Evaluating Re-Identification Risks of Data Protected by Additive Data Perturbation
نویسندگان
چکیده
Commercial organizations and government agencies that gather, store, share and disseminate data are facing increasing concerns over individual privacy and confidentiality. Confidential data is often masked in the database or prior to release to a third party, through methods such as data perturbation. In this study, reidentification risks of three major additive data perturbation techniques were compared using two different record linkage techniques. The results suggest that re-identification risk of Kim’s multivariate noise addition method is similar to that of simple noise addition method. The general additive perturbation method (GADP) has the lowest re-identification risk and therefore provides the highest level of protection. The study also suggests that Fuller’s method of assessing re-identification risk may be better suited than the probabilistic record-linkage method of Winkler, for numeric data. The results of this study should be help organizations and government agencies choose an appropriate additive perturbation technique. Evaluating Re-Identification Risks of Data Protected by Additive Data Perturbation
منابع مشابه
Reducing patient re-identification risk for laboratory results within research datasets
OBJECTIVE To try to lower patient re-identification risks for biomedical research databases containing laboratory test results while also minimizing changes in clinical data interpretation. MATERIALS AND METHODS In our threat model, an attacker obtains 5-7 laboratory results from one patient and uses them as a search key to discover the corresponding record in a de-identified biomedical resea...
متن کاملIdentification of Moral Hazard in the Banking System of Iran
The presence of moral hazard in the banking sector can have worrying results. This paper examines the role of government guarantees to banks in generating moral hazard in Iran. We test for moral hazard among bank creditors by determining whether protected banks received more funds from creditors than non-protected banks. Empirically, to determine the existence of moral hazard among bank manag...
متن کاملEvaluating re-identification risks with respect to the HIPAA privacy rule
OBJECTIVE Many healthcare organizations follow data protection policies that specify which patient identifiers must be suppressed to share "de-identified" records. Such policies, however, are often applied without knowledge of the risk of "re-identification". The goals of this work are: (1) to estimate re-identification risk for data sharing policies of the Health Insurance Portability and Acco...
متن کاملAnalysis and evaluation of human resources risks in the higher education system: Lorestan Islamic Azad University case
Abstract The lack of precise definition and proper analysis of HR risks not only impedes human resource management, but also undermines the organization's performance. By identifying and confronting human resources risks, the organization can mutually bring individual and organizational excellence. Therefore, the present study was conducted with the aim of identifying and evaluating human reso...
متن کاملA Generalization of Initial Conditions in Benchmarking of Economic Time-Series by Additive and Proportional Denton Methods
The paper presents unified analytical solution for combining high-frequency and low-frequency economic time-series by additive and proportional Denton methods with parametrical dependence on the initial values of variable and indicator in evident form. This solution spans Denton’s original and Cholette’s advanced benchmarking initial conditions as the subcases. Computational complexity of the o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Database Manag.
دوره 25 شماره
صفحات -
تاریخ انتشار 2014