search query: @supervisor Taleb, Tarik / total: 6
reference: 5 / 6
« previous | next »
Author:Lal, Shankar
Title:Privacy Preserving Log File Processing in Mobile Network Environment
Publication type:Master's thesis
Publication year:2015
Pages:50 s. + liitt. 14      Language:   eng
Department/School:Sähkötekniikan korkeakoulu
Main subject:Networking Technology   (S3029)
Supervisor:Taleb, Tarik
Instructor:Oliver, Ian
Electronic version URL: http://urn.fi/URN:NBN:fi:aalto-201511205195
Location:P1 Ark Aalto  3184   | Archive
Keywords:data privacy
differential privacy
l-diversity
k-anonymity
Abstract (eng):Network operators collect huge amount of user data flowing on their networks.
The purpose of one specific type of data collection is to understand the network usage pattern and network monitoring for anomaly detection etc.

Network operators share this data confidentially with equipment manufactures and vendors to make statistical analysis over the data to find the unusual behavior e.g.
Malware traffic etc.
Since this data contains user identifiable information, there is a need to anonymize such data sets to protect user privacy and to comply with privacy laws.
Thus, protecting user privacy is top priority for the network operator and they are also legally obliged to do so.

The analysis presented in this thesis work is based on data sets, obtained from network traces (LTE, IP).
For some usage, these data sets are required to be anonymized.
There are various classes of algorithms to achieve this e.g.
Encryption, Hashing, Field suppression, k-anonymity, l-diversity, t-closeness, Differential Privacy etc.
Since none of these algorithms are individually perfect for anonymizing data completely, these should be used in conjunction with each other to get the better level of anonymization without compromising the usability and semantic integrity of the data.

Differential privacy and l-diversity algorithms are implemented in this thesis for anonymization of network traces along with process pipeline for them.
Comparison of statistical properties of both original and perturbed data is also presented to check the efficiency of anonymization techniques.
ED:2015-11-29
INSSI record number: 52535
+ add basket
« previous | next »
INSSI