Privacy preserving publication of relational and transaction data: Survey on the anonymization of patient data
@article{Puri2019PrivacyPP, title={Privacy preserving publication of relational and transaction data: Survey on the anonymization of patient data}, author={Vartika Puri and Shelly Sachdeva and Parmeet Kaur}, journal={Comput. Sci. Rev.}, year={2019}, volume={32}, pages={45-61} }
10 Citations
Effective Removal of Privacy Breaches in Disassociated Transactional Datasets
- Computer Science
- 2020
This paper addresses the problem of privacy-preserving publication of transactional data using two enhanced versions of ‘disassociation’ technique and proposes two algorithms for improvement in disassociation using suppression and addition (IDSA) and generalizing cover item (IDGC) to eliminate the cover problem of disassociated data.
A survey of privacy-preserving mechanisms for heterogeneous data types
- Computer ScienceComput. Sci. Rev.
- 2021
Heterogeneous data release for cluster analysis with differential privacy
- Computer ScienceKnowl. Based Syst.
- 2020
Transactional Data Anonymization for Privacy and Information Preservation via Disassociation and Local Suppression
- Computer ScienceSymmetry
- 2022
A novel vertical partition strategy that can retain more association between items in the dataset, which improves the utility of published data.
Recent Developments in Privacy-preserving Mining of Clinical Data
- Computer ScienceTrans. Data Sci.
- 2021
Looking at dominant techniques and recent innovations to them, the applicability of these methods to the privacy-preserving analysis of clinical data is examined and promising directions for future research in this area are discussed.
DI-Mondrian: Distributed improved Mondrian for satisfaction of the L-diversity privacy model using Apache Spark
- Computer ScienceInf. Sci.
- 2021
Impact of the Validity Analysis Model and Multirelational Data Clustering Based on the Trust Probability
- Computer ScienceSecurity and Communication Networks
- 2022
Investigations show that the validity analysis model of multirelational data clustering based on credible probability is more effective in practice and satisfies the research goals entirely.
Internet of Things and Communication Technology Synergy for Remote Services in Healthcare
- Computer Science
- 2020
This chapter presents several aspects regarding IoT (Internet of Things) and communication technology synergies for remote services in healthcare for patients with higher risks that justify remote monitoring, taking into account the risks for data security that appears in the case of these applications.
Bridging unlinkability and data utility: Privacy preserving data publication schemes for healthcare informatics
- Computer ScienceComput. Commun.
- 2022
(
k
,
m
,
t
)‐anonymity: Enhanced privacy for transactional data
- Computer ScienceConcurrency and Computation: Practice and Experience
- 2022
References
SHOWING 1-10 OF 61 REFERENCES
Efficient and flexible anonymization of transaction data
- Computer ScienceKnowledge and Information Systems
- 2012
A rule-based privacy model is introduced that allows data publishers to express fine-grained protection requirements for both identity and sensitive information disclosure, and two anonymization algorithms are developed that significantly outperform the state-of-the-art in terms of retaining data utility, while achieving good protection and scalability.
Anonymizing Transaction Data to Eliminate Sensitive Inferences
- Computer ScienceDEXA
- 2010
This paper model potential inferences of individuals' identities and their associated sensitive transaction information as a set of implications, and designs an effective algorithm that is capable of anonymizing data to prevent these sensitive inferences with minimal data utility loss.
Privacy-preserving anonymization of set-valued data
- Computer ScienceProc. VLDB Endow.
- 2008
A new version of the k-anonymity guarantee is defined, the km-Anonymity, to limit the effects of the data dimensionality and two efficient algorithms to transform the database are proposed.
Privacy-preserving heterogeneous health data sharing
- Computer ScienceJ. Am. Medical Informatics Assoc.
- 2013
The proposed algorithm allows the disclosure of health data containing both relational and set-valued data in a differentially private manner, and can retain essential information for discriminative analysis.
Anonymous Publication of Sensitive Transactional Data
- Computer ScienceIEEE Transactions on Knowledge and Data Engineering
- 2011
This work proposes two categories of novel anonymization methods based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH) and two data transformations that capture the correlation in the underlying data: reduction to a band matrix and Gray encoding-based sorting.
Anonymizing Data with Relational and Transaction Attributes
- Computer ScienceECML/PKDD
- 2013
This work develops two frameworks to offer privacy, with bounded information loss in one attribute type and minimalInformation loss in the other, and proposes privacy algorithms that effectively preserve data utility, as verified by extensive experiments.
Anonymizing datasets with demographics and diagnosis codes in the presence of utility constraints
- Computer ScienceJ. Biomed. Informatics
- 2017
On k-Anonymity and the Curse of Dimensionality
- Computer ScienceVLDB
- 2005
It is shown that the curse of high dimensionality also applies to the problem of privacy preserving data mining, and when a data set contains a large number of attributes which are open to inference attacks, it becomes difficult to anonymize the data without an unacceptably high amount of information loss.
Local and global recoding methods for anonymizing set-valued data
- Computer ScienceThe VLDB Journal
- 2010
A new version of the k-anonymity guarantee is defined, the km-Anonymity, to limit the effects of the data dimensionality, and an algorithm that finds the optimal solution is developed, however, at a high cost that makes it inapplicable for large, realistic problems.
COAT: COnstraint-based anonymization of transactions
- Computer ScienceKnowledge and Information Systems
- 2010
COnstraint-based Anonymization of Transactions is proposed, an algorithm that anonymizes transactions using a flexible anonymization scheme to meet the specified constraints and is shown to be effective in preserving both privacy and utility in a real-world scenario that requires disseminating patients’ information.