Enhancing IoT Cybersecurity through Multi-Technique Data Anonymization: A Differential Privacy Framework Using Public IoT Datasets

Authors

  • Muhammad Imran Ghafoor Department of Engineering and Technology Superior University Lahore, Pakistan.
  • Muhammad Sohaib Roomi Department of Engineering and Technology Superior University Lahore, Pakistan.
  • Muhammad Sarfraz Khan Computer Science Specialist Public Education Department, NM, USA
  • Mehmood Baryalai Assistant Professor, with BUITEMS FICT, BUITEMS, Airport Road, Quetta, Pakistan
  • Shumaila Hussain Computer Science Department Sardar Bahadur Khan Women's University Quetta, Pakistan.
  • Iqra Tabassum Dept. of Computer Science Balochistan University of Information Technology, Engineering, and Management Sciences (BUITEMS) Quetta, Pakistan.

DOI:

https://doi.org/10.62019/tdjz6f05

Keywords:

IoT, Cybersecurity, Multi-Technique, Differential Privacy

Abstract

The proliferation of Internet of Things (IoT) deployments in critical domains such as smart homes, healthcare, and industrial control has significantly expanded the attack surface of modern networks. While the security research community increasingly relies on public IoT network traces to design intrusion detection systems (IDS), the release and sharing of such datasets raise serious privacy concerns for end-users, operators, and infrastructure providers. Building on recent work on scalable anonymization and privacy-preserving big data analytics, this paper proposes a unified data anonymization framework that combines ɛ-differential privacy (DP) with classical k-anonymity and l-diversity to protect sensitive information while preserving the utility of IoT cybersecurity datasets. We instantiate the framework conceptually on three widely used public benchmarks Bot-IoT, TON_IoT, and IoT-23 and design a reproducible pipeline to study the privacy-utility trade-off under different privacy budgets. Informed by recent advances in IoT security, big data analytics, and differential privacy for multimedia and sensing, we focus on moderate privacy budgets (e.g., ɛ in the range 0.5-1.0) that are known to offer a favorable balance between privacy protection and model utility. The paper contributes (i) a single-column description of the anonymization and evaluation pipeline, (ii) a multi-technique anonymization framework tailored to public IoT datasets, and (iii) design guidelines for dataset publishers and security practitioners grounded in existing literature on scalable anonymization.

Downloads

Published

2026-03-25

How to Cite

Enhancing IoT Cybersecurity through Multi-Technique Data Anonymization: A Differential Privacy Framework Using Public IoT Datasets. (2026). The Asian Bulletin of Big Data Management , 6(1), 281-292. https://doi.org/10.62019/tdjz6f05

Similar Articles

1-10 of 117

You may also start an advanced similarity search for this article.