Evaluating Re-Identification Risks of Data Protected by Additive Data Perturbation

نویسندگان

  • Han Li
  • Krishnamurty Muralidhar
  • Rathindra Sarathy
  • Xin Luo
چکیده

Commercial organizations and government agencies that gather, store, share and disseminate data are facing increasing concerns over individual privacy and confidentiality. Confidential data is often masked in the database or prior to release to a third party, through methods such as data perturbation. In this study, reidentification risks of three major additive data perturbation techniques were compared using two different record linkage techniques. The results suggest that re-identification risk of Kim’s multivariate noise addition method is similar to that of simple noise addition method. The general additive perturbation method (GADP) has the lowest re-identification risk and therefore provides the highest level of protection. The study also suggests that Fuller’s method of assessing re-identification risk may be better suited than the probabilistic record-linkage method of Winkler, for numeric data. The results of this study should be help organizations and government agencies choose an appropriate additive perturbation technique. Evaluating Re-Identification Risks of Data Protected by Additive Data Perturbation

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reducing patient re-identification risk for laboratory results within research datasets

OBJECTIVE To try to lower patient re-identification risks for biomedical research databases containing laboratory test results while also minimizing changes in clinical data interpretation. MATERIALS AND METHODS In our threat model, an attacker obtains 5-7 laboratory results from one patient and uses them as a search key to discover the corresponding record in a de-identified biomedical resea...

متن کامل

Identification of Moral Hazard in the Banking System of Iran

The presence of moral hazard in the banking sector can have worrying results. This paper examines the role of government guarantees to banks in generating moral hazard in Iran. We test for moral hazard among bank creditors by determining whether protected banks received more funds from creditors than non-protected banks. Empirically, to determine the existence of moral hazard among bank manag...

متن کامل

Evaluating re-identification risks with respect to the HIPAA privacy rule

OBJECTIVE Many healthcare organizations follow data protection policies that specify which patient identifiers must be suppressed to share "de-identified" records. Such policies, however, are often applied without knowledge of the risk of "re-identification". The goals of this work are: (1) to estimate re-identification risk for data sharing policies of the Health Insurance Portability and Acco...

متن کامل

Analysis and evaluation of human resources risks in the higher education system: Lorestan Islamic Azad University case

Abstract The lack of precise definition and proper analysis of HR risks not only impedes human resource management, but also undermines the organization's performance. By identifying and confronting human resources risks, the organization can mutually bring individual and organizational excellence. Therefore, the present study was conducted with the aim of identifying and evaluating human reso...

متن کامل

A Generalization of Initial Conditions in Benchmarking of Economic Time-Series by Additive and Proportional Denton Methods

The paper presents unified analytical solution for combining high-frequency and low-frequency economic time-series by additive and proportional Denton methods with parametrical dependence on the initial values of variable and indicator in evident form. This solution spans Denton’s original and Cholette’s advanced benchmarking initial conditions as the subcases. Computational complexity of the o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Database Manag.

دوره 25  شماره 

صفحات  -

تاریخ انتشار 2014