Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims.
Graph theory (GT) concepts are potentially applicable in the field of computer science (CS) for many purposes. The unique applications of GT in the CS field such as clustering of web documents, cryptography, and analyzing an algorithm’s execution, among others, are promising applications. Furthermore, GT concepts can be employed to electronic circuit simplifications and analysis. Recently, graphs have been extensively used in social networks (SNs) for many purposes related to modelling and analysis of the SN structures, SN operation modelling, SN user analysis, and many other related aspects. Considering the widespread applications of GT in SNs, this article comprehensively summarizes GT use in the SNs. The goal of this survey paper is twofold. First, we briefly discuss the potential applications of GT in the CS field along with practical examples. Second, we explain the GT uses in the SNs with sufficient concepts and examples to demonstrate the significance of graphs in SN modeling and analysis.
User attributes affect community (i.e., a group of people with some common properties/attributes) privacy in users' data publishing because some attributes may expose multiple users' identities and their associated sensitive information during published data analysis. User attributes such as gender, age, and race, may allow an adversary to form users' communities based on their values, and launch sensitive information inference attack subsequently. As a result, explicit disclosure of private information of a specific users' community can occur from the privacy preserved published data. Each item of user attributes impacts users' community privacy differently, and some types of attributes are highly susceptible. More susceptible types of attributes enable multiple users' unique identifications and sensitive information inferences more easily, and their presence in published data increases users' community privacy risks. Most of the existing privacy models ignore the impact of susceptible attributes on user's community privacy and they mainly focus on preserving the individual privacy in the released data. This paper presents a novel data anonymization algorithm that significantly improves users' community privacy without sacrificing the guarantees on anonymous data utility in publishing data. The proposed algorithm quantifies the susceptibility of each attribute present in user's dataset to effectively preserve users' community privacy. Data generalization is performed adaptively by considering both user attributes' susceptibility and entropy simultaneously. The proposed algorithm controls overgeneralization of the data to enhance anonymous data utility for the legitimate information consumers. Due to the widespread applications of social networks (SNs), we focused on the SN users' community privacy preserved and utility enhanced anonymous data publishing. The simulation results obtained from extensive experiments, and comparisons with the existing algorithms show the effectiveness of the proposed algorithm and verify the aforementioned claims.
Since the emergence of coronavirus disease-2019 (COVID-19) outbreak, every country has implemented digital solutions in the form of mobile applications, web-based frameworks, and/or integrated platforms in which huge amounts of personal data are collected for various purposes (e.g., contact tracing, suspect search, and quarantine monitoring). These systems not only collect basic data about individuals but, in most cases, very sensitive data like their movements, spatio-temporal activities, travel history, visits to churches/clubs, purchases, and social interactions. While collection and utilization of person-specific data in different contexts is essential to limiting the spread of COVID-19, it increases the chances of privacy breaches and personal data misuse. Recently, many privacy protection techniques (PPTs) have been proposed based on the person-specific data included in different data types (e.g., tables, graphs, matrixes, barcodes, and geospatial data), and epidemic containment strategies (ECSs) (contact tracing, quarantine monitoring, symptom reports, etc.) in order to minimize privacy breaches and to permit only the intended uses of such personal data. In this paper, we present an extensive review of the PPTs that have been recently proposed to address the diverse privacy requirements/concerns stemming from the COVID-19 pandemic. We describe the heterogeneous types of data collected to control this pandemic, and the corresponding PPTs, as well as the paradigm shifts in personal data handling brought on by this pandemic. We systemically map the recently proposed PPTs into various ECSs and data lifecycle phases, and present an in-depth review of existing PPTs and evaluation metrics employed for analysis of their suitability. We describe various PPTs developed during the COVID-19 period that leverage emerging technologies, such as federated learning, blockchain, privacy by design, and swarm learning, to name a few. Furthermore, we discuss the challenges of preserving individual privacy during a pandemic, the role of privacy regulations/laws, and promising future research directions. With this article, our aim is to highlight the recent PPTs that have been specifically proposed for the COVID-19 arena, and point out research gaps for future developments in this regard.
This paper presents the role of artificial intelligence (AI) and other latest technologies that were employed to fight the recent pandemic (i.e., novel coronavirus disease-2019 (COVID-19)). These technologies assisted the early detection/diagnosis, trends analysis, intervention planning, healthcare burden forecasting, comorbidity analysis, and mitigation and control, to name a few. The key-enablers of these technologies was data that was obtained from heterogeneous sources (i.e., social networks (SN), internet of (medical) things (IoT/IoMT), cellular networks, transport usage, epidemiological investigations, and other digital/sensing platforms). To this end, we provide an insightful overview of the role of data-driven analytics leveraging AI in the era of COVID-19. Specifically, we discuss major services that AI can provide in the context of COVID-19 pandemic based on six grounds, (i) AI role in seven different epidemic containment strategies (a.k.a non-pharmaceutical interventions (NPIs)), (ii) AI role in data life cycle phases employed to control pandemic via digital solutions, (iii) AI role in performing analytics on heterogeneous types of data stemming from the COVID-19 pandemic, (iv) AI role in the healthcare sector in the context of COVID-19 pandemic, (v) general-purpose applications of AI in COVID-19 era, and (vi) AI role in drug design and repurposing (e.g., iteratively aligning protein spikes and applying three/four-fold symmetry to yield a low-resolution candidate template) against COVID-19. Further, we discuss the challenges involved in applying AI to the available data and privacy issues that can arise from personal data transitioning into cyberspace. We also provide a concise overview of other latest technologies that were increasingly applied to limit the spread of the ongoing pandemic. Finally, we discuss the avenues of future research in the respective area. This insightful review aims to highlight existing AI-based technological developments and future research dynamics in this area.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.