When Poor-Quality Data Meet Anonymization Models: Threats and Countermeasures

IF 3.6 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS IEEE Access Pub Date : 2025-03-18 DOI:10.1109/ACCESS.2025.3552412
Abdul Majeed;Seong Oun Hwang
{"title":"When Poor-Quality Data Meet Anonymization Models: Threats and Countermeasures","authors":"Abdul Majeed;Seong Oun Hwang","doi":"10.1109/ACCESS.2025.3552412","DOIUrl":null,"url":null,"abstract":"In the modern era, the avenues for data generation have significantly evolved, and therefore, large-scale and diverse types of data are being collected for downstream tasks. However, some automated tools can curate data with many vulnerabilities (e.g., missing values, wrong values, outliers, skewed distributions, missing labels, etc.) which can hamper its usage in underlying applications. For example, skewed data may lead to imbalanced learning when used in machine learning (ML) classifiers. Similarly, low-quality data can inadvertently propagate bias in ML decisions, leading to conflict or disputes. Data quality enhancement with the least possible cost has become a hot research area. In this paper, we demonstrate how poor-quality data can pose serious threats to anonymization models, consequently undermining privacy and utility requirements. We propose various countermeasures to inspect and improve data quality before anonymization so as to not lose guarantees of both privacy and utility. Specifically, we pinpoint eleven different threats from a small segment of data to underscore the relevance and urgency of such issues in the anonymization domain. We devise six practical countermeasures to provide resilience against these potential threats to enhance the performance and resilience of anonymization models. We aim to uncover the ways poor-quality datasets are handled by anonymization models, and what threats to both privacy and utility exist. Our work can guide the privacy and database community to improve the mainstream technologies used for privacy preservation to effectively resolve present-day privacy threats. To the best of the authors’ knowledge, this is the first work that highlights the threats posed by the poor quality data to the popular anonymization models and suggests countermeasures to overcome them along with reasonable experiments on two datasets.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"49457-49475"},"PeriodicalIF":3.6000,"publicationDate":"2025-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10930894","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Access","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10930894/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

In the modern era, the avenues for data generation have significantly evolved, and therefore, large-scale and diverse types of data are being collected for downstream tasks. However, some automated tools can curate data with many vulnerabilities (e.g., missing values, wrong values, outliers, skewed distributions, missing labels, etc.) which can hamper its usage in underlying applications. For example, skewed data may lead to imbalanced learning when used in machine learning (ML) classifiers. Similarly, low-quality data can inadvertently propagate bias in ML decisions, leading to conflict or disputes. Data quality enhancement with the least possible cost has become a hot research area. In this paper, we demonstrate how poor-quality data can pose serious threats to anonymization models, consequently undermining privacy and utility requirements. We propose various countermeasures to inspect and improve data quality before anonymization so as to not lose guarantees of both privacy and utility. Specifically, we pinpoint eleven different threats from a small segment of data to underscore the relevance and urgency of such issues in the anonymization domain. We devise six practical countermeasures to provide resilience against these potential threats to enhance the performance and resilience of anonymization models. We aim to uncover the ways poor-quality datasets are handled by anonymization models, and what threats to both privacy and utility exist. Our work can guide the privacy and database community to improve the mainstream technologies used for privacy preservation to effectively resolve present-day privacy threats. To the best of the authors’ knowledge, this is the first work that highlights the threats posed by the poor quality data to the popular anonymization models and suggests countermeasures to overcome them along with reasonable experiments on two datasets.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
当低质量数据遇到匿名化模型:威胁与对策
在现代社会,数据生成的途径发生了显著的变化,因此,人们正在收集大规模和各种类型的数据,用于下游任务。然而,一些自动化工具所收集的数据可能存在许多漏洞(如缺失值、错误值、离群值、偏斜分布、标签缺失等),这可能会妨碍其在底层应用中的使用。例如,在机器学习(ML)分类器中使用偏斜数据时,可能会导致学习不平衡。同样,低质量数据也会在不经意间传播机器学习决策中的偏见,从而导致冲突或纠纷。以尽可能少的成本提高数据质量已成为一个热门研究领域。在本文中,我们展示了低质量数据如何对匿名化模型构成严重威胁,从而破坏隐私和实用性要求。我们提出了在匿名化之前检查和提高数据质量的各种对策,以避免失去隐私和实用性的保证。具体来说,我们从一小部分数据中指出了 11 种不同的威胁,以强调此类问题在匿名化领域的相关性和紧迫性。我们设计了六种切实可行的对策来抵御这些潜在威胁,从而提高匿名化模型的性能和复原力。我们的目标是揭示匿名化模型处理劣质数据集的方式,以及存在哪些对隐私和实用性的威胁。我们的工作可以指导隐私和数据库界改进用于隐私保护的主流技术,以有效解决当今的隐私威胁。据作者所知,这是第一部强调劣质数据对流行的匿名化模型造成威胁的著作,并提出了克服这些威胁的对策,同时还在两个数据集上进行了合理的实验。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Access
IEEE Access COMPUTER SCIENCE, INFORMATION SYSTEMSENGIN-ENGINEERING, ELECTRICAL & ELECTRONIC
CiteScore
9.80
自引率
7.70%
发文量
6673
审稿时长
6 weeks
期刊介绍: IEEE Access® is a multidisciplinary, open access (OA), applications-oriented, all-electronic archival journal that continuously presents the results of original research or development across all of IEEE''s fields of interest. IEEE Access will publish articles that are of high interest to readers, original, technically correct, and clearly presented. Supported by author publication charges (APC), its hallmarks are a rapid peer review and publication process with open access to all readers. Unlike IEEE''s traditional Transactions or Journals, reviews are "binary", in that reviewers will either Accept or Reject an article in the form it is submitted in order to achieve rapid turnaround. Especially encouraged are submissions on: Multidisciplinary topics, or applications-oriented articles and negative results that do not fit within the scope of IEEE''s traditional journals. Practical articles discussing new experiments or measurement techniques, interesting solutions to engineering. Development of new or improved fabrication or manufacturing techniques. Reviews or survey articles of new or evolving fields oriented to assist others in understanding the new area.
期刊最新文献
Low-Cost FPGA-Enhanced CNN Accelerator for Real-Time YOLO Object Detection and Classification A Web-Ready and 5G-Ready Volumetric Video Streaming Platform: A Platform Prototype and Empirical Study Multi-Expert Trajectory Prediction for Highway Weaving Sections Using Conflict Potential Energy and GAN A Hybrid Fractional Chebyshev–Legendre Spectral Collocation Method for Hamilton–Jacobi–Bellman Equations Application-Specific Instruction-Set Processors (ASIPs) for Deep Neural Networks: A Survey
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1