Data Anonymization Using Pseudonym System to Preserve Data Privacy

Data collection and storage in a large size is done on a routine basis in any company or organization. To this end, wireless network infrastructure and cloud computing are two widely-used tools. With the use of such services, less time is needed to attain the required output, and also managing the j...

Full description

Bibliographic Details
Main Authors: Shukor Abd Razak, Nur Hafizah Mohd Nazari, Arafat Al-Dhaqm
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9018049/
_version_ 1818430585988710400
author Shukor Abd Razak
Nur Hafizah Mohd Nazari
Arafat Al-Dhaqm
author_facet Shukor Abd Razak
Nur Hafizah Mohd Nazari
Arafat Al-Dhaqm
author_sort Shukor Abd Razak
collection DOAJ
description Data collection and storage in a large size is done on a routine basis in any company or organization. To this end, wireless network infrastructure and cloud computing are two widely-used tools. With the use of such services, less time is needed to attain the required output, and also managing the jobs will be simpler for users. General services employ a unique identifier for the aim of storing data in a digital database. However, it may be associated with some limitations and challenges. There is a link between the unique identifier and the data holder, e.g., name, address, Identity card number, etc. Attackers can manipulate a unique identifier for stealing the whole data. To get the data needed, attackers may even eavesdrop or guess. It results in lack of data privacy protection. As a result, it is necessary to take into consideration the data privacy issues in any data digital data storage. With the use of current services, there is a high possibility of exposure and leak of data/information to an unauthorized party during their transfer process. In addition, attacks may take place against services; for instance spoofing attacks, forgery attacks, etc. in the course of information transaction. To address such risks, this paper suggests the use of a biometric authentication method by means of a palm vein during the authentication process. Furthermore, a pseudonym creation technique is adopted to make the database record anonymous, which can make sure the data is properly protected. This way, any unauthorized party cannot gain access to data/information. The proposed system can resolve the information leaked, the user true identity is never revealed to others.
first_indexed 2024-12-14T15:35:46Z
format Article
id doaj.art-be9cb1fe223149f18675d825fb578a06
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-14T15:35:46Z
publishDate 2020-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-be9cb1fe223149f18675d825fb578a062022-12-21T22:55:43ZengIEEEIEEE Access2169-35362020-01-018432564326410.1109/ACCESS.2020.29771179018049Data Anonymization Using Pseudonym System to Preserve Data PrivacyShukor Abd Razak0https://orcid.org/0000-0002-8824-6069Nur Hafizah Mohd Nazari1https://orcid.org/0000-0001-6374-737XArafat Al-Dhaqm2https://orcid.org/0000-0002-0729-2654School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia (UTM), Skudai, MalaysiaSchool of Computing, Faculty of Engineering, Universiti Teknologi Malaysia (UTM), Skudai, MalaysiaSchool of Computing, Faculty of Engineering, Universiti Teknologi Malaysia (UTM), Skudai, MalaysiaData collection and storage in a large size is done on a routine basis in any company or organization. To this end, wireless network infrastructure and cloud computing are two widely-used tools. With the use of such services, less time is needed to attain the required output, and also managing the jobs will be simpler for users. General services employ a unique identifier for the aim of storing data in a digital database. However, it may be associated with some limitations and challenges. There is a link between the unique identifier and the data holder, e.g., name, address, Identity card number, etc. Attackers can manipulate a unique identifier for stealing the whole data. To get the data needed, attackers may even eavesdrop or guess. It results in lack of data privacy protection. As a result, it is necessary to take into consideration the data privacy issues in any data digital data storage. With the use of current services, there is a high possibility of exposure and leak of data/information to an unauthorized party during their transfer process. In addition, attacks may take place against services; for instance spoofing attacks, forgery attacks, etc. in the course of information transaction. To address such risks, this paper suggests the use of a biometric authentication method by means of a palm vein during the authentication process. Furthermore, a pseudonym creation technique is adopted to make the database record anonymous, which can make sure the data is properly protected. This way, any unauthorized party cannot gain access to data/information. The proposed system can resolve the information leaked, the user true identity is never revealed to others.https://ieeexplore.ieee.org/document/9018049/Authenticationpalm veinpseudonymanonimousunlinkabilitydata preserving
spellingShingle Shukor Abd Razak
Nur Hafizah Mohd Nazari
Arafat Al-Dhaqm
Data Anonymization Using Pseudonym System to Preserve Data Privacy
IEEE Access
Authentication
palm vein
pseudonym
anonimous
unlinkability
data preserving
title Data Anonymization Using Pseudonym System to Preserve Data Privacy
title_full Data Anonymization Using Pseudonym System to Preserve Data Privacy
title_fullStr Data Anonymization Using Pseudonym System to Preserve Data Privacy
title_full_unstemmed Data Anonymization Using Pseudonym System to Preserve Data Privacy
title_short Data Anonymization Using Pseudonym System to Preserve Data Privacy
title_sort data anonymization using pseudonym system to preserve data privacy
topic Authentication
palm vein
pseudonym
anonimous
unlinkability
data preserving
url https://ieeexplore.ieee.org/document/9018049/
work_keys_str_mv AT shukorabdrazak dataanonymizationusingpseudonymsystemtopreservedataprivacy
AT nurhafizahmohdnazari dataanonymizationusingpseudonymsystemtopreservedataprivacy
AT arafataldhaqm dataanonymizationusingpseudonymsystemtopreservedataprivacy