Towards the formalization of re-identification for some data masking methods

被引:1
|
作者
Torra, Vicenc [1 ]
机构
[1] IIIA CSIC, Bellaterra 08193, Catalonia, Spain
关键词
Re-identification; record linkage; k-anonymity; belief functions; RECORD LINKAGE;
D O I
10.3233/978-1-61499-139-7-47
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Re-identification methods are in common use in data privacy for disclosure risk assessment. Record linkage is one of these re-identification methods. Given two data files, record linkage establishes links between records that correspond to the same individual but are found in the two different files. In this paper we review our definition of re-identification, which is based on belief functions. The use of these functions permits us to model in an appropriate way the uncertainty inherent in the re-identification process. Then, we discuss record linkage for data masked using approaches that ensure k-anonymity, and for data masked using rank swapping p-bucket.
引用
收藏
页码:47 / 55
页数:9
相关论文
共 50 条
  • [31] Distilled Person Re-identification: Towards a More Scalable System
    Wu, Ancong
    Zheng, Wei-Shi
    Guo, Xiaowei
    Lai, Jian-Huang
    2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 1187 - 1196
  • [32] Towards Discriminative Representation Learning for Unsupervised Person Re-identification
    Isobe, Takashi
    Li, Dong
    Tian, Lu
    Chen, Weihua
    Shan, Yi
    Wang, Shengjin
    2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, : 8506 - 8516
  • [33] Data Assimilation Network for Generalizable Person Re-Identification
    Liu, Yixiu
    Zhang, Yunzhou
    Bhanu, Bir
    Coleman, Sonya
    Kerr, Dermot
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (08) : 5536 - 5550
  • [34] Estimating the re-identification risk of clinical data sets
    Dankar, Fida Kamal
    El Emam, Khaled
    Neisa, Angelica
    Roffey, Tyson
    BMC MEDICAL INFORMATICS AND DECISION MAKING, 2012, 12
  • [35] An Improved CycleGAN for Data Augmentation in Person Re-Identification
    Yang, Zhenzhen
    Shao, Jing
    Yang, Yongpeng
    BIG DATA RESEARCH, 2023, 34
  • [36] Resisting re-identification mining on social graph data
    Jianliang Gao
    Qing Ping
    Jianxin Wang
    World Wide Web, 2018, 21 : 1759 - 1771
  • [37] Estimating the re-identification risk of clinical data sets
    Fida Kamal Dankar
    Khaled El Emam
    Angelica Neisa
    Tyson Roffey
    BMC Medical Informatics and Decision Making, 12
  • [38] The Lawfulness of Re-identification Under Data Protection Law
    Curelariu, Teodora
    Lodie, Alexandre
    PRIVACY TECHNOLOGIES AND POLICY, APF 2024, 2024, 14831 : 112 - 131
  • [39] A Systematic Review of Re-Identification Attacks on Health Data
    El Emam, Khaled
    Jonker, Elizabeth
    Arbuckle, Luk
    Malin, Bradley
    PLOS ONE, 2011, 6 (12):
  • [40] Resisting re-identification mining on social graph data
    Gao, Jianliang
    Ping, Qing
    Wang, Jianxin
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (06): : 1759 - 1771