Data Publishing

被引:0
|
作者
Sowmyarani, C. N. [1 ]
Namya, L. G. [1 ]
Nidhi, G. K. [1 ]
Ramakanth Kumar, P. [1 ]
机构
[1] RV Coll Engn, Bengaluru 560059, India
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Data privacy; Publishing; Stakeholders; Clustering algorithms; Data models; Information integrity; Genetic algorithms; Decision making; Homomorphic encryption; Clustering; k-anonymity; data privacy; privacy-preserving data publishing; genetic algorithm; MODEL;
D O I
10.1109/ACCESS.2024.3403372
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data-driven decision-making has become critical to every organization. There is a growing emphasis on adopting robust data governance frameworks for data management. This encompasses data publishing to empower stakeholders with the ability to access and analyze the published data, playing a pivotal role in decision-making. However, data publishing poses a threat to entity-specific information. Privacy-Preserving Data Publishing (PPDP) refers to publishing data while protecting the privacy of entity-specific information. K-anonymity is a well-recognized method that achieves PPDP and serves as the foundation of our proposed clustering-based data transformation algorithm, "Score, Arrange, and Cluster (SAC)". For effective data management and decision-making in organizations, it is crucial to address the varying data requirements and role-based access levels of the involved stakeholders. SAC was designed to offer only a generic data transformation with minimal data quality degradation. Hence, this work presents an enhancement to SAC that takes into account stakeholder roles and requirements, as illustrated through different scenarios. The scoring mechanism in SAC is augmented to accommodate customization or use the concepts of Genetic Algorithms to enforce role-based access control. The "Cost of Degradation" (CoD) metric is used to quantify the data quality degradation. As per the experimental results, in the customization scenario, a higher attribute priority leads to lower data quality degradation, while, in the role-based access control scenario a higher access level results in a lower data quality degradation.
引用
收藏
页码:79861 / 79874
页数:14
相关论文
共 50 条
  • [31] Personalized Privacy-Preserving Trajectory Data Publishing
    LU Qiwei
    WANG Caimei
    XIONG Yan
    XIA Huihua
    HUANG Wenchao
    GONG Xudong
    Chinese Journal of Electronics, 2017, 26 (02) : 285 - 291
  • [32] Towards Privacy-Preserving Speech Data Publishing
    Qian, Jianwei
    Han, Feng
    Hou, Jiahui
    Zhang, Chunhong
    Wang, Yu
    Li, Xiang-Yang
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1088 - 1096
  • [33] DATA MINING AS A TOOL IN PRIVACY-PRESERVING DATA PUBLISHING
    Sramka, Michal
    NILCRYPT 10, 2010, 45 : 151 - 159
  • [34] Maximum delay anonymous clustering feature tree based privacy-preserving data publishing in social networks
    Zhang, Jinquan
    Zhao, Bowen
    Song, Guochao
    Ni, Lina
    Yu, Jiguo
    2018 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS, 2019, 147 : 643 - 646
  • [35] An efficient method for privacy-preserving trajectory data publishing based on data partitioning
    Songyuan Li
    Hong Shen
    Yingpeng Sang
    Hui Tian
    The Journal of Supercomputing, 2020, 76 : 5276 - 5300
  • [36] An efficient method for privacy-preserving trajectory data publishing based on data partitioning
    Li, Songyuan
    Shen, Hong
    Sang, Yingpeng
    Tian, Hui
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (07): : 5276 - 5300
  • [37] A Targeted Privacy-Preserving Data Publishing Method Based on Bayesian Network
    Zhou, Zhigang
    Wang, Yu
    Yu, Xiao
    Miao, Junzhong
    IEEE ACCESS, 2022, 10 : 89555 - 89567
  • [38] Analyzing mechanism-based attacks in privacy-preserving data publishing
    Li, Hongtao
    Ma, Jianfeng
    Fu, Shuai
    OPTIK, 2013, 124 (24): : 6939 - 6945
  • [39] Clustering-based privacy preserving anonymity approach for table data sharing
    Piao, Chunhui
    Liu, Liping
    Shi, Yajuan
    Jiang, Xuehong
    Song, Ning
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2020, 11 (04) : 768 - 773
  • [40] Novel trajectory privacy-preserving method based on clustering using differential privacy
    Zhao, Xiaodong
    Pi, Dechang
    Chen, Junfu
    EXPERT SYSTEMS WITH APPLICATIONS, 2020, 149