Towards the formalization of re-identification for some data masking methods

被引:1
|
作者
Torra, Vicenc [1 ]
机构
[1] IIIA CSIC, Bellaterra 08193, Catalonia, Spain
关键词
Re-identification; record linkage; k-anonymity; belief functions; RECORD LINKAGE;
D O I
10.3233/978-1-61499-139-7-47
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Re-identification methods are in common use in data privacy for disclosure risk assessment. Record linkage is one of these re-identification methods. Given two data files, record linkage establishes links between records that correspond to the same individual but are found in the two different files. In this paper we review our definition of re-identification, which is based on belief functions. The use of these functions permits us to model in an appropriate way the uncertainty inherent in the re-identification process. Then, we discuss record linkage for data masked using approaches that ensure k-anonymity, and for data masked using rank swapping p-bucket.
引用
收藏
页码:47 / 55
页数:9
相关论文
共 50 条
  • [1] Masking and re-identification methods for public-use microdata: Overview and research problems
    Winkler, WE
    PRIVACY IN STATISTICAL DATABASES, PROCEEDINGS, 2004, 3050 : 231 - 246
  • [2] Towards Person Identification and Re-identification with Attributes
    Layne, Ryan
    Hospedales, Timothy M.
    Gong, Shaogang
    COMPUTER VISION - ECCV 2012: WORKSHOPS AND DEMONSTRATIONS, PT I, 2012, 7583 : 402 - 412
  • [3] Towards Explainable Person Re-Identification
    Goyal, Divyansh
    Patel, Netra
    Truong, Thomas
    Yanushkevich, Svetlana
    2021 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2021), 2021,
  • [4] Re-identification methods for masked microdata
    Winkler, WE
    PRIVACY IN STATISTICAL DATABASES, PROCEEDINGS, 2004, 3050 : 216 - 230
  • [5] Review of Person Re-identification Methods
    Wang, Zengyan
    Arabnia, Hamid R.
    Taha, Thiab R.
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 541 - 546
  • [6] An Example of Solution for Data Preparation Required for Some Purposes of People Identification or Re-Identification
    Ramakic, Adnan
    Bundalo, Zlatko
    Bundalo, Dusanka
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2023, 32 (10)
  • [7] Data Re-Identification: Prioritize Privacy
    Gutmann, Amy
    SCIENCE, 2013, 339 (6123) : 1032 - 1032
  • [8] EXTENDING HASHING TOWARDS FAST RE-IDENTIFICATION
    Liu, Meihan
    Dai, Yongxing
    Wu, Shengsen
    Bai, Yan
    Duan, Ling-Yu
    2020 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2020, : 1551 - 1555
  • [9] Towards Fully Automated Person Re-identification
    Taiana, Matteo
    Figueira, Dario
    Nambiar, Athira
    Nascimento, Jacinto
    Bernardino, Alexandre
    PROCEEDINGS OF THE 2014 9TH INTERNATIONAL CONFERENCE ON COMPUTER VISION, THEORY AND APPLICATIONS (VISAPP 2014), VOL 3, 2014, : 140 - 147
  • [10] Legal Limits to Data Re-Identification
    Wilson, Stephen
    SCIENCE, 2013, 339 (6120) : 647 - 647