A taxonomy of privacy-preserving record linkage techniques

被引:177
作者
Vatsalan, Dinusha [1 ]
Christen, Peter [1 ]
Verykios, Vassilios S. [2 ]
机构
[1] Australian Natl Univ, Res Sch Comp Sci, Canberra, ACT 0200, Australia
[2] Hellen Open Univ, Sch Sci & Technol, Patras, Greece
基金
匈牙利科学研究基金会;
关键词
Record linkage; Data matching; Entity resolution; Data quality; Privacy techniques; Survey; SECURITY; GENERATION; FRAMEWORK;
D O I
10.1016/j.is.2012.11.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The process of identifying which records in two or more databases correspond to the same entity is an important aspect of data quality activities such as data pre-processing and data integration. Known as record linkage, data matching or entity resolution, this process has attracted interest from researchers in fields such as databases and data warehousing, data mining, information systems, and machine learning. Record linkage has various challenges, including scalability to large databases, accurate matching and classification, and privacy and confidentiality. The latter challenge arises because commonly personal identifying data, such as names, addresses and dates of birth of individuals, are used in the linkage process. When databases are linked across organizations, the issue of how to protect the privacy and confidentiality of such sensitive information is crucial to successful application of record linkage. In this paper we present an overview of techniques that allow the linking of databases between organizations while at the same time preserving the privacy of these data. Known as 'privacy-preserving record linkage' (PPRL), various such techniques have been developed. We present a taxonomy of PPRL techniques to characterize these techniques along 15 dimensions, and conduct a survey of PPRL techniques. We then highlight shortcomings of current techniques and discuss avenues for future research. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:946 / 969
页数:24
相关论文
共 145 条
[11]  
[Anonymous], ACM Transactions on Information and System Security (TISSEC), DOI DOI 10.1145/290163.290168
[12]  
[Anonymous], 2011, P 9 AUSTR DAT MIN C
[13]  
[Anonymous], 1999, Compressing and Indexing Documents and Images
[14]  
[Anonymous], 2002, ACM Sigkdd Explorations Newsletter, DOI [10.1145/772862.772867, DOI 10.1145/772862.772867]
[15]  
[Anonymous], 2006, Data Quality: Concepts, Methodologies and Techniques, DOI [DOI 10.1007/3-540-33173-5_1, DOI 10.1007/3-540-33173-5]
[16]  
[Anonymous], 1997, HMAC KEYED HASHING M, DOI DOI 10.17487/RFC2104
[17]  
[Anonymous], 2003, KDD
[18]  
[Anonymous], 2003, IIWeb
[19]  
[Anonymous], 1987, 19 ACM STOC, DOI DOI 10.1145/28395.28420
[20]  
ATALLAH MJ, 2003, WORKSH PRIV EL SOC