Secure k-Anonymization over Encrypted Databases

08/10/2021
by   Manish Kesarwani, et al.
0

Data protection algorithms are becoming increasingly important to support modern business needs for facilitating data sharing and data monetization. Anonymization is an important step before data sharing. Several organizations leverage on third parties for storing and managing data. However, third parties are often not trusted to store plaintext personal and sensitive data; data encryption is widely adopted to protect against intentional and unintentional attempts to read personal/sensitive data. Traditional encryption schemes do not support operations over the ciphertexts and thus anonymizing encrypted datasets is not feasible with current approaches. This paper explores the feasibility and depth of implementing a privacy-preserving data publishing workflow over encrypted datasets leveraging on homomorphic encryption. We demonstrate how we can achieve uniqueness discovery, data masking, differential privacy and k-anonymity over encrypted data requiring zero knowledge about the original values. We prove that the security protocols followed by our approach provide strong guarantees against inference attacks. Finally, we experimentally demonstrate the performance of our data publishing workflow components.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/04/2022

Privacy-Preserving Chaotic Extreme Learning Machine with Fully Homomorphic Encryption

The Machine Learning and Deep Learning Models require a lot of data for ...
research
11/13/2020

Practical Privacy-Preserving Data Science With Homomorphic Encryption: An Overview

Privacy has gained a growing interest nowadays due to the increasing and...
research
11/14/2019

Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets

Outlier detection is widely used in practice to track the anomaly on inc...
research
09/16/2021

Reinforcement Learning on Encrypted Data

The growing number of applications of Reinforcement Learning (RL) in rea...
research
11/07/2017

StealthDB: a Scalable Encrypted Database with Full SQL Query Support

Encrypted database systems provide a great method for protecting sensiti...
research
02/09/2021

Avaddon ransomware: an in-depth analysis and decryption of infected systems

The commoditization of Malware-as-a-Service (MaaS) allows criminals to o...
research
01/23/2020

Data Inference from Encrypted Databases: A Multi-dimensional Order-Preserving Matching Approach

Due to increasing concerns of data privacy, databases are being encrypte...

Please sign up or login with your details

Forgot password? Click here to reset