Secure Approximate String Matching for Privacy-Preserving Record Linkage

被引:8
作者
Essex, Aleksander [1 ]
机构
[1] Western Univ, Dept Elect & Comp Engn, London, ON N6A 5B9, Canada
关键词
Homomorphic encryption; secure computation; approximate string matching; privacy-preserving records linkage; EFFICIENT;
D O I
10.1109/TIFS.2019.2903651
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Real-world applications of record linkage often require matching to be robust in spite of small variations in string fields. For example, two health care providers should be able to detect a patient in common, even if one record contains a typo or transcription error. In the privacy-preserving setting, however, the problem of approximate string matching has been cast as a trade-off between security and practicality, and the literature has mainly focused on Bloom filter encodings, an approach which can leak significant information about the underlying records. We present a novel public-key construction for secure two-party evaluation of threshold functions in restricted domains based on embeddings found in the message spaces of additively homomorphic encryption schemes. We use this to construct an efficient two-party protocol for privately computing the threshold Dice coefficient. Relative to the approach of Bloom filter encodings, our proposal offers formal security guarantees and greater matching accuracy. We implement the protocol and demonstrate the feasibility of this approach in linking mediumsized patient databases with tens of thousands of records.
引用
收藏
页码:2623 / 2632
页数:10
相关论文
共 33 条
  • [1] Benaloh J., 1994, Pieces of the puzzle: the jigsaw method. Penn State University, P120
  • [2] SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS
    BLOOM, BH
    [J]. COMMUNICATIONS OF THE ACM, 1970, 13 (07) : 422 - &
  • [3] Chase M., 2015, PoPETs, P263
  • [4] Homomorphic Computation of Edit Distance
    Cheon, Jung Hee
    Kim, Miran
    Lauter, Kristin
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8976 : 194 - 212
  • [5] Efficient Cryptanalysis of Bloom Filters for Privacy-Preserving Record Linkage
    Christen, Peter
    Ranbaduge, Thilina
    Vatsalan, Dinusha
    Schnell, Rainer
    [J]. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2017, PT I, 2017, 10234 : 628 - 640
  • [6] Coron JS, 2011, LECT NOTES COMPUT SC, V6571, P147, DOI 10.1007/978-3-642-19379-8_9
  • [7] Damgård I, 2007, LECT NOTES COMPUT SC, V4586, P416
  • [8] De Cristofaro E, 2012, INT C CRYPT NETW SEC, P218, DOI [DOI 10.1007/978-3-642-35404-5_17, DOI 10.1007/978-3-642-35404-517]
  • [9] Composite Bloom Filters for Secure Record Linkage
    Durham, Elizabeth A.
    Kantarcioglu, Murat
    Xue, Yuan
    Toth, Csaba
    Kuzu, Mehmet
    Malin, Bradley
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (12) : 2956 - 2968
  • [10] Protecting privacy using k-anonymity
    El Emam, Khaled
    Dankar, Fida Kamal
    [J]. JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2008, 15 (05) : 627 - 637