Quantifying the Vulnerability of Attributes for Effective Privacy Preservation Using Machine Learning
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Majeed, Abdul | - |
dc.contributor.author | Hwang, Seong Oun | - |
dc.date.accessioned | 2023-03-14T06:40:22Z | - |
dc.date.available | 2023-03-14T06:40:22Z | - |
dc.date.created | 2023-03-14 | - |
dc.date.issued | 2023-01 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/87078 | - |
dc.description.abstract | Personal data have been increasingly used in data-driven applications to improve quality of life. However, privacy preservation of personal data while sharing it with analysts/ researchers has become an essential requirement to be met by data owners (hospitals, banks, insurance companies, etc.). The existing literature on privacy preservation does not precisely quantify the vulnerability of each item among user attributes, thereby leading to explicit privacy disclosures and poor data utility during published data analytics. In this work, we propose and implement an automated way of quantifying the vulnerability of each item among the attributes by using a machine learning (ML) technique to significantly preserve the privacy of users without degrading data utility. Our work can solve four technical problems in the privacy preservation field: optimization of the privacy-utility trade-off, privacy guarantees (i.e., safeguard against identity and sensitive information disclosures) in imbalanced data (or clusters), over-anonymization issues, and rectifying or enabling the applicability of prior privacy models when data have skewed distributions. The experiments were performed on two real-world benchmark datasets to prove the feasibility of the concept in practical scenarios. Compared with state-of-the-art (SOTA) methods, the proposed method effectively preserves the equilibrium between utility and privacy in the anonymized data. Furthermore, our method can significantly contribute towards responsible data science (extracting enclosed knowledge from data without violating subjects' privacy) by controlling higher changes in data during its anonymization. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.relation.isPartOf | IEEE ACCESS | - |
dc.title | Quantifying the Vulnerability of Attributes for Effective Privacy Preservation Using Machine Learning | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000917220900001 | - |
dc.identifier.doi | 10.1109/ACCESS.2023.3235016 | - |
dc.identifier.bibliographicCitation | IEEE ACCESS, v.11, pp.4400 - 4411 | - |
dc.description.isOpenAccess | Y | - |
dc.identifier.scopusid | 2-s2.0-85147274275 | - |
dc.citation.endPage | 4411 | - |
dc.citation.startPage | 4400 | - |
dc.citation.title | IEEE ACCESS | - |
dc.citation.volume | 11 | - |
dc.contributor.affiliatedAuthor | Majeed, Abdul | - |
dc.contributor.affiliatedAuthor | Hwang, Seong Oun | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Data privacy | - |
dc.subject.keywordAuthor | Information integrity | - |
dc.subject.keywordAuthor | Information filtering | - |
dc.subject.keywordAuthor | Codes | - |
dc.subject.keywordAuthor | Machine learning | - |
dc.subject.keywordAuthor | Data models | - |
dc.subject.keywordAuthor | Data science | - |
dc.subject.keywordAuthor | Personal data | - |
dc.subject.keywordAuthor | privacy | - |
dc.subject.keywordAuthor | utility | - |
dc.subject.keywordAuthor | anonymization | - |
dc.subject.keywordAuthor | vulnerability | - |
dc.subject.keywordAuthor | machine learning | - |
dc.subject.keywordAuthor | responsible data science | - |
dc.subject.keywordAuthor | data owners | - |
dc.subject.keywordAuthor | privacy-utility trade-off | - |
dc.subject.keywordAuthor | imbalanced data | - |
dc.subject.keywordAuthor | privacy models | - |
dc.subject.keywordPlus | K-ANONYMITY | - |
dc.subject.keywordPlus | MODEL | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.