Group Privacy: An Underrated but Worth Studying Research Problem in the Era of Artificial Intelligence and Big Data
Abstract
:1. Introduction
1.1. The Emergence of Group Privacy Issues: A New Dimension
1.2. Comparative Analysis of Individual and Group Privacy in the Era of Big Data and AI
2. State-of-the-Art Privacy Preserving Approaches
2.1. Research Tracks for Individual Privacy Preservation
2.1.1. Individual Privacy Preservation and SOTA Approaches in Track A
- Zip code (five-digits), gender, date of birth → 87%
- Place of residence, gender, date of birth → 50%
- Country of origin, gender, date of birth → 18%
2.1.2. Individual Privacy Preservation and SOTA Approaches in Track B
2.1.3. Individual Privacy Preservation and SOTA Approaches in Track C
3. Group Privacy: A New Dimension of Privacy
Threats to the Group Privacy in the Era of AI and Big Data
- Hidden profiling of group motives/goals;
- Prediction of norms of particular groups;
- Inference of political views;
- Stalking of the groups;
- Declining credits to the group;
- Inference of the religious views;
- Inaccurate and biased decision making about group;
- Political victimization of minor communities;
- Spatial-temporal activities disclosures of group;
- Disclosure of the disease/income of a group;
- Sensitive rules extraction about minor groups;
- Collection of intimate details of groups lifestyle;
- Cyberbullying based on ethnicity of a particular group;
- Denying fair share in government schemes to a particular group;
- Community association (or political party association) disclosure;
- Data aggregation for group privacy theft via statistical matching;
- Aggregation of social network usage and posted contents’ data;
- Information contagion and control to a particular group;
- Disclosure of the opinion and sentiments of a group;
- Harassment of the people due to affiliation with a controversial group;
- Targeted crime involvement based on presence at some locality via location data;
- Disclosure of eating or sexual behavior through profiling leveraging common data;
- Disclosure of common diseases about a group of people living in some parts of the country based on zip code data;
- Prediction of future motives/activities of a particular group based on historical data;
- Targeted political surveillance of a certain group.
4. Case Study to Show the Worth of Investigating Group Privacy in Big Data and AI Era Using Real-World Benchmark Datasets
Group Privacy Preservation Results Comparison
5. Future Research Outlook in the Domain of Privacy Preservation
5.1. Group Privacy Preservation in Static and Dynamic Scenarios
- Group privacy protection methods: The concept of group privacy was mainly started in 2014 with theoretical description [186]; until then, many studies were already published to preserve individual privacy. The concept of preserving individual privacy fist emerged in 2002, and there exist many citations of the corresponding studies to date (i.e., <k-anonymity: >, <ℓ-diversity: >, <t-closeness: >, < differential privacy: >) that proposed ways to protect one person’s privacy. In contrast, there have only been a few hundred citations of the studies that have covered group privacy-related concepts. In the future, devising practical methods based on anonymization, DP, blockchain, secure multi-party computation, zero-knowledge proofs, encryption, masking, pseudonymization, etc., is a promising avenue of research. Furthermore, devising practical solutions to preserve group privacy by incorporating the preferences of the group appears to be a likely popular research topic in the near future. Lastly, devising methods that can permit the analysis of data while respecting group privacy is a rich area of research.
- Group privacy evaluation metrics: Since group privacy is a relatively new concept there is therefore a serious lack of metrics that can measure the risks to group privacy in data. In addition, new utility evaluation metrics are also needed to perform the analytics of data while preserving privacy. To this end, metrics that can accurately measure the level of privacy and utility are required in the near future. Furthermore, extending the metrics that were proposed for individual privacy evaluation to group privacy evaluation is also a rich areas of research.
- Group privacy protection in different data styles: Most work in the privacy preservation domain has been done on personal data enclosed in either tabular or graph form. However, personal data can be enclosed in varied forms such as images, text, graphs, videos, streams, matrices, logs, etc. which can lead to group privacy disclosures as well. Hence, devising practical methods to protect group privacy in different data styles is an emerging avenue of research.
5.2. Group Privacy Preservation in Different Computing Paradigms
5.3. Privacy Preservation of Artificial Intelligence (AI) Systems/Ecosystem
6. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Wieringa, J.; Kannan, P.; Ma, X.; Reutterer, T.; Risselada, H.; Skiera, B. Data analytics in a privacy-concerned world. J. Bus. Res. 2021, 122, 915–925. [Google Scholar] [CrossRef]
- Petrescu, M.; Krishen, A. Analyzing the analytics: Data privacy concerns. J. Mark. Anal. 2018, 6, 41–43. [Google Scholar] [CrossRef]
- Vladlena, B. Personal Information Security and the IoT: The Changing Landscape of Data Privacy. Comput. Commun. Collab. 2015, 3, 15–19. [Google Scholar]
- Olakunle, O.; Win, T. Cybersecurity and Data Privacy in the Digital Age: Two Case Examples. In Handbook of Research on Digital Transformation, Industry Use Cases, and the Impact of Disruptive Technologies; IGI Global: Pennsylvania, PA, USA, 2022; pp. 117–131. [Google Scholar]
- Lu, C.-H.; Chen, Y.-H.; Jan, P.-T. The Privacy Trap of Digital Transformation: The Existence and the Implication. J. Internet Technol. 2022, 23, 63–71. [Google Scholar]
- Florian, V.; Haire, B.; Selvey, L.; Katelaris, A.L.; Kaldor, J. Effectiveness evaluation of digital contact tracing for COVID-19 in New South Wales, Australia. Lancet Public Health 2022, 7, e250–e258. [Google Scholar]
- Hsiang-Yu, Y.; Blakemore, C. The impact of contact tracing and testing on controlling COVID-19 outbreak without lockdown in Hong Kong: An observational study. Lancet Reg.-Health-West. Pac. 2022, 20, 100374. [Google Scholar]
- Jungeun, K.; Rim, S.J.; Jo, M.; Lee, M.G.; Park, S. The Trend of Psychiatric Visits and Psychiatric Medication Prescription Among People Tested for SARS-CoV-2 During the Initial Phase of COVID-19 Pandemic in South Korea. Psychiatry Investig. 2022, 19, 61. [Google Scholar]
- Seoyoung, K.; Lim, H.; Chung, S. How South Korean Internet users experienced the impacts of the COVID-19 pandemic: Discourse on Instagram. Humanit. Soc. Sci. Commun. 2022, 9, 1–12. [Google Scholar]
- Younsik, K. Uncertain future of privacy protection under the Korean public health emergency preparedness governance amid the COVID-19 pandemic. Cogent Soc. Sci. 2022, 8, 2006393. [Google Scholar]
- Kate, E. The Digital Age and Beyond. In The Routledge Global History of Feminism; Routledge: London, UK, 2022; pp. 136–148. [Google Scholar]
- Jiyoung, S.J.; Metzger, M.J. Privacy Beyond the Individual Level. In Modern Socio-Technical Perspectives on Privacy; Springer: Cham, Switzerland, 2022; pp. 91–109. [Google Scholar]
- Wadii, B.; Ammar, A.; Benjdira, B.; Koubaa, A. Securing the Classification of COVID-19 in Chest X-ray Images: A Privacy-Preserving Deep Learning Approach. arXiv 2022, arXiv:2203.07728. [Google Scholar]
- Miryabelli, A.; Harini, N. Privacy Preservation Using Anonymity in Social Networks. In Proceedings of the Second International Conference on Sustainable Expert Systems, Lalitpur, Nepal, 17–18 September 2021; Springer: Singapore, 2022; pp. 623–631. [Google Scholar]
- Naga, P.K.; Rao, M.V.P.C.S. A Comprehensive Assessment of Privacy Preserving Data Mining Techniques. In Proceedings of the Second International Conference on Sustainable Expert Systems, Lalitpur, Nepal, 17–18 September 2021; Springer: Singapore, 2022; pp. 833–842. [Google Scholar]
- Yandong, Z.; Lu, R.; Zhang, S.; Guan, Y.; Shao, J.; Wang, F.; Zhu, H. PMRQ: Achieving Efficient and Privacy-Preserving Multi-Dimensional Range Query in eHealthcare. IEEE Internet Things J. 2022. [Google Scholar] [CrossRef]
- Oyinlola, O.S. A privacy-preserving multisubset data aggregation scheme with fault resilience for intelligent transportation system. Inf. Secur. J. A Glob. Perspect. 2022, 1–24. [Google Scholar] [CrossRef]
- Sfar, A.R.; Natalizio, E.; Mazlout, S.; Challal, Y.; Chtourou, Z. Privacy preservation using game theory in e-health application. J. Inf. Secur. Appl. 2022, 66, 103158. [Google Scholar]
- Quanrun, L.; He, D.; Yang, Z.; Xie, Q.; Choo, K.R. A Lattice-based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network. IEEE Trans. Veh. Technol. 2022. [Google Scholar] [CrossRef]
- Krishna, P.; Kakade, S.M.; Harchaoui, Z. Robust aggregation for federated learning. IEEE Trans. Signal Process. 2022, 70, 1142–1154. [Google Scholar]
- Balashunmugaraja, B.; Ganeshbabu, T.R. Privacy preservation of cloud data in business application enabled by multi-objective red deer-bird swarm algorithm. Knowl.-Based Syst. 2022, 236, 107748. [Google Scholar]
- Rahul, P.; Patil, P.D.; Kanase, S.; Bhegade, N.; Chavan, V.; Kashetwar, S. System for Analyzing Crime News by Mining Live Data Streams with Preserving Data Privacy. In Sentimental Analysis and Deep Learning; Springer: Singapore, 2022; pp. 799–811. [Google Scholar]
- Anbar, A.M.A.M.; Manickam, S.; Hasbullah, I.H. A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks. Sensors 2022, 22, 1696. [Google Scholar]
- Zhihong, L.; Xing, X.; Qian, J.; Li, H.; Sun, G. Trajectory Privacy Preserving for Continuous LBSs in VANET. Wirel. Commun. Mob. Comput. 2022, 2022. [Google Scholar]
- Huiwen, W.; Wang, L.; Zhang, K.; Li, J.; Luo, Y. A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs. IEEE Access 2022, 10, 15605–15618. [Google Scholar]
- Nisha, N.; Natgunanathan, I.; Xiang, Y. An Enhanced Location Scattering Based Privacy Protection Scheme. IEEE Access 2022, 10, 21250–21263. [Google Scholar] [CrossRef]
- Kumar, S.; Reddy, S.A.R.; Krishna, B.S.; Rao, J.N.; Kiran, A. Privacy Preserving with Modified Grey Wolf Optimization Over Big Data Using Optimal K Anonymization Approach. J. Interconnect. Netw. 2022, 2141039. [Google Scholar] [CrossRef]
- Muhammad, R.S. Hybrid heuristic-based key generation protocol for intelligent privacy preservation in cloud sector. J. Parallel Distrib. Comput. 2022, 163, 166–180. [Google Scholar]
- Kingsleen, S.D.; Kamalakkannan, S. Hybrid optimization-based privacy preservation of database publishing in cloud environment. Concurr. Comput. Pract. Exp. 2022, 34, e6844. [Google Scholar] [CrossRef]
- Wonsuk, K.; Seok, J. Privacy-preserving collaborative machine learning in biomedical applications. In Proceedings of the 2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Riga, Latvia, 21–24 February 2022; IEEE: New York, NY, USA, 2022; pp. 179–183. [Google Scholar]
- Joon-Woo, L.; Kang, H.; Lee, Y.; Choi, W.; Eom, J.; Deryabin, M.; Lee, E.; Lee, J.; Yoo, D.; Kim, Y.-S.; et al. Privacy-preserving machine learning with fully homomorphic encryption for deep neural network. IEEE Access 2022, 10, 30039–30054. [Google Scholar]
- Jasmin, Z.; Armknecht, F.; Grohmann, B.; Koch, M. Report: State of the Art Solutions for Privacy Preserving Machine Learning in the Medical Context. arXiv 2022, arXiv:2201.11406. [Google Scholar]
- Amin, A.; Shokri, M.; Rabbi, F.; Pun, V.K.I.; Lamo, Y. Extremely Randomized Trees with Privacy Preservation for Distributed Structured Health Data. IEEE Access 2022, 10, 6010–6027. [Google Scholar] [CrossRef]
- Malarvizhi, K.P.; Rawal, B.; Gao, J. Blockchain-enabled Privacy Preserving of IoT Data for Sustainable Smart Cities using Machine Learning. In Proceedings of the 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), Bangalore, India, 4–8 January 2022; IEEE: New York, NY, USA, 2022; pp. 1–6. [Google Scholar]
- Arezoo, R.; Ramasubramanian, B.; Maruf, A.A.; Poovendran, R. Privacy-Preserving Reinforcement Learning Beyond Expectation. arXiv 2022, arXiv:2203.10165. [Google Scholar]
- Hanchao, K.; Susilo, W.; Zhang, Y.; Liu, W.; Zhang, M. Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption. Comput. Stand. Interfaces 2022, 80, 103583. [Google Scholar]
- Qingyong, W.; Zhou, Y. FedSPL: Federated self-paced learning for privacy-preserving disease diagnosis. Briefings Bioinform. 2022, 23, bbab498. [Google Scholar]
- Zhiyong, H.; Zhou, L.; Zhan, Y.; Liu, C.; Wang, B. Cryptanalysis of an Additively Homomorphic Public Key Encryption Scheme. Comput. Stand. Interfaces 2022, 82, 103623. [Google Scholar]
- Jing, M.; Naas, S.; Sigg, S.; Lyu, X. Privacy-preserving federated learning based on multi-key homomorphic encryption. Int. J. Intell. Syst. 2022. [Google Scholar] [CrossRef]
- Sweeney, L. Simple demographics often identify people uniquely. Health 2000, 671, 1–34. [Google Scholar]
- Latanya, S. k-anonymity: A model for protecting privacy. Int. J. Uncertainty, Fuzziness -Knowl.-Based Syst. 2002, 10, 557–570. [Google Scholar]
- Ashwin, M.; Kifer, D.; Gehrke, J.; Venkitasubramaniam, M. l-diversity: Privacy beyond k-anonymity. Acm Trans. Knowl. Discov. Data (TKDD) 2007, 1, 3-es. [Google Scholar]
- Ninghui, L.; Li, T.; Venkatasubramanian, S. t-closeness: Privacy beyond k-anonymity and l-diversity. In Proceedings of the 2007 IEEE 23rd International Conference on data Engineering, Istanbul, Turkey, 17–20 April 2007; IEEE: New York, NY, USA, 2007; pp. 106–115. [Google Scholar]
- Yanbing, R.; Li, X.; Miao, Y.; Luo, B.; Weng, J.; Choo, K.R.; Deng, R.H. Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach. IEEE Trans. Inf. Forensics Secur. 2022, 17, 804–818. [Google Scholar]
- Amir, F.; Moghtadaiee, V.; Alishahi, M. On the Privacy Protection of Indoor Location Dataset using Anonymization. Comput. Secur. 2022, 117, 102665. [Google Scholar]
- Joanne, P.; Lineback, J.F.; Bates, N.; Beatty, P. Protecting the Identity of Participants in Qualitative Research. J. Surv. Stat. Methodol. 2022. [Google Scholar] [CrossRef]
- Simona, L.E.; Shubina, V.; Niculescu, D. Perturbed-Location Mechanism for Increased User-Location Privacy in Proximity Detection and Digital Contact-Tracing Applications. Sensors 2022, 22, 687. [Google Scholar]
- Abdul, M.; Hwang, S.O. A Practical Anonymization Approach for Imbalanced Datasets. IT Prof. 2022, 24, 63–69. [Google Scholar]
- Ul, I.T.; Ghasemi, R.; Mohammed, N. Privacy-Preserving Federated Learning Model for Healthcare Data. In Proceedings of the 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 26–29 January 2022; IEEE: New York, NY, USA, 2022; pp. 281–287. [Google Scholar]
- Debanjan, S.; Chakraborty, B. Quantifying the Effects of Anonymization Techniques over Micro-databases. IEEE Trans. Emerg. Top. Comput. 2022. [CrossRef]
- Anantaa, K.; Piplai, A.; Chukkapalli, S.S.L.; Joshi, A. PriveTAB: Secure and Privacy-Preserving sharing of Tabular Data. In Proceedings of the ACM International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, 24–27 April 2022. [Google Scholar]
- Fengli, X.; Tu, Z.; Li, Y.; Zhang, P.; Fu, X.; Jin, D. Trajectory recovery from ash: User privacy is not preserved in aggregated mobility data. In Proceedings of the 26th International Conference on World Wide Web, Perth, Australia, 3–7 May 2017; pp. 1241–1250. [Google Scholar]
- Zhen, T.; Zhao, K.; Xu, F.; Li, Y.; Su, L.; Jin, D. Protecting Trajectory From Semantic Attack Considering k-Anonymity, l-Diversity, and t-Closeness. IEEE Trans. Netw. Serv. Manag. 2018, 16, 264–278. [Google Scholar]
- Soo-Hyun, E.C.; Lee, C.C.; Lee, W.; Leung, C.K. Effective privacy preserving data publishing by vectorization. Inf. Sci. 2020, 527, 311–328. [Google Scholar]
- Yang, C.; Xiao, Y.; Xiong, L.; Bai, L. PriSTE: From location privacy to spatiotemporal event privacy. In Proceedings of the 2019 IEEE 35th International Conference on Data Engineering (ICDE), Macao, China, 8–11 April 2019; IEEE: New York, NY, USA, 2019; pp. 1606–1609. [Google Scholar]
- Sina, S.; Ding, M.; Liu, B.; Dang, S.; Lin, Z.; Li, J. Privacy preserving location data publishing: A machine learning approach. IEEE Trans. Knowl. Data Eng. 2020, 33, 3270–3283. [Google Scholar]
- José, C.; Pastrana, S. SoK: Privacy-preserving computation techniques for deep learning. Proc. Priv. Enhancing Technol. 2021, 2021, 139–162. [Google Scholar]
- Zhitao, G.; Lv, Z.; Du, X.; Wu, L.; Guizani, M. Achieving data utility-privacy tradeoff in Internet of medical things: A machine learning approach. Future Gener. Comput. Syst. 2019, 98, 60–68. [Google Scholar]
- Farough, A.; Sheikhahmadi, A. DI-Mondrian: Distributed improved Mondrian for satisfaction of the L-diversity privacy model using Apache Spark. Inf. Sci. 2021, 546, 1–24. [Google Scholar]
- Rong, W.; Zhu, Y.; Chen, T.; Chang, C. Privacy-preserving algorithms for multiple sensitive attributes satisfying t-closeness. J. Comput. Sci. Technol. 2018, 33, 1231–1242. [Google Scholar]
- Mehta Brijesh, B.; Rao, U.P. Improved l-diversity: Scalable anonymization approach for privacy preserving big data publishing. J. King Saud-Univ.-Comput. Inf. Sci. 2022, 61, 1423–1430. [Google Scholar] [CrossRef]
- Ullah, B.S.; Jang-Jaccard, J.; Alavizadeh, H. Scalable, high-performance, and generalized subtree data anonymization approach for Apache Spark. Electronics 2021, 10, 589. [Google Scholar]
- Sarah, Z.; Bennani, Y.; Rogovschi, N.; Lyhyaoui, A. Data Anonymization through Collaborative Multi-view Microaggregation. J. Intell. Syst. 2021, 30, 327–345. [Google Scholar]
- Jayapradha, J.; Prakash, M.; Alotaibi, Y.; Khalaf, O.I.; Alghamdi, S. Heap Bucketization Anonymity-An Efficient Privacy-Preserving Data Publishing Model for Multiple Sensitive Attributes. IEEE Access 2022, 10, 28773–28791. [Google Scholar] [CrossRef]
- Satoshi, I.; Kikuchi, H. Estimation of cost of k–anonymity in the number of dummy records. J. Ambient. Intell. Humaniz. Comput. 2022, 1–10. [Google Scholar] [CrossRef]
- Cynthia, D. Differential privacy: A survey of results. In Proceedings of the International Conference on Theory and Applications of Models of Computation, Xi’an, China, 25–29 April 2008; Springer: Berlin/Heidelberg, Geramny, 2008; pp. 1–19. [Google Scholar]
- Sina, S.; Shamsabadi, A.S.; Bellet, A.; Gatica-Perez, D. GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation. arXiv 2022, arXiv:2203.00949. [Google Scholar]
- Jiawen, Q.; Wang, J.; Li, Q.; Fang, S.; Li, X.; Lei, L. Differentially private frequent episode mining over event streams. Eng. Appl. Artif. Intell. 2022, 110, 104681. [Google Scholar]
- Ding, W.; Yang, W.; Zhou, J.; Shi, L.; Chen, G. Privacy Preserving via Secure Summation in Distributed Kalman Filtering. IEEE Trans. Control. Netw. Syst. 2022. [Google Scholar] [CrossRef]
- Ahmed, E.O.; Abdelhadi, A. Differential Privacy for Deep and Federated Learning: A Survey. IEEE Access 2022, 10, 22359–22380. [Google Scholar]
- Yanbing, R.; Li, X.; Miao, Y.; Deng, R.; Weng, J.; Ma, S.; Ma, J. DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services. IEEE Trans. Mob. Comput. 2022. [Google Scholar] [CrossRef]
- Seira, H.; Murakami, T. Degree-Preserving Randomized Response for Graph Neural Networks under Local Differential Privacy. arXiv 2022, arXiv:2202.10209. [Google Scholar]
- Cai, Z.; He, Z. Trading private range counting over big IoT data. In Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–10 July 2019; IEEE: New York, NY, USA, 2019; pp. 144–153. [Google Scholar]
- Xu, Z.; Cai, Z. Privacy-preserved data sharing towards multiple parties in industrial IoTs. IEEE J. Sel. Areas Commun. 2020, 38, 968–979. [Google Scholar]
- Yan, H.; Meng, C.; Li, R.; Jing, T. An overview of privacy preserving schemes for industrial internet of things. China Commun. 2020, 17, 1–18. [Google Scholar]
- Eugene, B.; Poursaeed, O.; Shmatikov, V. Differential privacy has disparate impact on model accuracy. In Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, Vancouver, BC, Canada, 8–14 December 2019. [Google Scholar]
- Wang, T.; Li, N.; Somesh, J. Locally differentially private frequent itemset mining. In Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP), Francisco, CA, USA, 20–24 May 2018; IEEE: New York, NY, USA, 2018; pp. 127–143. [Google Scholar]
- Tao, L.; Lin, L. Anonymousnet: Natural face de-identification with measurable privacy. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, Long Beach, CA, USA, 16–17 June 2019. [Google Scholar]
- Celestine, I.; Moqurrab, S.A.; Anjum, A.; Khan, S.; Mohan, S.; Srivastava, G. N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets. Comput. Commun. 2020, 161, 160–171. [Google Scholar]
- Andreas, N.; Jiménez, A.; Treiber, A.; Kolberg, J.; Jasserand, C.; Kindt, E.; Delgado, H.; Todisco, M.; Hmani, M.A.; Mtibaa, A.; et al. Preserving privacy in speaker and speech characterisation. Comput. Speech Lang. 2019, 58, 441–480. [Google Scholar]
- Sagar, S.; Chen, K.; Sheth, A. Toward practical privacy-preserving analytics for IoT and cloud-based healthcare systems. IEEE Internet Comput. 2018, 22, 42–51. [Google Scholar]
- Ye, Q.; Hu, H.; Meng, X.; Zheng, H. PrivKV: Key-value data collection with local differential privacy. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), Francisco, CA, USA, 19–23 May 2019; IEEE: New York, NY, USA, 2019; pp. 317–331. [Google Scholar]
- Hangyu, Z.; Zhang, H.; Jin, Y. From federated learning to federated neural architecture search: A survey. Complex Intell. Syst. 2021, 7, 639–657. [Google Scholar]
- Meng, H.; Li, H.; Xu, G.; Liu, S.; Yang, H. Towards efficient and privacy-preserving federated deep learning. In Proceedings of the ICC 2019–2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; IEEE: New York, NY, USA, 2019; pp. 1–6. [Google Scholar]
- Hangyu, Z.; Xu, J.; Liu, S.; Jin, Y. Federated learning on non-IID data: A survey. Neurocomputing 2021, 465, 371–390. [Google Scholar]
- Hao, J.; Luo, Y.; Li, P.; Mathew, J. A review of secure and privacy-preserving medical data sharing. IEEE Access 2019, 7, 61656–61669. [Google Scholar]
- Mohamed, S.; Tandon, R.; Li, M. Wireless federated learning with local differential privacy. In Proceedings of the 2020 IEEE International Symposium on Information Theory (ISIT), Los Angeles, CA, USA, 21–26 June 2020; IEEE: New York, NY, USA, 2020; pp. 2604–2609. [Google Scholar]
- Odeyomi, O.T. Differential Privacy in Social Networks Using Multi-Armed Bandit. IEEE Access 2022, 10, 11817–11820. [Google Scholar] [CrossRef]
- Tian, W.; Mei, Y.; Jia, W.; Zheng, X.; Wang, G.; Xie, M. Edge-based differential privacy computing for sensor-cloud systems. J. Parallel Distrib. Comput. 2020, 136, 75–85. [Google Scholar]
- Mengnan, B.; Wang, Y.; Cai, Z.; Tong, X. A privacy-preserving mechanism based on local differential privacy in edge computing. Chin. Commun. 2020, 17, 50–65. [Google Scholar]
- Mengmeng, Y.; Zhu, T.; Liu, B.; Xiang, Y.; Zhou, W. Machine learning differential privacy with multifunctional aggregation in a fog computing architecture. IEEE Access 2018, 6, 17119–17129. [Google Scholar]
- Akbar, H.M.; Anwar, A.; Chakrabortty, R.K.; Doss, R.; Ryan, M.J. Differential Privacy for IoT-Enabled Critical Infrastructure: A Comprehensive Survey. IEEE Access 2021, 9, 153276–153304. [Google Scholar]
- Bin, J.; Li, J.; Yue, G.; Song, H. Differential Privacy for Industrial Internet of Things: Opportunities, Applications, and Challenges. IEEE Internet Things J. 2021, 8, 10430–10451. [Google Scholar]
- Mahawaga, A.P.C.; Bertok, P.; Khalil, I.; Liu, D.; Camtepe, S.; Atiquzzaman, M. Local differential privacy for deep learning. IEEE Internet Things J. 2019, 7, 5827–5842. [Google Scholar] [CrossRef] [Green Version]
- Pathum, C.M.A.; Bertok, P.; Khalil, I.; Liu, D.; Camtepe, S. Privacy preserving distributed machine learning with federated learning. Comput. Commun. 2021, 171, 112–125. [Google Scholar]
- Will, A.; Hall, A.J.; Papadopoulos, P.; Pitropakis, N.; Buchanan, W.J. A distributed trust framework for privacy-preserving machine learning. In Proceedings of the International Conference on Trust and Privacy in Digital Business, Bratislava, Slovakia, 14–17 September 2020; Springer: Cham, Switzerland, 2020; pp. 205–220. [Google Scholar]
- Chandra, T.; Chamikara, M.A.P.; Camtepe, S.A. Advancements of federated learning towards privacy preservation: From federated learning to split learning. In Federated Learning Systems; Springer: Cham, Switzerland, 2021; pp. 79–109. [Google Scholar]
- Teng, W.; Zhao, J.; Hu, Z.; Yang, X.; Ren, X.; Lam, K. Local Differential Privacy for data collection and analysis. Neurocomputing 2021, 426, 114–133. [Google Scholar]
- Ge, Y.; Wang, S.; Wang, H. Federated learning with personalized local differential privacy. In Proceedings of the 2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS), Chengdu, China, 23–26 April 2021; IEEE: New York, NY, USA, 2021; pp. 484–489. [Google Scholar]
- Veronika, S.; Chamikara, M.A.P.; Khalil, I.; Atiquzzaman, M. Privacy-preserving location data stream clustering on mobile edge computing and cloud. Inf. Syst. 2021, 101728. [Google Scholar]
- Milan, L.; Alishahi, M.; Kivits, J.; Klarenbeek, J.; Velde, G.; Zannone, N. Comparing classifiers’ performance under differential privacy. In Proceedings of the International Conference on Security and Cryptography (SECRYPT), Lisbon, Portugal, 6–8 July 2021. [Google Scholar]
- Seryne, R.; Laurent, M.; Masmoudi, S.; Roux, C.; Mazeau, B. A Validated Privacy-Utility Preserving Recommendation System with Local Differential Privacy. arXiv 2021, arXiv:2109.11340. [Google Scholar]
- Afsoon, A.; Mohammadi, B. A clustering-based anonymization approach for privacy-preserving in the healthcare cloud. Concurr. Comput. Pract. Exp. 2022, 34, e6487. [Google Scholar]
- Yavuz, C.; Sagiroglu, S.; Vural, Y. A new utility-aware anonymization model for privacy preserving data publishing. Concurr. Comput. Pract. Exp. 2022, 34, e6808. [Google Scholar]
- Farough, A.; Khamforoosh, K.; Sheikhahmadi, A.; Khamfroush, H. DHkmeans-l-diversity: Distributed hierarchical K-means for satisfaction of the l-diversity privacy model using Apache Spark. J. Supercomput. 2022, 78, 2616–2650. [Google Scholar]
- Rabeeha, F.; Shah, M.A.; Khattak, H.A.; Rauf, H.T.; Al-Turjman, F. Achieving data privacy for decision support systems in times of massive data sharing. Clust. Comput. 2022, 1–13. [Google Scholar] [CrossRef]
- Ullah, S.F.; Yahya, A. Clustering Techniques for Image Segmentation; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
- Kun, G.; Zhang, Q. Fast clustering-based anonymization approaches with time constraints for data streams. Knowl.-Based Syst. 2013, 46, 95–108. [Google Scholar]
- Andrew, O.J.; Karthikeyan, J.; Sei, Y. An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services. Peer-to-Peer Netw. Appl. 2021, 14, 1629–1649. [Google Scholar]
- Ugur, S.; Abul, O. Classification utility aware data stream anonymization. Appl. Soft Comput. 2021, 110, 107743. [Google Scholar]
- Lu, Y.; Chen, X.; Luo, Y.; Lan, X.; Wang, W. IDEA: A utility-enhanced approach to incomplete data stream anonymization. Tsinghua Sci. Technol. 2021, 27, 127–140. [Google Scholar]
- Sadeghi, N.A.R.; Ghaffarian, H. A New Fast Framework for Anonymizing IoT Stream Data. In Proceedings of the 2021 5th International Conference on Internet of Things and Applications (IoT), Isfahan, Iran, 19–20 May 2021; IEEE: New York, NY, USA, 2021; pp. 1–5. [Google Scholar]
- Jimmy, T.; Bouna, B.A.; Issa, Y.B.; Kamradt, M.; Haraty, R. (k, l)-Clustering for Transactional Data Streams Anonymization. In Proceedings of the International Conference on Information Security Practice and Experience, Tokyo, Japan, 25–27 September 2018; Springer: Cham, Switzerland, 2018; pp. 544–556. [Google Scholar]
- Pooja, P. Clustering Approaches for Anonymizing High-Dimensional Sequential Activity Data. Ph.D. Thesis, University of Maryland, Baltimore County, MD, USA, 2020. [Google Scholar]
- Naixuan, G.; Yang, M.; Gong, Q.; Chen, Z.; Luo, J. Data anonymization based on natural equivalent class. In Proceedings of the 2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design (CSCWD), Porto, Portugal, 6–8 May 2019; IEEE: New York, NY, USA, 2019; pp. 22–27. [Google Scholar]
- Wantong, Z.; Wang, Z.; Lv, T.; Ma, Y.; Jia, C. K-anonymity algorithm based on improved clustering. In Proceedings of the International Conference on Algorithms and Architectures for Parallel Processing, Guangzhou, China, 15–17 November 2018; Springer: Cham, Switzerland, 2018; pp. 462–476. [Google Scholar]
- Madhuri, S.; Li, Y.; Cheng, X.; Tian, Z.; Cai, Z. Anonymization in online social networks based on enhanced equi-cardinal clustering. IEEE Trans. Comput. Soc. Syst. 2019, 6, 809–820. [Google Scholar]
- Zhao, X.; Pi, D.; Chen, J. Novel trajectory privacy-preserving method based on clustering using differential privacy. Expert Syst. Appl. 2020, 149, 113241. [Google Scholar] [CrossRef]
- Qi, L.; Yu, J.; Han, J.; Yao, X. Differentially private and utility-aware publication of trajectory data. Expert Syst. Appl. 2021, 180, 115120. [Google Scholar]
- Yan, X.; Zhou, Y.; Huang, F.; Wang, X.; Yuan, P. Privacy protection method of power metering data in clustering based on differential privacy. In Proceedings of the 2021 IEEE 4th International Electrical and Energy Conference (CIEEC), Wuhan, China, 28–30 May 2021; IEEE: New York, NY, USA, 2021; pp. 1–6. [Google Scholar]
- Lan, Q.; Ma, J.; Yan, Z.; Li, G. Utility-preserving differentially private skyline query. Expert Syst. Appl. 2022, 187, 115871. [Google Scholar] [CrossRef]
- Jiawen, D.; Pi, Y. Research on Privacy Protection Technology of Mobile Social Network Based on Data Mining under Big Data. Secur. Commun. Netw. 2022, 2022, 3826126. [Google Scholar]
- Vartika, P.; Kaur, P.; Sachdeva, S. Efficient Clustering of Transactional Data for Privacy-Preserving Data Publishing. In Cyber Security and Digital Forensics; Springer: Singapore, 2022; pp. 153–160. [Google Scholar]
- Oleksii, P.; Mushkatblat, V.; Kaplan, A. Privacy Attacks Based on Correlation of Dataset Identifiers: Assessing the Risk. In Proceedings of the 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 26–29 January 2022; IEEE: New York, NY, USA, 2022; pp. 808–815. [Google Scholar]
- Ariel, F. Anonymizing Machine Learning Models. In Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, 8 October 2021; Revised Selected Papers. Springer Nature: Berlin, Germany, 2021; p. 121. [Google Scholar]
- Mina, S.; Saracino, A.; Martinelli, F.; Marra, A.L. Privacy preserving data sharing and analysis for edge-based architectures. Int. J. Inf. Secur. 2022, 21, 79–101. [Google Scholar]
- Riyazuddin, M.D.; Begum, S.H.; Sadiq, J. Preserving the Privacy of COVID-19 Infected Patients Data Using a Divergent-Scale Supervised Learning for Publishing the Informative Data. In Contactless Healthcare Facilitation and Commodity Delivery Management During COVID-19 Pandemic; Springer: Singapore, 2022; pp. 35–47. [Google Scholar]
- Shree, Y.U.; Gupta, B.B.; Peraković, D.; Peñalvo, F.J.G.; Cvitić, I. Security and Privacy of Cloud-Based Online Online Social Media: A Survey. In Sustainable Management of Manufacturing Systems in Industry 4.0; Springer: Cham, Switzerland, 2022; pp. 213–236. [Google Scholar]
- Tânia, C.; Moniz, N.; Faria, P.; Antunes, L. Survey on Privacy-Preserving Techniques for Data Publishing. arXiv 2022, arXiv:2201.08120. [Google Scholar]
- Dong, L.; Yang, G.; Wang, Y.; Jin, H.; Chen, E. How to Protect Ourselves from Overlapping Community Detection in Social Networks. IEEE Trans. Big Data 2022. [Google Scholar]
- Chenguang, W.; Tianqing, Z.; Xiong, P.; Ren, W.; Choo, K.R. A privacy preservation method for multiple-source unstructured data in online social networks. Comput. Secur. 2022, 113, 102574. [Google Scholar]
- Srivatsan, S.; Maheswari, N. Privacy Preservation in Social Network Data using Evolutionary Model. Mater. Today Proc. 2022, in press. [Google Scholar] [CrossRef]
- Shakir, K.; Saravanan, V.; Lakshmi, T.J.; Deb, N.; Othman, N.A. Privacy Protection of Healthcare Data over Social Networks Using Machine Learning Algorithms. Comput. Intell. Neurosci. 2022, 2022, 9985933. [Google Scholar]
- Linnet, T.; Floridi, L.; der Sloot, B.V. (Eds.) Group Privacy: New Challenges of Data Technologies; Springer: Berlin/Heidelberg, Germany, 2016; Volume 126. [Google Scholar]
- Lanah, K.; Baar, T.; Berens, J.; Letouzé, E.; Manske, J.; Palmer, J.; Sangokoya, D.; Vinck, P. Group privacy in the age of big data. In Group Privacy; Springer: Cham, Switzerland, 2017; pp. 37–66. [Google Scholar]
- Michele, L.; Christen, M. Two concepts of group privacy. Philos. Technol. 2020, 33, 207–224. [Google Scholar]
- Nora, M.; Forte, A. Privacy and Vulnerable Populations. In Modern Socio-Technical Perspectives on Privacy; Springer: Cham, Switzerland, 2022; pp. 337–363. [Google Scholar]
- Shabnam, N.; Delic, A.; Tkalcic, M.; Tintarev, N. Factors influencing privacy concern for explanations of group recommendation. In Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization, Utrecht, The Netherlands, 21–25 June 2021; pp. 14–23. [Google Scholar]
- Lili, N.Z.; Hrgarek, L.; Welzer, T.; Hölbl, M. Models of Privacy and Disclosure on Social Networking Sites: A Systematic Literature Review. Mathematics 2022, 10, 146. [Google Scholar]
- Xu, Z.; Cai, Z.; Luo, G.; Tian, L.; Bai, X. Privacy-preserved community discovery in online social networks. Future Gener. Comput. Syst. 2019, 93, 1002–1009. [Google Scholar]
- Jin, B.; Li, S. Research on a privacy preserving clustering method for social network. In Proceedings of the 2019 IEEE 4th International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), Chengdu, China, 12–15 April 2019; IEEE: New York, NY, USA, 2019; pp. 29–33. [Google Scholar]
- Guobin, C.; Huang, T. Community privacy estimation method based on key node method in space social Internet of Things. Int. J. Distrib. Sens. Netw. 2019, 15, 1550147719883131. [Google Scholar]
- Jian, L.; Zhang, X.; Liu, J.; Gao, L.; Zhang, H.; Feng, Y. Large-Scale Social Network Privacy Protection Method for Protecting K-Core. Int. J. Netw. Secur. 2021, 23, 612–622. [Google Scholar]
- Zengyang, S.; Ma, L.; Lin, Q.; Li, J.; Gong, M.; Nandi, A.K. PMCDM: Privacy-preserving multiresolution community detection in multiplex networks. Knowl.-Based Syst. 2022, 244, 108542. [Google Scholar]
- de, M.Y.; Quoidbach, J.; Robic, F.; Pentland, A.S. Predicting personality using novel mobile phone-based metrics. In Proceedings of the International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction, Washington, DC, USA, 2–5 April 2013; Springer: Berlin/Heidelberg, Germany, 2013; pp. 48–55. [Google Scholar]
- Wu, P.F. The privacy paradox in the context of online social networking: A self-identity perspective. J. Assoc. Inf. Sci. Technol. 2019, 70, 207–217. [Google Scholar] [CrossRef]
- Urbano, R.; Alunge, R. I am datafied because we are datafied”: An Ubuntu perspective on (relational) privacy. Philos. Technol. 2020, 33, 595–612. [Google Scholar]
- Gstrein, O.J.; Beaulieu, A. How to protect privacy in a datafied society? A presentation of multiple legal and conceptual approaches. Philos. Technol. 2022, 35, 1–38. [Google Scholar] [CrossRef] [PubMed]
- Paola, M.; Karyda, M. Big data in political communication: Implications for group privacy. Int. J. Electron. Gov. 2019, 11, 289–309. [Google Scholar]
- Paola, M.; Karyda, M. Big Data Analytics in Healthcare Applications: Privacy Implications for Individuals and Groups and Mitigation Strategies. In European, Mediterranean, and Middle Eastern Conference on Information Systems; Springer: Cham, Switzerland, 2020; pp. 526–540. [Google Scholar]
- Heinrichs, B. Discrimination in the age of artificial intelligence. AI Soc. 2022, 37, 143–154. [Google Scholar] [CrossRef]
- Rainer, M. Predictive privacy: Towards an applied ethics of data analytics. Ethics Inf. Technol. 2021, 23, 675–690. [Google Scholar]
- Paola, M.; Karyda, M. Profiling with Big Data: Identifying Privacy Implication for Individuals, Groups and Society. In Proceedings of the MCIS 2018 Proceedings, Corfu, Greece, 28–30 September 2018; p. 4. [Google Scholar]
- Hiroaki, K. Differentially private profiling of anonymized customer purchase records. In Data Privacy Management, Cryptocurrencies and Blockchain Technology; Springer: Cham, Switzerland, 2020; pp. 19–34. [Google Scholar]
- John, F.; Lewis, M. Monitoring the R-Citizen in the Time of COVID-19. In Communicating COVID-19; Palgrave Macmillan: Cham, Switzerland, 2021; pp. 345–370. [Google Scholar]
- Khaled, A.; Mishra, S. Incorporating individual and group privacy preferences in the internet of things. J. Ambient. Intell. Humaniz. Comput. 2021, 13, 1969–1984. [Google Scholar]
- Ishara, W.C.; Reinhardt, D. A User-Centric Privacy-Preserving Approach to Control Data Collection, Storage, and Disclosure in Own Smart Home Environments. In Proceedings of the International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, Virtual Event, 8–11 November 2021; Springer: Cham, Switzerland, 2021; pp. 190–206. [Google Scholar]
- Kitae, K.; Moon, S. When Algorithmic Transparency Failed: Controversies Over Algorithm-Driven Content Curation in the South Korean Digital Environment. Am. Behav. Sci. 2021, 65, 847–862. [Google Scholar]
- Jongwoo, K.; Baskerville, R.L.; Ding, Y. Breaking the privacy kill chain: Protecting individual and group privacy online. Inf. Syst. Front. 2020, 22, 171–185. [Google Scholar]
- Antonia, R.; Lax, G.; Dromard, B.; Mezred, M. A System to Access Online Services with Minimal Personal Information Disclosure. Inf. Syst. Front. 2021, 1–13. [Google Scholar]
- Jennifer, L.; Terry, S. Privacy in the coronavirus era. Genet. Test. Mol. Biomarkers 2020, 24, 535–536. [Google Scholar]
- Amany, A.; Al-Razgan, M.; AlKallas, F.H.; Suhaim, R.A.B.; Al-Tamimi, R.; Alharbi, N.; AlSaif, S.O. Data privacy during pandemics: A systematic literature review of COVID-19 smartphone applications. PeerJ Comput. Sci. 2022, 7, e826. [Google Scholar]
- Sean, O.; Abu-Salma, R.; Diallo, O.; Krämer, J.; Simmons, J.; Wu, J.; Ruoti, S. User Perceptions of Security and Privacy for Group Chat. Digit. Threat. Res. Pract. (Dtrap) 2022, 3, 1–29. [Google Scholar]
- Victor, P.B.H.; Neerkaje, A.T.; Sawhney, R.; Flek, L.; Søgaard, A. The Impact of Differential Privacy on Group Disparity Mitigation. arXiv 2022, arXiv:2203.02745. [Google Scholar]
- Jacob, E.; Yuzon, J.Y.; Bonaci, T. What You Don’t Expect When You’re Expecting: Privacy Analysis of Femtech. IEEE Trans. Technol. Soc. 2022. [Google Scholar] [CrossRef]
- Diego, P.; Katevas, K.; Lutu, A.; Marin, E.; Kourtellis, N. "Privacy-preserving AI for future networks. Commun. ACM 2022, 65, 52–53. [Google Scholar]
- Borislav, T.; Rohde, M.; Randall, D.; Wulf, V. Design Evolution of a Tool for Privacy and Security Protection for Activists Online: Cyberactivist. Int. J. Hum. Comput. Interact. 2022, 1–23. [Google Scholar]
- Zhang, G.; Liu, B.; Zhu, T.; Zhou, A.; Zhou, W. Visual privacy attacks and defenses in deep learning: A survey. Artif. Intell. Rev. 2022, 1–55. [Google Scholar] [CrossRef]
- Wang, Y.; Su, Z.; Zhang, N.; Liu, D.; Xing, R.; Luan, T.H.; Shen, X. A Survey on Metaverse: Fundamentals, Security, and Privacy. arXiv 2022, arXiv:2203.02662. [Google Scholar]
- Kathryn, N.; Trott, V.; Allen, W. The politics of data visualisation and policy making. Convergence 2022, 28, 3–12. [Google Scholar]
- Linnet, T.; Floridi, L.; van der Sloot, B. Introduction: A new perspective on privacy. In Group Privacy; Springer: Cham, Switzerland, 2017; pp. 1–12. [Google Scholar]
- Hitoshi, K. When accurate information harms people: Information on COVID-19 infection clusters in Japan. Cosmop. Civ. Soc. Interdiscip. J. 2021, 13, 60–72. [Google Scholar]
- Paola, M.; Karyda, M. Automated data-driven profiling: Threats for group privacy. Inf. Comput. Secur. 2019. [CrossRef]
- Murali, K.S.; Kumar, A.P.S. Modern Privacy Threats and Privacy Preservation Techniques in Data Analytics. In Factoring Ethics in Technology, Policy Making and Regulation; IntechOpen: London, UK, 2021. [Google Scholar]
- Abdul, M.; Lee, S. Attribute susceptibility and entropy based data anonymization to improve users community privacy and utility in publishing data. Appl. Intell. 2020, 50, 2555–2574. [Google Scholar]
- Eugenia, P.; Alepis, E.; Virvou, M.; Patsakis, C. Privacy in Ubiquitous Mobile Computing. In Privacy and Data Protection Challenges in the Distributed Era; Springer: Cham, Switzerland, 2022; pp. 93–131. [Google Scholar]
- Mantelero, A. From group privacy to collective privacy: Towards a new dimension of privacy and data protection in the big data era. In Group Privacy; Springer: Cham, Switzerland, 2017; pp. 139–158. [Google Scholar]
- Yuval, E.; Shapira, B.; Maschiach, A. A new privacy model for hiding group interests while accessing the web. In Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society, Washington, DC, USA, 21 November 2002; pp. 63–70. [Google Scholar]
- Samuel, R.; Saura, J.R.; Palacios-Marqués, D. Towards a new era of mass data collection: Assessing pandemic surveillance technologies to preserve user privacy. Technol. Forecast. Soc. Chang. 2021, 167, 120681. [Google Scholar]
- Paula, G.; López, A.F.; Lacárcel, F.J.S. Main Government-Related Data Extraction Techniques: A Review. Handb. Res. Artif. Intell. Gov. Pract. Process. 2022, 142–160. [Google Scholar]
- Blake, C.; Merz, C. UCI Repository of Machine Learning Databases; Irvine: Irvine, CA, USA, 1998. [Google Scholar]
- Sujatha, K.; Udayarani, V. Chaotic geometric data perturbed and ensemble gradient homomorphic privacy preservation over big healthcare data. Int. J. Syst. Assur. Eng. Manag. 2021, 1–13. [Google Scholar] [CrossRef]
- Breiman, L. Random forests. Mach. Learn. 2001, 45, 5–32. [Google Scholar] [CrossRef] [Green Version]
- Cheng, Z.; Jiang, H.; Wang, Y.; Hu, Q.; Yu, J.; Cheng, X. User identity de-anonymization based on attributes. In Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications, Honolulu, HI, USA, 24–26 June 2019; Springer: Cham, Switzerland, 2019; pp. 458–469. [Google Scholar]
- Eyupoglu, C.; Aydin, M.A.; Zaim, A.H.; Sertbas, A. An efficient big data anonymization algorithm based on chaos and perturbation techniques. Entropy 2018, 20, 373. [Google Scholar] [CrossRef] [Green Version]
- Luciano, F. Group privacy: A defence and an interpretation. In Group privacy; Springer: Cham, Switzerland, 2017; pp. 83–100. [Google Scholar]
- Youssef, K.; Qiu, J.; Tan, T.; Cao, G. TargetFinder: A privacy preserving system for locating targets through IoT cameras. ACM Trans. Internet Things 2020, 1, 1–23. [Google Scholar]
- Ruoxuan, W.; Shen, H.; Tian, H. An Improved (k, p, l)-Anonymity Method for Privacy Preserving Collaborative Filtering. In Proceedings of the GLOBECOM 2017–2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; IEEE: New York, NY, USA, 2017; pp. 1–6. [Google Scholar]
- Imran, Z.; Dhou, S.; Judas, J.; Sajun, A.R.; Gomez, B.R.; Hussain, L.A. An IoT System Using Deep Learning to Classify Camera Trap Images on the Edge. Computers 2022, 11, 13. [Google Scholar]
- Mehrdad, J.; Sohrabi, M.K. A Comprehensive Survey on Security Challenges in Different Network Layers in Cloud Computing. Arch. Comput. Methods Eng. 2022, 1–22. [Google Scholar] [CrossRef]
- Haiyan, J.; Baumer, E.P.S. Birds of a Feather: Collective Privacy of Online Social Activist Groups. Comput. Secur. 2022, 115, 102614. [Google Scholar]
- Mahdavifar, S.; Deldar, F.; Mahdikhani, H. Personalized Privacy-Preserving Publication of Trajectory Data by Generalization and Distortion of Moving Points. J. Netw. Syst. Manag. 2022, 30, 1–42. [Google Scholar] [CrossRef]
- Dipankar, D.; Chettri, S.K.; Dutta, A.K. Security and Privacy Issues in Internet of Things. In ICT Analysis and Applications; Springer: Singapore, 2022; pp. 65–74. [Google Scholar]
- Waqas, A.; Nauman, M.; Azam, N. A privacy enhancing model for Internet of Things using three-way decisions and differential privacy. Comput. Electr. Eng. 2022, 100, 107894. [Google Scholar]
- Ti, W.; Zhou, Y.; Ma, H.; Zhang, R. Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud. Comput. J. 2022. [Google Scholar] [CrossRef]
- Luca, C.; Wendzel, S.; Vrhovec, S.; Mileva, A. Security and Privacy Issues of Home Globalization. IEEE Secur. Priv. 2022, 20, 10–11. [Google Scholar]
- Stacey, T.; Baracaldo, N.; Anwar, A.; Steinke, T.; Ludwig, H.; Zhang, R.; Zhou, Y. A hybrid approach to privacy-preserving federated learning. In Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, London, UK, 15 November 2019; pp. 1–11. [Google Scholar]
- Viraaji, M.; Parizi, R.M.; Pouriyeh, S.; Huang, Y.; Dehghantanha, A.; Srivastava, G. A survey on security and privacy of federated learning. Future Gener. Comput. Syst. 2021, 115, 619–640. [Google Scholar]
- Kang, W.; Li, J.; Ding, M.; Ma, C.; Yang, H.H.; Farokhi, F.; Jin, S.; Quek, T.Q.S.; Poor, H.V. Federated learning with differential privacy: Algorithms and performance analysis. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3454–3469. [Google Scholar]
- Yu, B.; Mao, W.; Lv, Y.; Zhang, C.; Xie, Y. A survey on federated learning in data mining. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 2022, 12, e1443. [Google Scholar] [CrossRef]
- Arif, C.; Pinoli, P.; Gulino, A.; Nanni, L.; Masseroli, M.; Ceri, S. Federated sharing and processing of genomic datasets for tertiary data analysis. Briefings Bioinform. 2021, 22, bbaa091. [Google Scholar]
- Felix, S.; Müller, K.; Samek, W. Clustered federated learning: Model-agnostic distributed multitask optimization under privacy constraints. IEEE Trans. Neural Netw. Learn. Syst. 2020, 32, 3710–3722. [Google Scholar]
- Nader, B.; Mohapatra, P. Vulnerabilities in federated learning. IEEE Access 2021, 9, 63229–63249. [Google Scholar]
- Fan, M.; Haddadi, H.; Katevas, K.; Marin, E.; Perino, D.; Kourtellis, N. PPFL: Enhancing Privacy in Federated Learning with Confidential Computing. Getmobile Mob. Comput. Commun. 2022, 25, 35–38. [Google Scholar]
Ref. | Study Nature | Main Assertion | Experimental Analysis | Threats to Group Privacy Discussed |
---|---|---|---|---|
Wu et al. [146] | Theoretical | Suggests a method for self-identity protection across social networks | ✕ | ✕ |
Reviglio et al. [147] | Theoretical | Highlights pertinent threats to group privacy in data mining | ✕ | ✓ |
Gstrein et al. [148] | Theoretical | Discusses many group privacy issues in datafication paradox | ✕ | ✓ |
Mavriki et al. [149] | Theoretical | Discusses implications of group privacy on general public | ✕ | ✓ |
Mavriki et al. [150] | Technical | Discusses group privacy issues in e-health applications with examples | ✕ | ✓ |
Heinrichs et al. [151] | Theoretical | Highlight group privacy issues caused by the AI tools | ✕ | ✓ |
Mühlhoff et al. [152] | Theoretical | Suggests a group privacy protection in predictive analytics | ✕ | ✓ |
Mavriki et al. [153] | Theoretical | Suggests protecting the interests of groups in big data era | ✕ | ✓ |
Kikuchi et al. [154] | Theoretical | Highlights the need of group privacy protection in purchase records | ✕ | ✓ |
Flood et al. [155] | Theoretical | Discusses group privacy issues in COVID-19 contact tracing apps | ✕ | ✓ |
Alanezi et al. [156] | Technical | Solves the group privacy problem in IoT scenarios using diversity concept | ✓ | ✓ |
Wickrama et al. [157] | Theoretical | Discusses group privacy issues in smart homes environments | ✕ | ✓ |
Kim et al. [158] | Theoretical | Discusses AI effects on group privacy and their implications | ✕ | ✓ |
Kim et al. [159] | Theoretical | Highlights threats to group privacy in social networks analysis and mining | ✕ | ✓ |
Russo et al. [160] | Technical | Suggests a privacy protection method to access online social network services | ✓ | ✕ |
Labs et al. [161] | Theoretical | Highlights privacy issues in COVID-19 era (surveillance related) | ✕ | ✓ |
Alshawi et al. [162] | Theoretical | Describes group privacy-related issues in COVID-19 tracing apps | ✕ | ✓ |
Sean et al. [163] | Theoretical | Describes privacy concerns in group chat tools | ✕ | ✓ |
Petrén et al. [164] | Technical | Describes DP effect on group privacy (or decisions) preservation | ✓ | ✓ |
Erickson et al. [165] | Theoretical | Describes many potential group privacy issues in Femtech app | ✕ | ✓ |
Perino et al. [166] | Theoretical | Highlights AI effect on users privacy and change in privacy landscape | ✕ | ✓ |
Tadic et al. [167] | Technical | Develops a practical tool for solving group privacy issues online | ✓ | ✓ |
Sfar et al. [18] | Technical | Proposed a generalized privacy protection solution for e-health sector | ✓ | ✕ |
Zhang et al. [168] | Theoretical | Highlights the concept of visual privacy in deep learning systems | ✕ | ✓ |
Wang et al. [169] | Theoretical | Provides three new dimensions of group privacy in digitization age | ✕ | ✓ |
Nash et al. [170] | Theoretical | Discusses privacy issues in big data aggregation and analytics | ✕ | ✓ |
This study | Technical | Describes group privacy in AI and big data era and proves concepts’ feasibility via experiments | ✓ | ✓ |
Dataset | Total Records | Dimensions | QID Name (Cardinality, Type) | Name of SA (Unique Values) |
---|---|---|---|---|
Adults [181] | 32,561 | 32,561 × 6 | Age (74, numerical) Gender (2, categorical) Race (5, categorical) Country (41, categorical) Relationship (6, categorical) | Salary/Income (2) |
Diabetes [182] | 20,501 | 20,501 × 6 | Race (5, categorical) Gender (2, categorical) Age (32, numerical) I_status (4, categorical) Admission_type (8, categorical) | DiabetesMed (2) |
Symbols | Description |
---|---|
D | Original data |
N | Number of individuals in D, where |
A | Set of attributes in D, where |
user/tuple/record in T, where | |
Q | Set of QIDs, where |
p | Total QIDs in set Q, where |
S | SA values set, where |
Number of classification/regression trees | |
Variables used to split tree’s node | |
Vulnerability value of a kth QI | |
Total vulnerability of a D | |
Group of people with some common attributes |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Majeed, A.; Khan, S.; Hwang, S.O. Group Privacy: An Underrated but Worth Studying Research Problem in the Era of Artificial Intelligence and Big Data. Electronics 2022, 11, 1449. https://doi.org/10.3390/electronics11091449
Majeed A, Khan S, Hwang SO. Group Privacy: An Underrated but Worth Studying Research Problem in the Era of Artificial Intelligence and Big Data. Electronics. 2022; 11(9):1449. https://doi.org/10.3390/electronics11091449
Chicago/Turabian StyleMajeed, Abdul, Safiullah Khan, and Seong Oun Hwang. 2022. "Group Privacy: An Underrated but Worth Studying Research Problem in the Era of Artificial Intelligence and Big Data" Electronics 11, no. 9: 1449. https://doi.org/10.3390/electronics11091449
APA StyleMajeed, A., Khan, S., & Hwang, S. O. (2022). Group Privacy: An Underrated but Worth Studying Research Problem in the Era of Artificial Intelligence and Big Data. Electronics, 11(9), 1449. https://doi.org/10.3390/electronics11091449