A survey of privacy-preserving mechanisms for heterogeneous data types

https://doi.org/10.53730/ijhs.v6nS4.9409

Authors

  • Terrance Frederick Fernandez Associate Professor, Department of Information Technology, Dhanalakshmi Srinivasan College of Engineering and Technology
  • E. Dhilip Kumar Assistant Professor, Department of Computer Applications, Dhanalakshmi Srinivasan College of Engineering and Technology

Keywords:

privacy, privacy taxonomy, privacy-preserving mechanisms, heterogeneous data types, privacy tools

Abstract

Due to the pervasiveness of always connected devices, large amounts of heterogeneous data are continuously being collected. Beyond the benefits that accrue for the users, there are private and sensitive information that is exposed. Therefore, Privacy-Preserving Mechanisms (PPMs) are crucial to protect users’ privacy. In this paper, we perform a thorough study of the state of the art on the following topics: heterogeneous data types, PPMs, and tools for privacy protection. Building from the achieved knowledge, we propose a privacy taxonomy that establishes a relation between different types of data and suitable PPMs for the characteristics of those data types. Moreover, we perform a systematic analysis of solutions for privacy protection, by presenting and comparing privacy tools. From the performed analysis, we identify open challenges and future directions, namely, in the development of novel PPMs.

Downloads

Download data is not yet available.

References

Yan Z., Zhang P., Vasilakos A.V.A survey on trust management for Internet of Things J. Netw. Comput. Appl., 42 (2014), pp. 120-134.

Clement J. Online privacy in the United States - statistics & facts (2020).

Aldeen Y.A.A.S., Salleh M., Razzaque MA. A comprehensive review on privacy preserving data mining Springer Plus, 4 (1) (2015), p. 694.

Shah A., Gulati R. Privacy preserving data mining: Techniques classification and implications—A survey Int. J. Comput. Appl., 137 (12) (2016), pp. 40-46.

Mendes R., Vilela J.P. Privacy-preserving data mining: Methods, metrics, and applications IEEE Access, 5 (2017), pp. 10562-10582.

Shokri R., Theodorakopoulos G., Troncoso C., Hubaux J.-P., Le Boudec J.-Y. Protecting location privacy: Optimal strategy against localization attacks Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS ’12, Association for Computing Machinery, New York, NY, USA (2012), pp. 617-627, 10.1145/2382196.2382261.

Prasser F., Kohlmayer F. Putting statistical disclosure control into practice: The arx data anonymization tool Medical Data Privacy Handbook, Springer International Publishing, Cham (2015), pp. 111-148, 10.1007/978-3-319-23633-9_6.

Susilo, C. B., Jayanto, I., & Kusumawaty, I. (2021). Understanding digital technology trends in healthcare and preventive strategy. International Journal of Health & Medical Sciences, 4(3), 347-354. https://doi.org/10.31295/ijhms.v4n3.1769

Rinartha, K., & Suryasa, W. (2017). Comparative study for better result on query suggestion of article searching with MySQL pattern matching and Jaccard similarity. In 2017 5th International Conference on Cyber and IT Service Management (CITSM) (pp. 1-4). IEEE.

Rinartha, K., Suryasa, W., & Kartika, L. G. S. (2018). Comparative Analysis of String Similarity on Dynamic Query Suggestions. In 2018 Electrical Power, Electronics, Communications, Controls and Informatics Seminar (EECCIS) (pp. 399-404). IEEE.

Published

21-06-2022

How to Cite

Fernandez, T. F., & Kumar, E. D. (2022). A survey of privacy-preserving mechanisms for heterogeneous data types. International Journal of Health Sciences, 6(S4), 5692–5700. https://doi.org/10.53730/ijhs.v6nS4.9409

Issue

Section

Peer Review Articles