ABSTRACT
Anonymization techniques play a key role in protecting data privacy, especially in a context where more and more personal information is collected and processed. Although anonymization techniques are considered a crucial approach to comply with the aforementioned aspects of privacy laws, these existing anonymization techniques allow for different levels of anonymization, which can change the context of the data, making it impossible to apply smart solution techniques. Within this context, this article presents a cloud service for anonymizing data according to the type of data identified. In addition to the application of existing techniques, the algorithm Clustering Permutation for data Anonymization (CPA) is proposed. Results of experiments using a real cloud environment suggest that the proposed solution is adequate to protect data through data anonymization.
- Ahmed Aleroud, Zhiyuan Chen, and George Karabatis. 2016. Network trace anonymization using a prefix-preserving condensation-based technique. In OTM Confederated International Conferences On the Move to Meaningful Internet Systems. Springer, 934–942. https://doi.org/10.1007/978-3-319-48472-3_59Google ScholarCross Ref
- Wanderson L Costa, Ariel LC Portela, and Rafael L Gomes. 2021. Features-aware DDoS detection in heterogeneous smart environments based on fog and cloud computing. International Journal of Communication Networks and Information Security 13, 3 (2021), 491–498.Google Scholar
- Jinliang Fan, Jun Xu, Mostafa H Ammar, and Sue B Moon. 2004. Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme. Computer Networks 46, 2 (2004), 253–272.Google ScholarDigital Library
- Rafael L Gomes, Luiz F Bittencourt, and Edmundo RM Madeira. 2020. Reliability-aware network slicing in elastic demand scenarios. IEEE Communications Magazine 58, 10 (2020), 29–34.Google ScholarCross Ref
- Rafael Lopes Gomes and Edmundo Madeira. 2011. An automatic SLA negotiation protocol for a Future Internet. In 2011 IEEE Third Latin-American Conference on Communications. 1–6. https://doi.org/10.1109/LatinCOM.2011.6107410Google ScholarCross Ref
- Chenxi Huang, Sirui Chen, Yaqing Zhang, Wen Zhou, Joel J. P. C. Rodrigues, and Victor Hugo C. de Albuquerque. 2022. A Robust Approach for Privacy Data Protection: IoT Security Assurance Using Generative Adversarial Imitation Learning. IEEE Internet of Things Journal 9, 18 (2022), 17089–17097. https://doi.org/10.1109/JIOT.2021.3128531Google ScholarCross Ref
- Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian. 2007. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. In 2007 IEEE 23rd International Conference on Data Engineering. 106–115. https://doi.org/10.1109/ICDE.2007.367856Google ScholarCross Ref
- Zoltán Ádám Mann, Florian Kunz, Jan Laufer, Julian Bellendorf, Andreas Metzger, and Klaus Pohl. 2021. RADAR: Data Protection in Cloud-Based Computer Systems at Run Time. IEEE Access 9 (2021), 70816–70842. https://doi.org/10.1109/ACCESS.2021.3078059Google ScholarCross Ref
- Diego AB Moreira, Humberto P Marques, Wanderson L Costa, Joaquim Celestino, Rafael L Gomes, and Michele Nogueira. 2021. Anomaly detection in smart environments using AI over fog and cloud computing. In 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC). IEEE, 1–2.Google ScholarDigital Library
- Emmanuel Boateng Sifah, Qi Xia, Hu Xia, Kwame Opuni-Boachie Obour Agyekum, Kingsley Nketia Acheampong, Christian Nii Aflah Cobblah, and Jianbin Gao. 2021. Selective Sharing of Outsourced Encrypted Data in Cloud Environments. IEEE Internet of Things Journal 8, 18 (2021), 14141–14155. https://doi.org/10.1109/JIOT.2021.3068226Google ScholarCross Ref
- Adam Slagell, Kiran Lakkaraju, and Katherine Luo. 2006. FLAIM: A Multi-Level Anonymization Framework for Computer and Network Logs. In Proceedings of the 20th Conference on Large Installation System Administration (Washington, DC) (LISA ’06). USENIX Association, USA, 6.Google Scholar
- Tian Wang, Quan Yang, Xuewei Shen, Thippa Reddy Gadekallu, Weizheng Wang, and Kapal Dev. 2022. A Privacy-Enhanced Retrieval Technology for the Cloud-Assisted Internet of Things. IEEE Transactions on Industrial Informatics 18, 7 (2022), 4981–4989. https://doi.org/10.1109/TII.2021.3103547Google ScholarCross Ref
- Jun Xu, Jinliang Fan, M.H. Ammar, and S.B. Moon. 2002. Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme. In 10th IEEE International Conference on Network Protocols, 2002. Proceedings.280–289. https://doi.org/10.1109/ICNP.2002.1181415Google ScholarCross Ref
Index Terms
- An Anonymization Service for Privacy in Data Mining
Recommendations
IMR based Anonymization for Privacy Preservation in Data Mining
KMO '16: Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting SocietyPrivacy Preserving Data Mining (PPDM) is a data mining research area that aims to protect individual's personal information from unsolicited or unauthorized disclosure. Privacy relates to personal information that a person would not wish others to know ...
From t-closeness to differential privacy and vice versa in data anonymization
k-anonymity and ε-differential privacy are two mainstream privacy models, the former introduced to anonymize data sets and the latter to limit the knowledge gain that results from including one individual in the data set. Whereas basic k-anonymity only ...
Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects
ICCCT '12: Proceedings of the 2012 Third International Conference on Computer and Communication TechnologyPrivacy preserving has originated as an important concern with reference to the success of the data mining. Privacy preserving data mining (PPDM) deals with protecting the privacy of individual data or sensitive knowledge without sacrificing the utility ...
Comments