A deterministic approach for protecting privacy in sensitive personal data

被引:3
|
作者
Avraam, Demetris [1 ,2 ]
Jones, Elinor [3 ]
Burton, Paul [1 ]
机构
[1] Newcastle Univ, Populat Hlth Sci Inst, Newcastle Upon Tyne, Tyne & Wear, England
[2] Univ Copenhagen, Dept Publ Hlth, Copenhagen, Denmark
[3] UCL, Dept Stat Sci, London, England
基金
英国经济与社会研究理事会; 英国惠康基金; 英国医学研究理事会;
关键词
Data privacy; Deterministic anonymisation; Disclosure risk; Information loss; k nearest neighbours; ANONYMISATION; UTILITY; MODEL; RISK;
D O I
10.1186/s12911-022-01754-4
中图分类号
R-058 [];
学科分类号
摘要
Background Data privacy is one of the biggest challenges for any organisation which processes personal data, especially in the area of medical research where data include sensitive information about patients and study participants. Sharing of data is therefore problematic, which is at odds with the principle of open data that is so important to the advancement of society and science. Several statistical methods and computational tools have been developed to help data custodians and analysts overcome this challenge. Methods In this paper, we propose a new deterministic approach for anonymising personal data. The method stratifies the underlying data by the categorical variables and re-distributes the continuous variables through a k nearest neighbours based algorithm. Results We demonstrate the use of the deterministic anonymisation on real data, including data from a sample of Titanic passengers, and data from participants in the 1958 Birth Cohort. Conclusions The proposed procedure makes data re-identification difficult while minimising the loss of utility (by preserving the spatial properties of the underlying data); the latter means that informative statistical analysis can still be conducted.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] A deterministic approach for protecting privacy in sensitive personal data
    Demetris Avraam
    Elinor Jones
    Paul Burton
    [J]. BMC Medical Informatics and Decision Making, 22
  • [2] The right to privacy. Protecting the sensitive data
    Luisa Pfeiffer, Maria
    [J]. REVISTA COLOMBIANA DE BIOETICA, 2008, 3 (01): : 11 - 36
  • [3] Protecting the privacy and security of sensitive customer data in the cloud
    King, Nancy J.
    Raja, V. T.
    [J]. COMPUTER LAW & SECURITY REVIEW, 2012, 28 (03) : 308 - 319
  • [4] Protecting Privacy of Sensitive Value Distributions in Data Release
    Bezzi, Michele
    di Vimercati, Sabrina De Capitani
    Livraga, Giovanni
    Samarati, Pierangela
    [J]. SECURITY AND TRUST MANAGEMENT, 2011, 6710 : 255 - +
  • [5] Protecting personal sensitive data security in the cloud with blockchain
    Yang, Zhen
    Chen, Yingying
    Huang, Yongfeng
    Li, Xing
    [J]. AI AND CLOUD COMPUTING, 2021, 120 : 195 - 231
  • [6] Privacy-Preserving Personal Sensitive Data in Crowdsourcing
    Xu, Ke
    Han, Kai
    Ye, Hang
    Gao, Feng
    Xu, Chaoting
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2018), 2018, 10874 : 509 - 520
  • [7] A framework for protecting personal information and privacy
    Zheng, Hongying
    Yuan, Quan
    Chen, Jianyong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2867 - 2874
  • [8] Protecting Privacy for Big Data in Body Sensor Networks: A Differential Privacy Approach
    Lin, Chi
    Song, Zihao
    Liu, Qing
    Sun, Weifeng
    Wu, Guowei
    [J]. COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS, AND WORKSHARING, COLLABORATECOM 2015, 2016, 163 : 163 - 172
  • [9] Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System
    Rath, Annanda Thavymony
    Colin, Jean-Noel
    [J]. Data and Applications Security and Privacy XXIX, 2015, 9149 : 233 - 241
  • [10] PROTECTING PERSONAL DATA
    RUSSELL, W
    [J]. BRITISH MEDICAL JOURNAL, 1983, 286 (6361): : 320 - 320