Login | Register

Anonymizing and Trading Person-specific Data with Trust

Title:

Anonymizing and Trading Person-specific Data with Trust

Khokhar, Rashid Hussain ORCID: https://orcid.org/0000-0002-2941-1239 (2020) Anonymizing and Trading Person-specific Data with Trust. PhD thesis, Concordia University.

[thumbnail of Portable Document Format (PDF)]
Preview
Text (Portable Document Format (PDF)) (application/pdf)
Khokhar_PhD_S2021.pdf - Accepted Version
Available under License Spectrum Terms of Access.
9MB

Abstract

In the past decade, data privacy, security, and trustworthiness have gained tremendous attention from research communities, and these are still active areas of research with the proliferation of cloud services and social media applications. The data is growing at a rapid pace. It has become an integral part of almost every industry and business, including commercial and non-profit organizations. It often contains person-specific information and a data custodian who holds it must be responsible for managing its use, disclosure, accuracy and privacy protection. In this thesis, we present three research problems. The first two problems address the concerns of stakeholders on privacy protection, data trustworthiness, and profit distribution in the online market for trading person-specific data. The third problem addresses the health information custodians (HICs) concern on privacy-preserving healthcare network data publishing.
Our first research problem is identified in cloud-based data integration service where data providers collaborate with their trading partners in order to deliver quality data mining services. Data-as-a-Service (DaaS) enables data integration to serve the demands of data consumers. Data providers face challenges not only to protect private data over the cloud but also to legally adhere to privacy compliance rules when trading person-specific data. We propose a model that allows the collaboration of multiple data providers for integrating their data and derives the contribution of each data provider by valuating the incorporated cost factors. This model serves as a guide for business decision-making, such as estimating the potential privacy risk and finding the sub-optimal value for publishing mashup data. Experiments on real-life data demonstrate that our approach can identify the sub-optimal value in data mashup for different privacy models, including K-anonymity, LKC-privacy, and ϵ-differential privacy, with various anonymization algorithms and privacy parameters.
Second, consumers demand a good quality of data for accurate analysis and effective decision- making while the data providers intend to maximize their profits by competing with peer providers. In addition, the data providers or custodians must conform to privacy policies to avoid potential penalties for privacy breaches. To address these challenges, we propose a two-fold solution: (1) we present the first information entropy-based trust computation algorithm, IEB_Trust, that allows a semi-trusted arbitrator to detect the covert behavior of a dishonest data provider and chooses the qualified providers for a data mashup, and (2) we incorporate the Vickrey-Clarke-Groves (VCG) auction mechanism for the valuation of data providers’ attributes into the data mashup process. Experiments on real-life data demonstrate the robustness of our approach in restricting dishonest providers from participation in the data mashup and improving the efficiency in comparison to provenance-based approaches. Furthermore, we derive the monetary shares for the chosen providers from their information utility and trust scores over the differentially private release of the integrated dataset under their joint privacy requirements.
Finally, we address the concerns of HICs of exchanging healthcare data to provide better and more timely services while mitigating the risk of exposing patients’ sensitive information to privacy threats. We first model a complex healthcare dataset using a heterogeneous information network that consists of multi-type entities and their relationships. We then propose DiffHetNet, an edge-based differentially private algorithm, to protect the sensitive links of patients from inbound and outbound attacks in the heterogeneous health network. We evaluate the performance of our proposed method in terms of information utility and efficiency on different types of real-life datasets that can be modeled as networks. Experimental results suggest that DiffHetNet generally yields less information loss and is significantly more efficient in terms of runtime in comparison with existing network anonymization methods. Furthermore, DiffHetNet is scalable to large network datasets.

Divisions:Concordia University > Gina Cody School of Engineering and Computer Science > Concordia Institute for Information Systems Engineering
Concordia University > Research Units > Computer Security Laboratory
Item Type:Thesis (PhD)
Authors:Khokhar, Rashid Hussain
Institution:Concordia University
Degree Name:Ph. D.
Program:Information and Systems Engineering
Date:14 September 2020
Thesis Supervisor(s):Fung, Benjamin C. M. and Bentahar, Jamal
Keywords:Data privacy, data utility, data mashup, business model, data trustworthiness, monetary valuation, heterogeneous information network, healthcare data
ID Code:987633
Deposited By: RASHID HUSSAIN KHOKHAR
Deposited On:29 Jun 2021 20:47
Last Modified:29 Jun 2021 20:47

References:

[1] Review of the Personal Data (Privacy) Ordinance. Office of the Privacy Commissioner for Personal Data, Hong Kong, 2009.
[2] Personal Data Privacy and Security Act. Bill S.1151 - 112th Congress in the Senate of the United States, 2011.
[3] Data Management Platforms Buyer’s Guide. Econsultancy Digital Marketing Excellence, 2013.
[4] Exploring the Economics of Personal Data: A Survey of Methodologies for Measuring Monetary Value. OECD Digital Economy Papers, (220), 2013.
[5] A Legal Guide to Privacy and Data Security. Minnesota Department of Employment and Economic Development, Gray Plant Mooty, 2014.
[6] Data Partners. Seventh Point, 2014. URL http://www.seventhpoint.com/ whitepaper/data-partners/. Last accessed: June 11, 2015.
[7] Cost of a Data Breach Report. Ponemon Institute LLC, 2019. Sponsored by IBM Security.
[8] Karim Abouelmehdi, Abderrahim Beni-Hessane, and Hayat Khaloufi. Big Healthcare Data: Preserving Security and Privacy. Journal of Big Data, 5(1):1–18, 2018.
[9] Alessandro Acquisti, Allan Friedman, and Rahul Telang. Is There a Cost to Privacy Breaches? An Event Study. In Proceedings of the 27th International Conference on Information, 2006.
[10] Charu C. Aggarwal. On k-Anonymity and the Curse of Dimensionality. In Proceedings of the 31st International Conference on Very Large Data Bases, pages 901–909. VLDB Endowment, 2005.
[11] Rakesh Agrawal, Alexandre Evfimievski, and Ramakrishnan Srikant. Information Sharing across Private Databases. In Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, pages 86–97. ACM, 2003.
[12] Khalil Al-Hussaeni, Benjamin C. M. Fung, and William K. Cheung. Privacy-preserving Trajectory Stream Publishing. Data and Knowledge Engineering, 94:89–109, 2014.
[13] Khalil Al-Hussaeni, Benjamin C. M. Fung, Farkhund Iqbal, Gaby G. Dagher, and Eun G. Park. SafePath: Differentially Private Publishing of Passenger Trajectories in Transportation Systems. Computer Networks, 143:126–139, 2018.
[14] Dima Alhadidi, Noman Mohammed, Benjamin C. M. Fung, and Mourad Debbabi. Secure Distributed Framework for Achieving E-Differential Privacy. In Proceedings of the 12th International Symposium on Privacy Enhancing Technologies, pages 120–139. Springer, 2012.
[15] Hussain Aljafer, Zaki Malik, Mohammed Alodib, and Abdelmounaam Rezgui. A Brief Overview and an Experimental Evaluation of Data Confidentiality Measures on the Cloud. Journal of Innovation in Digital Ecosystems, 1(1–2):1–11, 2014.
[16] Sarah A. Alkhodair, Steven H. H. Ding, Benjamin C. M. Fung, and Junqiang Liu. Detecting Breaking News Rumors of Emerging Topics in Social Media. Information Processing and Management, 57(2):102018, 2020.
[17] Rebecca R. Andridge and Roderick J. A. Little. A Review of Hot Deck Imputation for Survey Non-response. International Statistical Review, 78(1):40–64, 2010.
[18] Marco Anisetti, Claudio A. Ardagna, and Ernesto Damiani. A Certification-based Trust Model for Autonomic Cloud Computing Systems. In Proceedings of the 2014 International Conference on Cloud and Autonomic Computing, pages 212–219, 2014.
[19] Mahtab Arafati, Gaby G. Dagher, Benjamin C. M. Fung, and Patrick C. K. Hung. D-Mash: A Framework for Privacy-preserving Data-as-a-Service Mashups. In Proceedings of the 7th IEEE International Conference on Cloud Computing, pages 498–505. IEEE Computer Society, 2014.
[20] Roland Assam, Marwan Hassani, Michael Brysch, and Thomas Seidl. (k, d)-Core Anonymity: Structural Anonymization of Massive Networks. In Proceedings of the 26th International Conference on Scientific and Statistical Database Management. ACM, 2014.
[21] Yonatan Aumann and Yehuda Lindell. Security Against Covert Adversaries: Efficient Proto- cols for Realistic Adversaries. Journal of Cryptology, 23(2):281–343, 2010.
[22] Paige Backman and Karen Levin. Privacy Breaches - Impact, Notification and Strategic Plans. Aird and Berlis LLP, 2011.
[23] Lars Backstrom, Cynthia Dwork, and Jon Kleinberg. Wherefore Art Thou R3579x? Anonymized Social Networks, Hidden Patterns, and Structural Steganography. In Proceedings of the 16th International Conference on World Wide Web, page 181–190. ACM, 2007.
[24] Omar Benjelloun, Anish D. Sarma, Alon Halevy, Martin Theobald, and Jennifer Widom. Databases with Uncertainty and Lineage. The VLDB Journal, 17(2):243–264, 2008.
[25] Lorenzo Beretta and Alessandro Santaniello. Nearest Neighbor Imputation Algorithms: A Critical Evaluation. BMC Medical Informatics and Decision Making, 16(3):74, 2016.
[26] Bibi V. D. Berg and Esther Keymolen. Regulating Security on the Internet: Control versus Trust. International Review of Law, Computers and Technology, 31(2):188–205, 2017.
[27] Elisa Bertino and Hyo-Sang Lim. Assuring Data Trustworthiness: Concepts and Research Challenges. In Proceedings of the 7th VLDB Conference on Secure Data Management, pages 1–12. Springer, 2010.
[28] Elisa Bertino and Ravi Sandhu. Database Security - Concepts, Approaches, and Challenges. IEEE Transactions on Dependable and Secure Computing, 2(1):2–19, 2005.
[29] Elisa Bertino, Lorenzo Martino, Federica Paci, and Anna Squicciarini. Security for Web Services and Service-Oriented Architectures. Springer, 1st edition, 2009.
[30] Ann Bevitt, Karin Retzer, and Joanna Lopatowska. Dealing with Data Breaches in Europe and Beyond. Practical Law Company, 2012.
[31] Anthony E. Boardman, David H. Greenberg, Aidan R. Vining, and David L. Weimer. Cost- Benefit Analysis: Concepts and Practice. Pearson Prentice Hall, 2006.
[32] Dan Boneh and Victor Shoup. A Graduate Course in Applied Cryptography. 2017.
[33] Christian Borgs, Jennifer T. Chayes, and Adam Smith. Private Graphon Estimation for Sparse Graphs. In Proceedings of the 28th International Conference on Neural Information Processing Systems, pages 1369–1377. MIT Press, 2015.
[34] Jordi Casas-Roma, Julian Salas, Fragkiskos D. Malliaros, and Michalis Vazirgiannis. k-Degree Anonymity on Directed Networks. Knowledge and Information Systems, 61(3):1743–1768, 2018.
[35] Victor Chang, Yen-Hung Kuo, and Muthu Ramachandran. Cloud Computing Adoption Framework: A Security Framework for Business Clouds. Future Generation Computer Systems, 57:24–41, 2016.
[36] Rui Chen, Noman Mohammed, Benjamin C. M. Fung, Bipin C. Desai, and Li Xiong. Publish- ing Set-Valued Data via Differential Privacy. The Proceedings of the VLDB Endowment, 4 (11):1087–1098, 2011.
[37] Rui Chen, Benjamin C. M. Fung, Philip S. Yu, and Bipin C. Desai. Correlated Network Data Publication via Differential Privacy. The International Journal on Very Large Data Bases, 23 (4):653–676, 2014.
[38] James Cheng, Ada W. Fu, and Jia Liu. K-isomorphism: Privacy-preserving Network Pub- lication Against Structural Attacks. In Proceedings of the ACM SIGMOD International Conference on Management of Data, pages 459–470. ACM, 2010.
[39] Wendy L. Currie and Jonathan J. M. Seddon. A Cross-Country Study of Cloud Computing Policy and Regulation in Healthcare. In Proceedings of the 22nd European Conference on Information Systems, 2014.
[40] Chenyun Dai, Dan Lin, Elisa Bertino, and Murat Kantarcioglu. An Approach to Evaluate Data Trustworthiness Based on Data Provenance. In Secure Data Management, pages 82–98. Springer, 2008.
[41] Tore Dalenius and Steven P. Reiss. Data-Swapping: A Technique for Disclosure Control. Journal of Statistical Planning and Inference, 6(1):73–85, 1982.
[42] Wei-Yen Day, Ninghui Li, and Min Lyu. Publishing Graph Degree Distribution with Node Differential Privacy. In Proceedings of the 2016 International Conference on Management of Data, page 123–138. ACM, 2016.
[43] Emiliano De-Cristofaro, Paolo Gasti, and Gene Tsudik. Fast and Private Computation of Cardinality of Set Intersection and Union. In Proceedings of the 11th International Conference on Cryptology and Network Security, pages 218–231. Springer, 2012.
[44] Department of Health and Human Services. Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the HITECH Act and the GINA Act; other Modifications to the HIPAA Rules. (78 FR 5565):5565–5702, 2013.
[45] Tim Dierks and Eric Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246, 2008.
[46] Josep Domingo-Ferrer and Josep M. Mateo-Sanz. Practical Data-Oriented Microaggregation for Statistical Disclosure Control. IEEE Transactions on Knowledge and Data Engineering, 14(1):189–201, 2002.
[47] Changyu Dong, Liqun Chen, Jan Camenisch, and Giovanni Russello. Fair Private Set Inter- section with a Semi-Trusted Arbiter. In Proceedings of the 27th International Conference on Data and Applications Security and Privacy, pages 128–144. Springer, 2013.
[48] Changyu Dong, Liqun Chen, and Zikai Wen. When Private Set Intersection Meets Big data: An Efficient and Scalable Protocol. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pages 789–800. ACM, 2013.
[49] Wenliang Du and Zhijun Zhan. Building Decision Tree Classifier on Private Data. In Proceedings of the 2002 IEEE International Conference on Privacy, Security and Data Mining, volume 14, pages 1–8. Australian Computer Society, Inc., 2002.
[50] Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. Calibrating Noise to Sensitivity in Private Data Analysis. In Proceedings of the 3rd Conference on Theory of Cryptography, pages 265–284. Springer, 2006.
[51] David Easley and Jon Kleinberg. Networks, Crowds, and Markets: Reasoning About a Highly Connected World. Cambridge University Press, 2010.
[52] Experian Information Solutions, Inc. The 2018 State of Data Management: A Public Sector Benchmark Report, 2018.
[53] Claudio Feijóo, José L. Gómez-Barroso, and Peter Voigt. Exploring the Economic Value of Personal Information from Firms’ Financial Statements. International Journal of Information Management, 34(2):248–256, 2014.
[54] Raphael A. Finkel and Jon L. Bentley. Quad Trees a Data Structure for Retrieval on Composite Keys. Acta Informatica, 4(1):1–9, 1974.
[55] Michael J. Freedman, Kobbi Nissim, and Benny Pinkas. Efficient Private Matching and Set Intersection. In Proceedings of the 2004 International Conference on the Theory and Applications of Cryptographic Techniques, Advances in Cryptology - EUROCRYPT, pages 1–19. Springer, 2004.
[56] Julien Freudiger, Shantanu Rane, Alejandro E. Brito, and Ersin Uzun. Privacy-preserving Data Quality Assessment for High-fidelity Data Sharing. In Proceedings of the 2014 ACM Workshop on Information Sharing and Collaborative Security, pages 21–29. ACM, 2014.
[57] Arik Friedman and Assaf Schuster. Data Mining with Differential Privacy. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 493–502. ACM, 2010.
[58] Tao-yang Fu, Wang-Chien Lee, and Zhen Lei. HIN2Vec: Explore Meta-paths in Heteroge- neous Information Networks for Representation Learning. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, page 1797–1806. ACM, 2017.
[59] Benjamin C. M. Fung, Ke Wang, and Philip S. Yu. Anonymizing Classification Data for Privacy Preservation. IEEE Transactions on Knowledge Data Engineering, 19(5):711–725, 2007.
[60] Benjamin C. M. Fung, Khalil Al-Hussaeni, and Ming Cao. Preserving RFID Data Privacy. In Proceedings of the 2009 IEEE International Conference on RFID, pages 200–207. IEEE Communications Society, 2009.
[61] Benjamin C. M. Fung, Ke Wang, Rui Chen, and Philip S. Yu. Privacy-preserving Data Publishing: A Survey of Recent Developments. ACM Computing Survey, 42(4):1–53, 2010.
[62] Benjamin C. M. Fung, Thomas Trojer, Patrick C. K. Hung, Li Xiong, Khalil Al-Hussaeni, and Rachida Dssouli. Service-Oriented Architecture for High-dimensional Private Data Mashup. IEEE Transactions on Services Computing, 5(3):373–386, 2012.
[63] Benjamin C. M. Fung, Yan’an Jin, Jiaming Li, and Junqiang Liu. Recommendation and Search in Social Networks, chapter Anonymizing Social Network Data for Maximal Frequent-Sharing Pattern Mining, pages 77–100. Springer, 2015.
[64] Srivatsava R. Ganta, Shiva P. Kasiviswanathan, and Adam Smith. Composition Attacks and Auxiliary Information in Data Privacy. In Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 265–273. ACM, 2008.
[65] Carrie Gates and Peter Matthews. Data Is the New Currency. In Proceedings of the 2014 New Security Paradigms Workshop, pages 105–116. ACM, 2014.
[66] Johannes Gehrke. Programming with Differential Privacy: Technical Perspective. Communi- cations of the ACM, 53(9), 2010.
[67] Moein Ghasemzadeh, Benjamin C. M. Fung, Rui Chen, and Anjali Awasthi. Anonymizing Trajectory Data for Passenger Flow Analysis. Transportation Research Part C: Emerging Technologies, 39:63–79, 2014.
[68] Oded Goldreich. Foundations of Cryptography: Basic Applications, volume 2. Cambridge University Press, 2004.
[69] Aditya Grover and Jure Leskovec. Node2vec: Scalable Feature Learning for Networks. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, page 855–864. ACM, 2016.
[70] Huan Gui, Jialu Liu, Fangbo Tao, Meng Jiang, Brandon Norick, Lance Kaplan, and Jiawei Han. Embedding Learning with Events in Heterogeneous Information Networks. IEEE Transactions on Knowledge and Data Engineering, 29(11):2428–2441, 2017.
[71] Kholekile L. Gwebu, Jing Wang, and Wenjuan Xie. Understanding the Cost Associated with Data Security Breaches. In Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014.
[72] Michael Hay, Chao Li, Gerome Miklau, and David Jensen. Accurate Estimation of the Degree Distribution of Private Networks. In Proceedings of the 9th IEEE International Conference on Data Mining, pages 169–178. IEEE Computer Society, 2009.
[73] Rebecca Herold and Kevin Beaver. The Practical Guide to HIPAA Privacy and Security Compliance. Auerbach, 2nd edition, 2014.
[74] Jack Hirshleifer, Amihai Glazer, and David Hirshleifer. Price Theory and Applications: Decisions, Markets, and Information. Cambridge University Pres, 7th edition, 2005.
[75] Bijit Hore, Ravi C. Jammalamadaka, and Sharad Mehrotra. Flexible Anonymization for Privacy-preserving Data Publishing: A Systematic Search Based Approach. In Proceedings of the 7th SIAM International Conference on Data Mining, 2007.
[76] Jing Hu, Jun Yan, Zhen-Qiang Wu, Hai Liu, and Yi-Hui Zhou. A Privacy-preserving Approach in Friendly-Correlations of Graph Based on Edge-Differential Privacy. Journal of Information Science and Engineering, 35(4):821–837, 2019.
[77] Yuh-Jong Hu, Win-Nan Wu, and Di-Rong Cheng. Towards Law-aware Semantic Cloud Policies with Exceptions for Data Integration and Protection. In Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics, pages 1–12. ACM, 2012.
[78] Yan Huang, David Evans, and Jonathan Katz. Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? In Proceedings of the 19th Network and Distributed System Security Symposium. The Internet Society, 2012.
[79] Lynette A. Hunt. Missing Data Imputation and Its Effect on the Accuracy of Classification. In Data Science, pages 3–14. Springer, 2017.
[80] Yuval Ishai, Joe Kilian, Kobbi Nissim, and Erez Petrank. Extending Oblivious Transfers Efficiently. In Proceedings of the CRYPTO 2003 on Advances in Cryptology, pages 145–161. Springer, 2003.
[81] Ming Ji, Jiawei Han, and Marina Danilevsky. Ranking-based Classification of Heterogeneous Information Networks. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, page 1298–1306. ACM, 2011.
[82] Wei Jiang and Chris Clifton. A Secure Distributed Framework for Achieving k-Anonymity. The VLDB Journal, 15(4):316–333, 2006.
[83] Wenjun Jiang, Guojun Wang, and Jie Wu. Generating Trusted Graphs for Trust Evaluation in Online Social Networks. Future Generation Computer Systems, 31:48–58, 2014. Special Section: Advances in Computer Supported Collaboration: Systems and Technologies.
[84] Alistair E. W. Johnson, Tom J. Pollard, Lu Shen, Li-wei H. Lehman, Mengling Feng, Mo- hammad Ghassemi, Benjamin Moody, Peter Szolovits, Leo A. Celi, and Roger G. Mark. MIMIC-III, A Freely Accessible Critical Care Database. Scientific Data, 3:160035, 2016.
[85] Zach Jorgensen, Ting Yu, and Graham Cormode. Publishing Attributed Social Graphs with Formal Privacy Guarantees. In Proceedings of the International Conference on Management of Data, pages 107–122. ACM, 2016.
[86] Kevin Judd, Michael Small, and Thomas Stemler. What Exactly are the Properties of Scale- Free and Other Networks? EPL (Europhysics Letters), 103(5):58004, 2013.
[87] Pawel Jurczyk and Li Xiong. Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers. In Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pages 191–207. Springer, 2009.
[88] Audun Jøsang, Roslan Ismail, and Colin Boyd. A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems, 43(2):618–644, 2007. Emerging Issues in Collaborative Commerce.
[89] Seny Kamara, Payman Mohassel, and Ben Riva. Salus: A System for Server-aided Se- cure Function Evaluation. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, pages 797–808. ACM, 2012.
[90] Seny Kamara, Payman Mohassel, Mariana Raykova, and Saeed Sadeghian. Scaling Private Set Intersection to Billion-Element Sets. In Proceedings of the 2014 Financial Cryptography and Data Security, pages 195–215. Springer, 2014.
[91] Selcuk Karabati and Zehra B. Yalcin. An Auction Mechanism for Pricing and Capacity Allocation with Multiple Products. Production and Operations Management, 23(1):81–94, 2014.
[92] Shiva P. Kasiviswanathan, Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith. Analyzing Graphs with Node Differential Privacy. In Proceedings of the 10th Theory of Cryptography Conference on Theory of Cryptography, pages 457–476. Springer, 2013.
[93] Vishal Kher and Yongdae Kim. Securing Distributed Storage: Challenges, Techniques, and Systems. In Proceedings of the 2005 ACM Workshop on Storage Security and Survivability, pages 9–25. ACM, 2005.
[94] Rashid H. Khokhar, Rui Chen, Benjamin C. M. Fung, and Siu M. Lui. Quantifying the Costs and Benefits of Privacy-preserving Health Data Publishing. Journal of Biomedical Informatics, 50:107–121, 2014. Special Issue on Informatics Methods in Medical Privacy.
[95] Rashid H. Khokhar, Benjamin C. M. Fung, Farkhund Iqbal, Dima Alhadidi, and Jamal Bentahar. Privacy-preserving Data Mashup Model for Trading Person-specific Information. Electronic Commerce Research and Applications, 17:19–37, 2016.
[96] Rashid H. Khokhar, Farkhund Iqbal, Benjamin C. M. Fung, and Jamal Bentahar. Enabling Secure Trustworthiness Assessment and Privacy Protection in Integrating Data for Trading Person-specific Information. IEEE Transactions on Engineering Management, pages 1–21, 2020.
[97] Ritu Khullar and Vanessa Cosco. Conceptualizing the Right to Privacy in Canada. National Administrative Law, Labour & Employment Law and Privacy & Access Law PD Conference, 2010.
[98] Daniel Kifer. Attacks on Privacy and DeFinetti’s Theorem. In Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, pages 127–138. ACM, 2009.
[99] Daniel Kifer and Johannes Gehrke. Injecting Utility into Anonymized Datasets. In Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, page 217–228. ACM, 2006.
[100] Daniel Kifer and Bing-Rong Lin. Towards an Axiomatization of Statistical Privacy and Utility. In Proceedings of the 29th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, page 147–158. ACM, 2010.
[101] Daniel Kifer and Ashwin Machanavajjhala. No Free Lunch in Data Privacy. In Proceedings of the ACM SIGMOD International Conference on Management of Data, pages 193–204. ACM, 2011.
[102] Dan J. Kim, Donald L. Ferrin, and Raghav Rao. A Trust-based Consumer Decision-making Model in Electronic Commerce: The Role of Trust, Perceived Risk, and their Antecedents.
Decision Support Systems, 44(2):544–564, 2008.
[103] Jay Kim. A Method for Limiting Disclosure in Microdata Based on Random Noise and Transformation. In Proceedings of the Section on Survey Research Methods, pages 303–308. American Statistical Association, 1986.
[104] Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, and Ni Trieu. Efficient Batched Oblivious PRF with Applications to Private Set Intersection. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pages 818–829. ACM, 2016.
[105] Ioannis Konstas, Vassilios Stathopoulos, and Joemon M. Jose. On Social Networks and Collaborative Recommendation. In Proceedings of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval, page 195–202. ACM, 2009.
[106] Peter Kooiman, Leon Willenborg, and Jose Gouweleeuw. PRAM: A Method for Disclosure Limitation of Microdata. Number 9705 in Research paper. CBS, 1997.
[107] Christopher Kuner. Regulation of Transborder Data Flows under Data Protection and Privacy Law: Past, Present and Future. OECD Publishing, (187), 2011.
[108] Andrea Landherr, Bettina Friedl, and Julia Heidemann. A Critical Review of Centrality Measures in Social Networks. Business and Information Systems Engineering, 2(6):371–385, 2010.
[109] Kristen LeFevre, David J. DeWitt, and Raghu Ramakrishnan. Workload-aware Anonymization. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 277–286. ACM, 2006.
[110] Chao Li, Daniel Y. Li, Gerome Miklau, and Dan Suciu. A Theory of Pricing Private Data. ACM Transactions on Database Systems, 39(4):1–28, 2014.
[111] Jingquan Li. Privacy Policies for Health Social Networking Sites. Journal of the American Medical Informatics Association, 20(4):704–707, 2013.
[112] Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian. t-Closeness: Privacy Beyond k-Anonymity and £-Diversity. In Proceedings of the 23rd IEEE International Conference on Data Engineering, pages 106–115, 2007.
[113] Xuejun Li, Ruimiao Ding, Xiao Liu, Xiangjun Liu, Erzhou Zhu, and Yunxiang Zhong. A Dynamic Pricing Reverse Auction-based Resource Allocation Mechanism in Cloud Workflow Systems. Scientific Programming, 2016:1–13, 2016.
[114] Hyo-Sang Lim, Yang-Sae Moon, and Elisa Bertino. Provenance-based Trustworthiness Assessment in Sensor Networks. In Proceedings of the 7th International Workshop on Data Management for Sensor Networks, pages 2–7. ACM, 2010.
[115] Hyo-Sang Lim, Gabriel Ghinita, Elisa Bertino, and Murat Kantarcioglu. A Game-Theoretic Approach for High-assurance of Data Trustworthiness in Sensor Networks. In Proceedings of the 28th IEEE International Conference on Data Engineering, pages 1192–1203, 2012.
[116] Zijie Lin, Liangliang Gao, Xuexian Hu, Yuxuan Zhang, and Wenfen Liu. Differentially Private Graph Clustering Algorithm Based on Structure Similarity. In Proceedings of the 2019 the 9th International Conference on Communication and Network Security, page 63–68. ACM, 2019.
[117] Yehuda Lindell and Benny Pinkas. Secure Multiparty Computation for Privacy-preserving Data Mining. Journal of Privacy and Confidentiality, 1(1):59–98, 2009.
[118] Roderick J. A. Little. Statistical Analysis of Masked Data. Journal of Official Statistics, 9(2): 407–426, 1993.
[119] Kun Liu and Evimaria Terzi. Towards Identity Anonymization on Graphs. In Proceedings of the ACM SIGMOD International Conference on Management of Data, pages 93–106. ACM, 2008.
[120] Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, and Muthuramakrishnan Venkita- subramaniam. £-Diversity: Privacy Beyond k-Anonymity. ACM Transactions on Knowledge Discovery from Data, 1(1), 2007.
[121] Frank McSherry. Privacy Integrated Queries: An Extensible Platform for Privacy-Preserving Data Analysis. Communications of the ACM, 53(9):89–97, 2010.
[122] Frank McSherry and Kunal Talwar. Mechanism Design via Differential Privacy. In Proceed- ings of the 48th Annual IEEE Symposium on Foundations of Computer Science, pages 94–103. IEEE Computer Society, 2007.
[123] Noman Mohammed, Benjamin C. M. Fung, Patrick C. K. Hung, and Cheuk-Kwong Lee. Anonymizing Healthcare Data: A Case Study on the Blood Transfusion Service. In Proceed- ings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 1285–1294. ACM, 2009.
[124] Noman Mohammed, Benjamin C. M. Fung, Patrick C. K. Hung, and Cheuk-Kwong Lee. Centralized and Distributed Anonymization for High-dimensional Healthcare Data. ACM Transactions on Knowledge Discovery from Data, 4(4):1–33, 2010.
[125] Noman Mohammed, Rui Chen, Benjamin C. M. Fung, and Philip S. Yu. Differentially Private Data Release for Data Mining. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 493–501. ACM, 2011.
[126] Noman Mohammed, Benjamin C. M. Fung, and Mourad Debbabi. Anonymity Meets Game Theory: Secure Data Integration with Malicious Participants. The VLDB Journal, 20(4): 567–588, 2011.
[127] Noman Mohammed, Xiaoqian Jiang, Rui Chen, Benjamin C. M. Fung, and Lucila Ohno- Machado. Privacy-preserving Heterogeneous Health Data Sharing. Journal of the American Medical Informatics Association, 20(3):462–469, 2013.
[128] Noman Mohammed, Dima Alhadidi, Benjamin C. M. Fung, and Mourad Debbabi. Secure Two- Party Differentially Private Data Release for Vertically Partitioned Data. IEEE Transactions on Dependable and Secure Computing, 11(1):59–71, 2014.
[129] Rachana Nget, Yang Cao, and Masatoshi Yoshikawa. How to Balance Privacy and Money through Pricing Mechanism in Personal Data Market. In Proceedings of the SIGIR 2017 Workshop on eCommerce, volume 2311. CEUR-WS.org, 2017.
[130] Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith. Smooth Sensitivity and Sampling in Private Data Analysis. In Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing, page 75–84. ACM, 2007.
[131] Talal H. Noor, Quan Z. Sheng, Lina Yao, Schahram Dustdar, and Anne H. H. Ngu. CloudAr- mor: Supporting Reputation-based Trust Management for Cloud Services. IEEE Transactions on Parallel and Distributed Systems, 27(2):367–380, 2016.
[132] Benny Pinkas, Thomas Schneider, and Michael Zohner. Faster Private Set Intersection Based on OT Extension. In Proceedings of the 23rd USENIX Conference on Security Symposium, pages 797–812. USENIX Association, 2014.
[133] Benny Pinkas, Thomas Schneider, Gil Segev, and Michael Zohner. Phasing: Private Set Inter- section Using Permutation-based Hashing. In Proceedings of the 24th USENIX Conference on Security Symposium, pages 515–530. USENIX Association, 2015.
[134] Benny Pinkas, Thomas Schneider, and Michael Zohner. Scalable Private Set Intersection Based on OT Extension. ACM Transactions on Privacy Security, 21(2):1–35, 2018.
[135] Yu Pu and Jens Grossklags. Valuating Friends’ Privacy: Does Anonymity of Sharing Personal Data Matter? In Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS), pages 339–355. USENIX Association, 2017.
[136] John R. Quinlan. Induction of Decision Trees. Machine Learning, 1(1):81–106, 1986.
[137] John R. Quinlan. C4.5: Programs for Machine Learning. Morgan Kaufmann, 1993.
[138] Dino Quintero, William M. Genovese, KiWaon Kim, Ming J. M. Li, Fabio Martins, Ashish Nainwal, Dusan Smolej, Marcin Tabinowski, and Ashu Tiwary. IBM Software Defined Environment. IBM Digital Services Group, Technical Content Services (TCS), 1st edition, 2015.
[139] Sofya Raskhodnikova and Adam Smith. Lipschitz Extensions for Node-Private Graph Statistics and the Generalized Exponential Mechanism. In 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), pages 495–504, 2016.
[140] Eric Rescorla. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446, 2018.
[141] Leonardo F. R. Ribeiro, Pedro H. P. Saverese, and Daniel R. Figueiredo. Struc2vec: Learning Node Representations from Structural Identity. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, page 385–394. ACM, 2017.
[142] Christopher Riederer, Vijay Erramilli, Augustin Chaintreau, Balachander Krishnamurthy, and Pablo Rodriguez. For Sale : Your Data: By : You. In Proceedings of the 10th ACM Workshop on Hot Topics in Networks, pages 1–6. ACM, 2011.
[143] Kevin Roebuck. Enterprise Mashups: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors. Emereo Publishing, 2012.
[144] Sasha Romanosky and Alessandro Acquisti. Privacy Costs and Personal Data Protection: Economic and Legal Perspectives. Berkeley Technology Law Journal, 24(4), 2014.
[145] Sasha Romanosky, David Hoffman, and Alessandro Acquisti. Empirical Analysis of Data Breach Litigation. Journal of Empirical Legal Studies, 11(1):74–104, 2014.
[146] Alessandra Sala, Xiaohan Zhao, Christo Wilson, Haitao Zheng, and Ben Y. Zhao. Shar- ing Graphs using Differentially Private Graph Models. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, page 81–98. ACM, 2011.
[147] Pierangela Samarati. Protecting Respondents’ Identities in Microdata Release. IEEE Transac- tions on Knowledge and Data Engineering, 13(6):1010–1027, 2001.
[148] Rizwana Shaikh and Sasikumar Mukundan. Trust Model for Measuring Security Strength of Cloud Computing Service. Procedia Computer Science, 45:380–389, 2015.
[149] Claude E. Shannon. The Mathematical Theory of Communication. 1949.
[150] Ahmed Shawish and Maria Salama. Inter-cooperative Collective Intelligence: Techniques and Applications, chapter Cloud Computing: Paradigms and Technologies, pages 39–67. Springer, 2014.
[151] Chuan Shi, Yitong Li, Jiawei Zhang, Yizhou Sun, and Philip S. Yu. A Survey of Heterogeneous Information Network Analysis. IEEE Transactions on Knowledge and Data Engineering, 29 (1):17–37, 2017.
[152] Yu Shi, Huan Gui, Qi Zhu, Lance Kaplan, and Jiawei Han. AspEm: Embedding Learning by Aspects in Heterogeneous Information Networks. In Proceedings of the 2018 SIAM International Conference on Data Mining, pages 144–152, 2018.
[153] Yu Shi, Qi Zhu, Fang Guo, Chao Zhang, and Jiawei Han. Easing Embedding Learning by Comprehensive Transcription of Heterogeneous Information Networks. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, page 2190–2199. ACM, 2018.
[154] Chris Skinner, Catherine Marsh, Stan Openshaw, and Colin Wymer. Disclosure Control for Census Microdata. Journal of Official Statistics, 10(1):31–51, 1994.
[155] Shuang Song, Susan Little, Sanjay Mehta, Staal A. Vinterbo, and Kamalika Chaudhuri. Differentially Private Continual Release of Graph Statistics. CoRR, abs/1809.02575, 2018.
[156] Yizhou Sun and Jiawei Han. Mining Heterogeneous Information Networks: Principles and Methodologies. Morgan & Claypool Publishers, 2012.
[157] Yizhou Sun, Yintao Yu, and Jiawei Han. Ranking-based Clustering of Heterogeneous In- formation Networks with Star Network Schema. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, page 797–806. ACM, 2009.
[158] Yizhou Sun, Jie Tang, Jiawei Han, Manish Gupta, and Bo Zhao. Community Evolution Detection in Dynamic Heterogeneous Information Networks. In Proceedings of the 8th Workshop on Mining and Learning with Graphs, page 137–146. ACM, 2010.
[159] Yizhou Sun, Rick Barber, Manish Gupta, Charu C. Aggarwal, and Jiawei Han. Co-author Relationship Prediction in Heterogeneous Bibliographic Networks. In 2011 International Conference on Advances in Social Networks Analysis and Mining, pages 121–128, 2011.
[160] Yizhou Sun, Jiawei Han, Xifeng Yan, Philip S. Yu, and Tianyi Wu. Pathsim: Meta Path-based Top-K Similarity Search in Heterogeneous Information Networks. Proceedings of the VLDB Endowment, 4(11):992–1003, 2011.
[161] Yizhou Sun, Charu C. Aggarwal, and Jiawei Han. Relation Strength-Aware Clustering of Heterogeneous Information Networks with Incomplete Attributes. Proceedings of the VLDB Endowment, 5(5):394–405, 2012.
[162] Akimichi Takemura. Local Recoding by Maximum Weight Matching for Disclosure Control of Microdata Sets. CIRJE F-Series 40, 1999.
[163] Jian Tang, Meng Qu, Mingzhe Wang, Ming Zhang, Jun Yan, and Qiaozhu Mei. LINE: Large- Scale Information Network Embedding. In Proceedings of the 24th International Conference on World Wide Web, page 1067–1077. IW3C2, 2015.
[164] Jiliang Tang, Huiji Gao, Xia Hu, and Huan Liu. Exploiting Homophily Effect for Trust Prediction. In Proceedings of the Sixth ACM International Conference on Web Search and Data Mining, page 53–62. ACM, 2013.
[165] Lu-An Tang, Xiao Yu, Sangkyum Kim, Jiawei Han, Chih-Chieh Hung, and Wen-Chih Peng. Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems. In Proceedings of the 2010 IEEE International Conference on Data Mining, pages 1079–1084, 2010.
[166] Mingdong Tang, Yu Xu, Jianxun Liu, Zibin Zheng, and Xiaoqing Liu. Combining Global and Local Trust for Service Recommendation. In Proceedings of the 2014 IEEE International Conference on Web Services, pages 305–312, 2014.
[167] Traian M. Truta, Farshad Fotouhi, and Daniel Barth-Jones. Privacy and Confidentiality Management for the Microaggregation Disclosure Control Method: Disclosure Risk and Information Loss Measures. In Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, pages 21–30. ACM, 2003.
[168] Lee Ventola. Social Media and Health Care Professionals: Benefits, Risks, and Best Practices.
Journal of Pharmacy and Therapeutics, 39(7):491–520, 2014.
[169] AG D. Waal and Leon C. R. J. Willenborg. Optimal Local Suppression in Microdata. Journal of Official Statistics, 14(4):421–435, 1998.
[170] Ton D. Waal and Leon Willenborg. Information Loss through Global Recoding and Local Suppression. Netherlands Official Statistics, 14:17–20, 1999. Special Issue on Statistical Disclosure Control.
[171] Omar A. Wahab, Jamal Bentahar, Hadi Otrok, and Azzam Mourad. A Survey on Trust and Reputation Models for Web Services: Single, Composite, and Communities. Decision Support Systems, 74:121–134, 2015.
[172] Weiqing Wang, Hongzhi Yin, Xingzhong Du, Wen Hua, Yongjun Li, and Quoc V. H. Nguyen. Online User Representation Learning Across Heterogeneous Social Networks. In Proceed- ings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, page 545–554. ACM, 2019.
[173] Yue Wang and Xintao Wu. Preserving Differential Privacy in Degree-Correlation Based Graph Generation. Transactions on Data Privacy, 6(2):127–145, 2013.
[174] Cort J. Willmott and Kenji Matsuura. Advantages of the Mean Absolute Error (MAE) over the Root Mean Square Error (RMSE) in Assessing Average Model Performance. Climate Research, 30(1):79–82, 2005.
[175] Barbara H. Wixom and Lynne Markus. Data Value Assessment: Recognizing Data as an Enterprise Asset. MIT Sloan Center for Information Systems Research, 2015.
[176] Barbara H. Wixom, Anne Buff, and Paul Tallon. Six Sources of Value for Information Businesses. MIT Sloan Center for Information Systems Research and SAS Institute Inc., 2015.
[177] Raymond C. Wong, Ada W. Fu, Ke Wang, and Jian Pei. Minimality Attack in Privacy- preserving Data Publishing. In Proceedings of the 33rd International Conference on Very Large Data Bases, pages 543–554. VLDB Endowment, 2007.
[178] Quanwang Wu, MengChu Zhou, Qingsheng Zhu, and Yunni Xia. VCG Auction-based Dynamic Pricing for Multigranularity Service Composition. IEEE Transactions on Automation Science and Engineering, 15(2):796–805, 2018.
[179] Xiaotong Wu, Wanchun Dou, and Qiang Ni. Game Theory Based Privacy-preserving Analysis in Correlated Data Publication. In Proceedings of the Australasian Computer Science Week Multiconference, pages 1–10. ACM, 2017.
[180] Xiaokui Xiao, Gabriel Bender, Michael Hay, and Johannes Gehrke. iReduct: Differential Privacy with Reduced Relative Errors. In Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data, pages 229–240. ACM, 2011.
[181] Yonghui Xiao, Li Xiong, Liyue Fan, Slawomir Goryczka, and Haoran Li. DPCube: Differ- entially Private Histogram Release through Multidimensional Partitioning. Transactions on Data Privacy, 7(3):195–222, 2014.
[182] Bin Yang, Issei Sato, and Hiroshi Nakagawa. Bayesian Differential Privacy on Correlated Data. In Proceedings of the ACM SIGMOD International Conference on Management of Data, pages 747–762. ACM, 2015.
[183] Xiaoyuan Yang, Xiaoshuang Luo, Xu A. Wang, and Shuaiwei Zhang. Improved Outsourced Private Set Intersection Protocol Based on Polynomial Interpolation. Concurrency and Computation: Practice and Experience, 30(1):e4329, 2017.
[184] Andrew C. Yao. Protocols for Secure Computations. In Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, pages 160–164. IEEE Computer Society, 1982.
[185] Xiaobo Yin, Shunxiang Zhang, and Hui Xu. Node Attributed Query Access Algorithm Based on Improved Personalized Differential Privacy Protection in Social Network. International Journal of Wireless Information Networks, 26(3):165–173, 2019.
[186] Aston Zhang, Xing Xie, Kevin Chen-chuan, Carl A. Gunter, Jiawei Han, and Xiaofeng Wang. Privacy Risk in Anonymized Heterogeneous Information Networks. In Proceedings of the 17th International Conference on Extending Database Technology, pages 595–606, 2014.
[187] Chuxu Zhang, Dongjin Song, Chao Huang, Ananthram Swami, and Nitesh V. Chawla. Het- erogeneous Graph Neural Network. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, page 793–803. ACM, 2019.
[188] Le Zhang and Ponnuthurai N. Suganthan. Random Forests with Ensemble of Feature Spaces.
Pattern Recognition, 47(10):3429–3437, 2014.
[189] Zhongheng Zhang. Missing Data Imputation: Focusing on Single Imputation. Annals of Translational Medicine, 4(1), 2016.
[190] Chuan Zhao, Shengnan Zhao, Minghao Zhao, Zhenxiang Chen, Chong-Zhi Gao, Hongwei Li, and Yu-an Tan. Secure Multi-Party Computation: Theory, Practice and Applications. Information Sciences, 476:357–372, 2019.
[191] Bin Zhou and Jian Pei. Preserving Privacy in Social Networks Against Neighborhood Attacks. In Proceedings of the 24th IEEE International Conference on Data Engineering, pages 506–515. IEEE Computer Society, 2008.
[192] Lei Zou, Lei Chen, and Tamer Özsu. K-Automorphism: A General Framework for Privacy- preserving Network Publication. Proceedings of the VLDB Endowment, 2(1):946–957, 2009.
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page

Downloads per month over past year

Research related to the current document (at the CORE website)
- Research related to the current document (at the CORE website)
Back to top Back to top