Estimating Re-identification Risk by Means of Formal Conceptualization

被引:1
作者
Aranda-Corral, Gonzalo A. [1 ]
Borrego-Diaz, Joaquin [2 ]
Galan-Paez, Juan [2 ]
机构
[1] Univ Huelva, Dept Informat Technol, Huelva, Spain
[2] Univ Seville, Dept Comp Sci & Artificial Intelligence, Seville, Spain
来源
14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS AND 12TH INTERNATIONAL CONFERENCE ON EUROPEAN TRANSNATIONAL EDUCATIONAL (CISIS 2021 AND ICEUTE 2021) | 2022年 / 1400卷
关键词
Privacy; Re-identification; Formal concept analysis; Risk metrics;
D O I
10.1007/978-3-030-87872-6_2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Risk-based methodologies for de-identification provide solutions to ensure privacy. These are based on the availability of sound metrics to estimate the risk of re-identification. Two issues associated with classical risk estimation are, on the one hand, the adequacy of the metric and, on the other hand, its static nature -that is, any change in the database to reduce the risk could imply recomputing the metrics, for example, by removing compromised data (data with a high probability of re-identification). This paper presents a semantic-based risk estimation -by means of Formal Concept Analysis- that allows to estimate a priori the risk of compromised data deletion.
引用
收藏
页码:13 / 22
页数:10
相关论文
共 15 条
[1]  
[Anonymous], 2012, Anonymisation: Managing Data Protection Risk Code of Practice
[2]  
[Anonymous], 2005, Report on Statistical Disclosure Limitation Methodology
[3]   On Experimental Efficiency for Retraction Operator to Stem Basis [J].
Aranda-Corral, Gonzalo A. ;
Borrego-Diaz, Joaquin ;
Galan-Paez, Juan ;
Caballero, Alejandro Trujillo .
TRENDS IN MATHEMATICS AND COMPUTATIONAL INTELLIGENCE, 2019, 796 :73-79
[4]  
Canadian Institute for Health Information, 2011, BEST PRACT GUID MAN
[5]  
Cole R, 1998, LECT NOTES ARTIF INT, V1394, P378
[6]   A manifesto for increasing access to data in engineering [J].
Dodds, Leigh ;
L'Henaff, Pauline ;
Maddison, James ;
Yates, Deborah .
DATA-CENTRIC ENGINEERING, 2020, 1 (02)
[7]   Calibrating noise to sensitivity in private data analysis [J].
Dwork, Cynthia ;
McSherry, Frank ;
Nissim, Kobbi ;
Smith, Adam .
THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 :265-284
[8]   A Firm Foundation for Private Data Analysis [J].
Dwork, Cynthia .
COMMUNICATIONS OF THE ACM, 2011, 54 (01) :86-95
[9]  
El Emam K., 2013, Anonymizing health data: case studies and methods to get you started
[10]   A Systematic Review of Re-Identification Attacks on Health Data [J].
El Emam, Khaled ;
Jonker, Elizabeth ;
Arbuckle, Luk ;
Malin, Bradley .
PLOS ONE, 2011, 6 (12)