Shielding privacy: a technique of extenuating composition attacks in various independent data publication

Md. Omar Faruq, Md. Abul Ala Walid, Mrinal Kanti Baowaly, Maloy Kumar Devnath, Md. Sabbir Ejaz, Pronob Kumar Barman, A H M Sarowar Sattar


Protecting personal information from unauthorized access is a critical concern for individuals. However, the accumulation of confidential information by various organizations, such as banks and hospitals, for regular communication creates a potential vulnerability. If an individual visits two hospitals and both facilities independently release the individual's gathered data, a malicious adversary could potentially deduce confidential information through a composition attack. Therefore, developing methods that protect individuals from composition attacks is crucial. According to the size of the dataset and the percentage of overlapping persons, our study examines the effectiveness of composition attacks. We propose a knowledge domain-based design to mitigate successful composition attacks, which has shown promising results in reducing such attacks and compared to existing studies based on the k-anonymity and l-diversity models. Our approach leverages a knowledge domain to reduce the likelihood of data breaches, demonstrating the effectiveness of our method in protecting individuals' privacy and preventing unauthorized access to sensitive information. Finally, the effects of data utility on the diverse data set have been measured.


Composition attacks; k-anonymity; Knowledge domain; l-diversity; Unauthorized access

Full Text:




  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Bulletin of EEI Stats

Bulletin of Electrical Engineering and Informatics (BEEI)
ISSN: 2089-3191, e-ISSN: 2302-9285
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).