{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T21:50:42Z","timestamp":1774389042023,"version":"3.50.1"},"reference-count":46,"publisher":"MDPI AG","issue":"14","license":[{"start":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T00:00:00Z","timestamp":1626739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the advent of smart health, smart cities, and smart grids, the amount of data has grown swiftly. When the collected data is published for valuable information mining, privacy turns out to be a key matter due to the presence of sensitive information. Such sensitive information comprises either a single sensitive attribute (an individual has only one sensitive attribute) or multiple sensitive attributes (an individual can have multiple sensitive attributes). Anonymization of data sets with multiple sensitive attributes presents some unique problems due to the correlation among these attributes. Artificial intelligence techniques can help the data publishers in anonymizing such data. To the best of our knowledge, no fuzzy logic-based privacy model has been proposed until now for privacy preservation of multiple sensitive attributes. In this paper, we propose a novel privacy preserving model F-Classify that uses fuzzy logic for the classification of quasi-identifier and multiple sensitive attributes. Classes are defined based on defined rules, and every tuple is assigned to its class according to attribute value. The working of the F-Classify Algorithm is also verified using HLPN. A wide range of experiments on healthcare data sets acknowledged that F-Classify surpasses its counterparts in terms of privacy and utility. Being based on artificial intelligence, it has a lower execution time than other approaches.<\/jats:p>","DOI":"10.3390\/s21144933","type":"journal-article","created":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T11:26:10Z","timestamp":1626780370000},"page":"4933","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes"],"prefix":"10.3390","volume":"21","author":[{"given":"Hasina","family":"Attaullah","sequence":"first","affiliation":[{"name":"Department of Computer Sciences, COMSATS University, Islamabad 45550, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5083-0019","authenticated-orcid":false,"given":"Adeel","family":"Anjum","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, COMSATS University, Islamabad 45550, Pakistan"},{"name":"Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen 518055, China"}]},{"given":"Tehsin","family":"Kanwal","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, COMSATS University, Islamabad 45550, Pakistan"}]},{"given":"Saif Ur Rehman","family":"Malik","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, COMSATS University, Islamabad 45550, Pakistan"},{"name":"Cybernetica AS, 12618 Tallinn, Estonia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4430-5928","authenticated-orcid":false,"given":"Alia","family":"Asheralieva","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen 518055, China"}]},{"given":"Hassan","family":"Malik","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Edge Hill University, Lancashire L39 4QP, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7497-9336","authenticated-orcid":false,"given":"Ahmed","family":"Zoha","sequence":"additional","affiliation":[{"name":"James Watt School of Engineering, University of Glasgow, Glasgow G12 8QQ, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4447-8335","authenticated-orcid":false,"given":"Kamran","family":"Arshad","sequence":"additional","affiliation":[{"name":"College of Engineering and IT, Ajman University, Ajman 20550, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4743-9136","authenticated-orcid":false,"given":"Muhammad Ali","family":"Imran","sequence":"additional","affiliation":[{"name":"James Watt School of Engineering, University of Glasgow, Glasgow G12 8QQ, UK"},{"name":"Artificial Intelligence Research Centre (AIRC), Ajman University, Ajman 20550, United Arab Emirates"}]}],"member":"1968","published-online":{"date-parts":[[2021,7,20]]},"reference":[{"key":"ref_1","first-page":"5","article-title":"k-anonymity: A model for protecting privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"ref_2","first-page":"1","article-title":"L-diversity: Privacy beyond k-anonymity","volume":"1","author":"Machanavajjhala","year":"2007","journal-title":"ACM Trans. Knowl. Discov. Data TKDD"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., and Venkatasubramanian, S. (2007, January 15\u201320). t-closeness: Privacy beyond k-anonymity and l-diversity. Proceedings of the 2007 IEEE 23rd International Conference on Data Engineering, Istanbul, Turkey.","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., and Incognito, R.R. (2005, January 14\u201316). Efficient full-domain k-anonymity. Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, Baltimore, MD, USA.","DOI":"10.1145\/1066157.1066164"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., and Fu, A.W.C. (2006, January 20\u201323). Utility-based anonymization using local re-coding. Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, USA.","DOI":"10.1145\/1150402.1150504"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1142\/S021848850200165X","article-title":"Achieving k-anonymity privacy protection using generalization and suppression","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Susan, V.S., and Christopher, T. (2016). Anatomization with Slicing: A New Privacy Preservation Technique for Multiple Sensitive Attributes, Springer. 1\u201321: SpringerPlus 5.1.","DOI":"10.1186\/s40064-016-2490-0"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"5127","DOI":"10.1007\/s11227-018-2390-x","article-title":"An efficient approach for publishing microdata for multiple sensitive attributes","volume":"74","author":"Anjum","year":"2018","journal-title":"J. Supercomput."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"3096","DOI":"10.4304\/jsw.8.12.3096-3104","article-title":"SLOMS: A Privacy-Preserving Data Publishing Method for Multiple Sensitive Attributes Microdata","volume":"8","author":"Han","year":"2013","journal-title":"J. Softw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1073","DOI":"10.1109\/TKDE.2009.65","article-title":"Angel: Enhancing the utility of generalization for privacy preserving publication","volume":"21","author":"Tao","year":"2009","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Klir, G., and Yuan, B. (1995). Fuzzy Sets, and Fuzzy Logic, Prentice Hall.","DOI":"10.1109\/45.468220"},{"key":"ref_12","first-page":"115","article-title":"Fuzzy based approach for privacy preserving publication of data","volume":"8","author":"Kumari","year":"2008","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"ref_13","first-page":"27","article-title":"Fuzzy based clustering algorithm for privacy preserving data mining","volume":"7","author":"Kumar","year":"2011","journal-title":"Int. J. Bus. Inf. Syst."},{"key":"ref_14","unstructured":"(1992). Mathworks, M.U.T."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Iyengar, V.S. (2002, January 23\u201326). Transforming data to satisfy privacy constraints. Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, AB, Canada.","DOI":"10.1145\/775047.775089"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1016\/j.jcss.2012.11.008","article-title":"An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud","volume":"79","author":"Zhang","year":"2013","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., and Ramakrishnan, R. (2006, January 3\u20137). Mondrian multidimensional k-anonymity. Proceedings of the Data Engineering. Proceedings of the 22nd International Conference on Data Engineering (ICDE\u201906), Atlanta, GA, USA.","DOI":"10.1109\/ICDE.2006.101"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Koudas, N., Srivastava, D., and Yu, T. (2007, January 15\u201320). Aggregate query answering on anonymized tables. Proceedings of the IEEE 23rd International Conference In Data Engineering, Istanbul, Turkey.","DOI":"10.1109\/ICDE.2007.367857"},{"key":"ref_19","unstructured":"Hore, B., Mehrotra, S., and Tsudik, G.A. (September, January 31). privacy-preserving index for range queries. Proceedings of the Thirtieth International Conference on Very Large Databases, VLDB Endowment, Toronto, ON, Canada."},{"key":"ref_20","unstructured":"Rcw, W., Li, J., Awc, F., and Wang, K. (2006, January 20\u201323). (a, k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing. Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, USA."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Martin, D.J., Kifer, D., Machanavajjhala, A., Gehrke, J., and Halpern, J.Y. (2007, January 15\u201320). Worst-case background knowledge for privacy-preserving data publishing. Proceedings of the Data Engineering IEEE 23rd International Conference on Data Engineering, Istanbul, Turkey.","DOI":"10.1109\/ICDE.2007.367858"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/TKDE.2010.236","article-title":"Slicing: A new approach for privacy preserving data publishing","volume":"24","author":"Li","year":"2012","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Kiruthika, S., and Raseen, M.M. (2013, January 3). Enhanced slicing models for preserving privacy in data publication. Proceedings of the 2013 International Conference on Current Trends in Engineering and Technology (ICCTET), Coimbatore, India.","DOI":"10.1109\/ICCTET.2013.6675998"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1109\/TST.2015.7128936","article-title":"Privacy-preserving data publishing for multiple numerical sensitive attributes","volume":"20","author":"Liu","year":"2015","journal-title":"Tsinghua Sci. Technol."},{"key":"ref_25","unstructured":"Min, G.U.O., Zhen, L.I.U., and Huai-Bin, W.A.N.G. (2016). Personalized Privacy Preserving Approaches for Multiple Sensitive Attributes in Data Publishing, DEStech Publications. DEStech Transactions on Engineering and Technology Research Same-Ist."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"464731","DOI":"10.1155\/2015\/464731","article-title":"Privacy protection method for multiple sensitive attributes based on strong rule","volume":"2015","author":"Yi","year":"2015","journal-title":"Math. Probl. Eng."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Li, Z., and Ye, X. (2007, January 12\u201315). Privacy protection on multiple sensitive attributes. Proceedings of the International Conference on Information and Communications Security, Zhengzhou, China.","DOI":"10.1007\/978-3-540-77048-0_11"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Liu, J., Luo, J., and Huang, J.Z. (2011, January 11). Rating: Privacy preservation for multiple attributes with different sensitivity requirements. Proceedings of the Data Mining Workshops (ICDMW) 2011 IEEE 11th International Conference on Data Mining Workshops, Vancouver, BC, Canada.","DOI":"10.1109\/ICDMW.2011.144"},{"key":"ref_29","unstructured":"Yang, E.A. (2009). Decomposition: Privacy preservation for multiple sensitive attributes. International Conference on Database Systems for Advanced Applicationsg, Springer."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Das, D., and Bhattacharyya, D.K. (2012). Decomposition+: Improving l-Diversity for Multiple Sensitive Attributes. International Conference on Computer Science and Information Technology, Springer.","DOI":"10.1007\/978-3-642-27308-7_44"},{"key":"ref_31","unstructured":"Luo, F., Han, J., Lu, J., and Peng, H. (2013, January 23\u201325). ANGELMS: A privacy-preserving data publishing framework for microdata with multiple sensitive attributes. Proceedings of the International Conference on Information Science and Technology (ICIST), Yangzhou, China."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Zhu, H., Tian, S., Xie, M., and Yang, M. (2014, January 4\u20137). Preserving privacy for sensitive values of individuals in data publishing based on a new additive noise technique. Proceedings of the 23rd International Conference on Computer Communication and Networks (ICCCN), Shanghai, China.","DOI":"10.1109\/ICCCN.2014.6911855"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"8416823","DOI":"10.1155\/2020\/8416823","article-title":"Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity","volume":"2020","author":"Khan","year":"2020","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_34","first-page":"18","article-title":"A novel dynamic KCi-slice publishing prototype for retaining privacy and utility of multiple sensitive attributes","volume":"11","author":"Raju","year":"2019","journal-title":"Int. J. Inf. Technol. Comput. Sci."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Xiao, Y., and Li, H. (2020). Privacy Preserving Data Publishing for Multiple Sensitive Attributes Based on Security Level. Information, 11.","DOI":"10.3390\/info11030166"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.ins.2019.03.004","article-title":"Privacy-preserving model and generalization correlation attacks for 1:M data with multiple sensitive attributes","volume":"488","author":"Kanwal","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"102224","DOI":"10.1016\/j.cose.2021.102224","article-title":"A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes","volume":"105","author":"Kanwal","year":"2021","journal-title":"Comput. Secur."},{"key":"ref_38","first-page":"4261","article-title":"Implementation of slicing for multiple column multiple attributes: Privacy preserving data publishing","volume":"3","author":"Dhumal","year":"2015","journal-title":"Int. J. Recent Innov. Trends Comput. Commun."},{"key":"ref_39","unstructured":"Xiao, X., and Tao, Y. (2006, January 12\u201315). Anatomy: Simple and effective privacy preservation. Proceedings of the 32nd International Conference on Very Large Data Bases, VLDB Endowment, Seoul, Korea."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Sowmyarani, C.N., and Srinivasan, G.N. (2015, January 8\u201310). A robust privacy preserving model for data publishing. Proceedings of the International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India.","DOI":"10.1109\/ICCCI.2015.7218095"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Majeed, A., Ullah, F., and Lee, S. (2017). Vulnerability-and diversity-aware anonymization of personally identifiable information for improving user privacy and utility of publishing data. Sensors, 17.","DOI":"10.3390\/s17051059"},{"key":"ref_42","unstructured":"(1996). Fuzzy Set Theory and Its Applications, Springer."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"642","DOI":"10.1109\/TCC.2015.2446458","article-title":"DaSCE: Data security for cloud environment with semi-trusted third party","volume":"5","author":"Ali","year":"2015","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1706","DOI":"10.1109\/TC.2015.2458862","article-title":"Designing and modeling of covert channels in operating systems","volume":"65","author":"Lin","year":"2016","journal-title":"IEEE Trans. Comput."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Xiao, X., and Tao, Y. (2008, January 9\u201312). Dynamic anonymization: Accurate statistical analysis with privacy preservation. Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, Vancouver, BC, Canada.","DOI":"10.1145\/1376616.1376630"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Wong, R.C.W., Liu, Y., Yin, J., Huang, Z., Fu, A.W.C., and Pei, J. (2007). (\u03b1, k)-anonymity Based Privacy Preservation by Lossy Join. Advances in Data and Web Management, Springer.","DOI":"10.1007\/978-3-540-72524-4_75"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/14\/4933\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:32:17Z","timestamp":1760164337000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/14\/4933"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,20]]},"references-count":46,"journal-issue":{"issue":"14","published-online":{"date-parts":[[2021,7]]}},"alternative-id":["s21144933"],"URL":"https:\/\/doi.org\/10.3390\/s21144933","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,20]]}}}