Data Anonymization Using Pseudonym System to Preserve Data Privacy
Data collection and storage in a large size is done on a routine basis in any company or organization. To this end, wireless network infrastructure and cloud computing are two widely-used tools. With the use of such services, less time is needed to attain the required output, and also managing the j...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9018049/ |
_version_ | 1818430585988710400 |
---|---|
author | Shukor Abd Razak Nur Hafizah Mohd Nazari Arafat Al-Dhaqm |
author_facet | Shukor Abd Razak Nur Hafizah Mohd Nazari Arafat Al-Dhaqm |
author_sort | Shukor Abd Razak |
collection | DOAJ |
description | Data collection and storage in a large size is done on a routine basis in any company or organization. To this end, wireless network infrastructure and cloud computing are two widely-used tools. With the use of such services, less time is needed to attain the required output, and also managing the jobs will be simpler for users. General services employ a unique identifier for the aim of storing data in a digital database. However, it may be associated with some limitations and challenges. There is a link between the unique identifier and the data holder, e.g., name, address, Identity card number, etc. Attackers can manipulate a unique identifier for stealing the whole data. To get the data needed, attackers may even eavesdrop or guess. It results in lack of data privacy protection. As a result, it is necessary to take into consideration the data privacy issues in any data digital data storage. With the use of current services, there is a high possibility of exposure and leak of data/information to an unauthorized party during their transfer process. In addition, attacks may take place against services; for instance spoofing attacks, forgery attacks, etc. in the course of information transaction. To address such risks, this paper suggests the use of a biometric authentication method by means of a palm vein during the authentication process. Furthermore, a pseudonym creation technique is adopted to make the database record anonymous, which can make sure the data is properly protected. This way, any unauthorized party cannot gain access to data/information. The proposed system can resolve the information leaked, the user true identity is never revealed to others. |
first_indexed | 2024-12-14T15:35:46Z |
format | Article |
id | doaj.art-be9cb1fe223149f18675d825fb578a06 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-14T15:35:46Z |
publishDate | 2020-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-be9cb1fe223149f18675d825fb578a062022-12-21T22:55:43ZengIEEEIEEE Access2169-35362020-01-018432564326410.1109/ACCESS.2020.29771179018049Data Anonymization Using Pseudonym System to Preserve Data PrivacyShukor Abd Razak0https://orcid.org/0000-0002-8824-6069Nur Hafizah Mohd Nazari1https://orcid.org/0000-0001-6374-737XArafat Al-Dhaqm2https://orcid.org/0000-0002-0729-2654School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia (UTM), Skudai, MalaysiaSchool of Computing, Faculty of Engineering, Universiti Teknologi Malaysia (UTM), Skudai, MalaysiaSchool of Computing, Faculty of Engineering, Universiti Teknologi Malaysia (UTM), Skudai, MalaysiaData collection and storage in a large size is done on a routine basis in any company or organization. To this end, wireless network infrastructure and cloud computing are two widely-used tools. With the use of such services, less time is needed to attain the required output, and also managing the jobs will be simpler for users. General services employ a unique identifier for the aim of storing data in a digital database. However, it may be associated with some limitations and challenges. There is a link between the unique identifier and the data holder, e.g., name, address, Identity card number, etc. Attackers can manipulate a unique identifier for stealing the whole data. To get the data needed, attackers may even eavesdrop or guess. It results in lack of data privacy protection. As a result, it is necessary to take into consideration the data privacy issues in any data digital data storage. With the use of current services, there is a high possibility of exposure and leak of data/information to an unauthorized party during their transfer process. In addition, attacks may take place against services; for instance spoofing attacks, forgery attacks, etc. in the course of information transaction. To address such risks, this paper suggests the use of a biometric authentication method by means of a palm vein during the authentication process. Furthermore, a pseudonym creation technique is adopted to make the database record anonymous, which can make sure the data is properly protected. This way, any unauthorized party cannot gain access to data/information. The proposed system can resolve the information leaked, the user true identity is never revealed to others.https://ieeexplore.ieee.org/document/9018049/Authenticationpalm veinpseudonymanonimousunlinkabilitydata preserving |
spellingShingle | Shukor Abd Razak Nur Hafizah Mohd Nazari Arafat Al-Dhaqm Data Anonymization Using Pseudonym System to Preserve Data Privacy IEEE Access Authentication palm vein pseudonym anonimous unlinkability data preserving |
title | Data Anonymization Using Pseudonym System to Preserve Data Privacy |
title_full | Data Anonymization Using Pseudonym System to Preserve Data Privacy |
title_fullStr | Data Anonymization Using Pseudonym System to Preserve Data Privacy |
title_full_unstemmed | Data Anonymization Using Pseudonym System to Preserve Data Privacy |
title_short | Data Anonymization Using Pseudonym System to Preserve Data Privacy |
title_sort | data anonymization using pseudonym system to preserve data privacy |
topic | Authentication palm vein pseudonym anonimous unlinkability data preserving |
url | https://ieeexplore.ieee.org/document/9018049/ |
work_keys_str_mv | AT shukorabdrazak dataanonymizationusingpseudonymsystemtopreservedataprivacy AT nurhafizahmohdnazari dataanonymizationusingpseudonymsystemtopreservedataprivacy AT arafataldhaqm dataanonymizationusingpseudonymsystemtopreservedataprivacy |