A Semantic-Based K-Anonymity Scheme for Health Record Linkage

被引:5
|
作者
Lu, Yang [1 ]
Sinnott, Richard O. [1 ]
Verspoor, Karin [1 ]
机构
[1] Univ Melbourne, Dept Comp & Informat Syst, Melbourne, Vic, Australia
来源
关键词
Medical record linkage; de-identification; k-anonymity; semantic reasoning;
D O I
10.3233/978-1-61499-783-2-84
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Record linkage is a technique for integrating data from sources or providers where direct access to the data is not possible due to security and privacy considerations. This is a very common scenario for medical data, as patient privacy is a significant concern. To avoid privacy leakage, researchers have adopted k anonymity to protect raw data from re-identification however they cannot avoid associated information loss, e.g. due to generalisation. Given that individual-level data is often not disclosed in the linkage cases, but yet remains potentially re discoverable, we propose semantic-based linkage k-anonymity to de-identify record linkage with fewer generalisations and eliminate inference disclosure through semantic reasoning.
引用
收藏
页码:84 / 90
页数:7
相关论文
共 50 条
  • [1] A K-anonymity Based Semantic Model For Protecting Personal Information and Privacy
    Omran, Esraa
    Bokma, Albert
    Abu-Almaati, Shereef
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1443 - +
  • [2] Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT
    Zhou, Kexin
    Wang, Jian
    [J]. 2019 20TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2019,
  • [3] Distributed K-Anonymity Location Privacy Protection Scheme Based on Blockchain
    Liu, Hai
    Li, Xing-Hua
    Luo, Bin
    Wang, Yun-Wei
    Ren, Yan-Bing
    Ma, Jian-Feng
    Ding, Hong-Fa
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 942 - 960
  • [4] Dummy Location Selection Scheme for K-anonymity in Location based Services
    Wu, Di
    Zhang, Yu
    Liu, Yinlong
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 441 - 448
  • [5] Research on k-anonymity privacy protection scheme based on bilinear pairings
    Song Cheng
    Zhang Yadong
    Wang Lei
    Liu Zhizhong
    [J]. The Journal of China Universities of Posts and Telecommunications, 2018, 25 (05) : 12 - 19
  • [6] A Clustering K-Anonymity Scheme for Location Privacy Preservation
    Yao, Lin
    Wu, Guowei
    Wang, Jia
    Xia, Feng
    Lin, Chi
    Wang, Guojun
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 134 - 142
  • [7] Risk & distortion based K-anonymity
    Xu, Shenkun
    Ye, Xiaojun
    [J]. INFORMATION SECURITY APPLICATIONS, 2007, 4867 : 345 - 358
  • [8] K-Anonymity Based on Sensitive Tuples
    Hu, Xinping
    Sun, Zhihui
    Wu, Yingjie
    Hu, Wenyu
    Dong, Jiancheng
    [J]. FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 91 - +
  • [9] The Analysis of Typical Algorithms Based on K-Anonymity
    Fan Tigui
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 327 - 330
  • [10] K-Anonymity Algorithm Based on Improved Clustering
    Zheng, Wantong
    Wang, Zhongyue
    Lv, Tongtong
    Ma, Yong
    Jia, Chunfu
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT II, 2018, 11335 : 462 - 476