A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes

The identity of patients must be protected when patient data are shared. The two most commonly used models to protect identity of patients are L-diversity and K-anonymity. However, existing work mainly considers data sets with a single sensitive attribute, while patient data often contain multiple sensitive attributes (e.g., diagnosis and treatment). This article shows that although the K-anony...

متن کامل

Decomposition: Privacy Preservation for Multiple Sensitive Attributes

Aiming at ensuring privacy preservation in personal data publishing, the topic of anonymization has been intensively studied in recent years. However, existing anonymization techniques all assume each tuple in the microdata table contains one single sensitive attribute (the SSA case), while none paid attention to the case of multiple sensitive attributes in a tuple (the MSA case). In this paper...

متن کامل

SLOMS: A Privacy Preserving Data Publishing Method for Multiple Sensitive Attributes Microdata

Multi-dimension bucketization is a typical method to anonymize multiple sensitive attributes. However, the method leads to low data utility when microdata have more sensitive attributes. In addition, the methods do not generalize quasi-identifiers, which make the anonymous data vulnerable to suffer from linked attacks. To address the problems, the paper proposes a SLOMS method. The method verti...

متن کامل

Anatomisation with slicing: a new privacy preservation approach for multiple sensitive attributes

An enormous quantity of personal health information is available in recent decades and tampering of any part of this information imposes a great risk to the health care field. Existing anonymization methods are only apt for single sensitive and low dimensional data to keep up with privacy specifically like generalization and bucketization. In this paper, an anonymization technique is proposed t...

متن کامل

Anonymization Technique for Privacy Protection Sharing of Sensitive Data Stream

The two mechanism have been proposed for data stream namely Access control mechanisms and Privacy Protection Mechanisms (PPM). The access control for a data stream allows restrict to authorized users using role based access to tuples satisfying an sliding-window query. It prevents the unauthorized access of user data. The PPM provides better privacy for the tricky information which is to be sha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Information Security and Privacy

سال: 2008

ISSN: 1930-1650,1930-1669

DOI: 10.4018/jisp.2008070103