Smart City Gnosys

Smart city article details

Title Privacy Preserving Data Utility Mining Architecture
ID_Doc 43122
Authors Aldeen Y.A.A.S.; Salleh M.
Year 2018
Published Smart Cities Cybersecurity and Privacy
DOI http://dx.doi.org/10.1016/B978-0-12-815032-0.00018-4
Abstract Since the creation of the cloud computing (CC) paradigm, there has been a rising interest in the adoption of CC from municipalities and city governments toward their effort to address complex civilian issues. CC is a prolific, service-based delivery of enormous computer processing power and data storage across connected communications channels, and is the most significant technological advancement in the IT industry since the inception of the Internet (web), and more so in the evolution of smart cities. It became feasible to share confidential data records through CC for further analysis and mining. However, data sharing prompted various security threats and concerns that have been imposed via ever-escalating phishing attacks using advanced deception. Supreme cyberspace security solutions and mitigation against such phishing attacks became mandatory due to the momentous impacts on global security and the economy. Intensifying the protection performance, precision, and effectiveness of data mining against such cyber-forgery by lowering computational costs appears challenging. Thus, privacy-preserving data mining has emerged as a new research avenue, where various algorithms are developed to anonymize the data to be mined. The K-anonymizing privacy-preserving approach, being the most prospective one, is widely used to secure data. It preserves published data from being linked back to an individual. Yet, the protection and truthfulness potency of this generalized technique is limited to a tiny output space, and often leads to unacceptable utility loss in cases of strict privacy requirements. To surmount this limitation, we propose a hybrid K-anonymity data relocation algorithm. The data relocation, which is a tradeoff between trustworthiness and utility, acts as a control input parameter. The performance of each K-anonymity’s iteration is measured to decide the feasibility of data relocation, where data rows are changed into small groups of tuples. These tuples, being indistinguishable to each other, create anonymizations of finer granularity with an assured privacy standard. Furthermore, this approach is designed for L-diversity, and (a, K) anonymity. Experimental results demonstrate considerable utility enhancement as a function of a relatively small number of group relocations. © 2019 Elsevier Inc. All rights reserved.
Author Keywords Anonymization; Cloud computing; Privacy; Smart city


Similar Articles


Id Similarity Authors Title Published
54531 View0.89Aldeen Y.A.A.S.; Salleh M.Techniques For Privacy Preserving Data Publication In The Cloud For Smart City ApplicationsSmart Cities Cybersecurity and Privacy (2018)
43184 View0.864Jia J.; Saito K.; Nishi H.Privacy-Preserving Hierarchical Anonymization Framework Over Encrypted DataIEEJ Transactions on Electronics, Information and Systems, 144, 10 (2024)
43162 View0.853Alabdulatif, A; Khalil, I; Kumarage, H; Zomaya, AY; Yi, XPrivacy-Preserving Anomaly Detection In The Cloud For Quality Assured Decision-Making In Smart CitiesJOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 127 (2019)