skip to main content
10.1145/3615366.3625074acmotherconferencesArticle/Chapter ViewAbstractPublication PagesladcConference Proceedingsconference-collections
research-article

An Anonymization Service for Privacy in Data Mining

Published:17 October 2023Publication History

ABSTRACT

Anonymization techniques play a key role in protecting data privacy, especially in a context where more and more personal information is collected and processed. Although anonymization techniques are considered a crucial approach to comply with the aforementioned aspects of privacy laws, these existing anonymization techniques allow for different levels of anonymization, which can change the context of the data, making it impossible to apply smart solution techniques. Within this context, this article presents a cloud service for anonymizing data according to the type of data identified. In addition to the application of existing techniques, the algorithm Clustering Permutation for data Anonymization (CPA) is proposed. Results of experiments using a real cloud environment suggest that the proposed solution is adequate to protect data through data anonymization.

References

  1. Ahmed Aleroud, Zhiyuan Chen, and George Karabatis. 2016. Network trace anonymization using a prefix-preserving condensation-based technique. In OTM Confederated International Conferences On the Move to Meaningful Internet Systems. Springer, 934–942. https://doi.org/10.1007/978-3-319-48472-3_59Google ScholarGoogle ScholarCross RefCross Ref
  2. Wanderson L Costa, Ariel LC Portela, and Rafael L Gomes. 2021. Features-aware DDoS detection in heterogeneous smart environments based on fog and cloud computing. International Journal of Communication Networks and Information Security 13, 3 (2021), 491–498.Google ScholarGoogle Scholar
  3. Jinliang Fan, Jun Xu, Mostafa H Ammar, and Sue B Moon. 2004. Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme. Computer Networks 46, 2 (2004), 253–272.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Rafael L Gomes, Luiz F Bittencourt, and Edmundo RM Madeira. 2020. Reliability-aware network slicing in elastic demand scenarios. IEEE Communications Magazine 58, 10 (2020), 29–34.Google ScholarGoogle ScholarCross RefCross Ref
  5. Rafael Lopes Gomes and Edmundo Madeira. 2011. An automatic SLA negotiation protocol for a Future Internet. In 2011 IEEE Third Latin-American Conference on Communications. 1–6. https://doi.org/10.1109/LatinCOM.2011.6107410Google ScholarGoogle ScholarCross RefCross Ref
  6. Chenxi Huang, Sirui Chen, Yaqing Zhang, Wen Zhou, Joel J. P. C. Rodrigues, and Victor Hugo C. de Albuquerque. 2022. A Robust Approach for Privacy Data Protection: IoT Security Assurance Using Generative Adversarial Imitation Learning. IEEE Internet of Things Journal 9, 18 (2022), 17089–17097. https://doi.org/10.1109/JIOT.2021.3128531Google ScholarGoogle ScholarCross RefCross Ref
  7. Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian. 2007. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. In 2007 IEEE 23rd International Conference on Data Engineering. 106–115. https://doi.org/10.1109/ICDE.2007.367856Google ScholarGoogle ScholarCross RefCross Ref
  8. Zoltán Ádám Mann, Florian Kunz, Jan Laufer, Julian Bellendorf, Andreas Metzger, and Klaus Pohl. 2021. RADAR: Data Protection in Cloud-Based Computer Systems at Run Time. IEEE Access 9 (2021), 70816–70842. https://doi.org/10.1109/ACCESS.2021.3078059Google ScholarGoogle ScholarCross RefCross Ref
  9. Diego AB Moreira, Humberto P Marques, Wanderson L Costa, Joaquim Celestino, Rafael L Gomes, and Michele Nogueira. 2021. Anomaly detection in smart environments using AI over fog and cloud computing. In 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC). IEEE, 1–2.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Emmanuel Boateng Sifah, Qi Xia, Hu Xia, Kwame Opuni-Boachie Obour Agyekum, Kingsley Nketia Acheampong, Christian Nii Aflah Cobblah, and Jianbin Gao. 2021. Selective Sharing of Outsourced Encrypted Data in Cloud Environments. IEEE Internet of Things Journal 8, 18 (2021), 14141–14155. https://doi.org/10.1109/JIOT.2021.3068226Google ScholarGoogle ScholarCross RefCross Ref
  11. Adam Slagell, Kiran Lakkaraju, and Katherine Luo. 2006. FLAIM: A Multi-Level Anonymization Framework for Computer and Network Logs. In Proceedings of the 20th Conference on Large Installation System Administration (Washington, DC) (LISA ’06). USENIX Association, USA, 6.Google ScholarGoogle Scholar
  12. Tian Wang, Quan Yang, Xuewei Shen, Thippa Reddy Gadekallu, Weizheng Wang, and Kapal Dev. 2022. A Privacy-Enhanced Retrieval Technology for the Cloud-Assisted Internet of Things. IEEE Transactions on Industrial Informatics 18, 7 (2022), 4981–4989. https://doi.org/10.1109/TII.2021.3103547Google ScholarGoogle ScholarCross RefCross Ref
  13. Jun Xu, Jinliang Fan, M.H. Ammar, and S.B. Moon. 2002. Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme. In 10th IEEE International Conference on Network Protocols, 2002. Proceedings.280–289. https://doi.org/10.1109/ICNP.2002.1181415Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. An Anonymization Service for Privacy in Data Mining

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          LADC '23: Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing
          October 2023
          242 pages
          ISBN:9798400708442
          DOI:10.1145/3615366

          Copyright © 2023 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 17 October 2023

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited
        • Article Metrics

          • Downloads (Last 12 months)30
          • Downloads (Last 6 weeks)5

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format