Finding the Sweet Spot for Data Anonymization: A Mechanism Design Perspective

01/29/2021
by   Abdelrahman Eldosouky, et al.
0

Data sharing between different organizations is an essential process in today's connected world. However, recently there were many concerns about data sharing as sharing sensitive information can jeopardize users' privacy. To preserve the privacy, organizations use anonymization techniques to conceal users' sensitive data. However, these techniques are vulnerable to de-anonymization attacks which aim to identify individual records within a dataset. In this paper, a two-tier mathematical framework is proposed for analyzing and mitigating the de-anonymization attacks, by studying the interactions between sharing organizations, data collector, and a prospective attacker. In the first level, a game-theoretic model is proposed to enable sharing organizations to optimally select their anonymization levels for k-anonymization under two potential attacks: background-knowledge attack and homogeneity attack. In the second level, a contract-theoretic model is proposed to enable the data collector to optimally reward the organizations for their data. The formulated problems are studied under single-time sharing and repeated sharing scenarios. Different Nash equilibria for the proposed game and the optimal solution of the contract-based problem are analytically derived for both scenarios. Simulation results show that the organizations can optimally select their anonymization levels, while the data collector can benefit from incentivizing the organizations to share their data.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/03/2021

Cybersecurity Information Exchange with Privacy (CYBEX-P) and TAHOE – A Cyberthreat Language

Cybersecurity information sharing (CIS) is envisioned to protect organiz...
research
01/03/2019

Draining the Water Hole: Mitigating Social Engineering Attacks

Cyber adversaries have increasingly leveraged social engineering attacks...
research
03/24/2021

TRADE: TRusted Anonymous Data Exchange: Threat Sharing Using Blockchain Technology

Cyber attacks are becoming more frequent and sophisticated, introducing ...
research
07/10/2020

Mechanisms for Hiding Sensitive Genotypes with Information-Theoretic Privacy

The growing availability of personal genomics services comes with increa...
research
07/16/2022

Sotto Voce: Federated Speech Recognition with Differential Privacy Guarantees

Speech data is expensive to collect, and incredibly sensitive to its sou...
research
02/28/2018

A Frequent Itemset Hiding Toolbox

Advances in data collection and data storage technologies have given way...
research
09/22/2021

DARSI: An Ontology for Facilitating the Development of Data Sharing and Use Agreements

The advantages of data sharing across organizations and disciplines are ...

Please sign up or login with your details

Forgot password? Click here to reset