Anonymity-based privacy preserving network data publication
Paper
Paper/Presentation Title | Anonymity-based privacy preserving network data publication |
---|---|
Presentation Type | Paper |
Authors | Liu, Peng (Author), Li, Yidong (Author), Sang, Yingpeng (Author) and Zhang, Ji (Author) |
Journal or Proceedings Title | Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016) |
ERA Conference ID | 43091 |
Number of Pages | 6 |
Year | 2016 |
Place of Publication | Los Alamitos, CA. United States |
Digital Object Identifier (DOI) | https://doi.org/10.1109/TrustCom.2016.0144 |
Web Address (URL) of Paper | http://ieeexplore.ieee.org/document/7847027/ |
Conference/Event | 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016) |
IEEE/IFIP International Symposium on Trusted Computing and Communications | |
Event Details | IEEE/IFIP International Symposium on Trusted Computing and Communications TrustCom Rank A A A A A |
Event Details | 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016) Event Date 23 to end of 26 Aug 2016 Event Location Tianjin, China |
Abstract | Network trace data provide valuable information which contributes to model the network behaviors, defend network attacks and develop new protocols, so releasing the data of network trace is highly demanded by researchers and organizations to promote the development of the network technologies. However, due to the sensitive nature of network trace data, it is a potential risk for organizations to publish the original data which may expose their commercial confidentiality and the customers' privacy within their networks. Several methods to defend the network trace attacks such as statistical fingerprinting and injection have been proposed, unfortunately, they are not enough to protect the privacy because the correspondence between the source and destination IP addresses can also help the adversary to identify the target host. In this paper, we extract the inherent graph structure between the source and destination IP addresses in network trace data, and use k-anonymity to prevent the target host from being identified. Combined with other protection techniques, our method can also prevent the fingerprinting and injection attacks. |
Keywords | IP networks; measurement; bipartite graph; cryptography; data privacy; data models; organizations |
ANZSRC Field of Research 2020 | 469999. Other information and computing sciences not elsewhere classified |
Public Notes | © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Byline Affiliations | Beijing Jiaotong University, China |
Sun Yat-sen University, China | |
School of Agricultural, Computational and Environmental Sciences | |
Institution of Origin | University of Southern Queensland |
https://research.usq.edu.au/item/q3x5v/anonymity-based-privacy-preserving-network-data-publication
1512
total views12
total downloads1
views this month0
downloads this month