scispace - formally typeset
Open AccessJournal ArticleDOI

A taxonomy of privacy-preserving record linkage techniques

Reads0
Chats0
TLDR
This paper presents an overview of techniques that allow the linking of databases between organizations while at the same time preserving the privacy of these data, and presents a taxonomy of PPRL techniques to characterize these techniques along 15 dimensions.
About
This article is published in Information Systems.The article was published on 2013-09-01 and is currently open access. It has received 241 citations till now. The article focuses on the topics: Record linkage & Data warehouse.

read more

Citations
More filters
Journal ArticleDOI

A fast privacy-preserving patient record linkage of time series data

TL;DR: In this article , a fast and reliable record linkage algorithm was proposed to accurately match patient records in the original and subset databases while maintaining privacy, and a privacy preserving framework was introduced to enable health institutions to safely release their raw time series records to researchers with bare minimum amount of identifying information.
Journal ArticleDOI

Privacy-preserving record linkage using autoencoders

TL;DR: In this paper , the authors proposed a method based on autoencoders that transforms Bloom Filters into vectors of real numbers to achieve a high comparison quality of the generated numerical vectors and guarantee the comparability of encodings generated by different data owners.
Book ChapterDOI

An Overview of Big Data Issues in Privacy-Preserving Record Linkage

TL;DR: This paper proposes an analysis tool for the computational aspects of PPRL, and characterize existing P PRL techniques along five dimensions, and identifies research gaps in current literature and promising directions for future work.
Posted Content

Accurate and Efficient Suffix Tree Based Privacy-Preserving String Matching.

TL;DR: In this article, the authors proposed a novel approach for accurate and efficient privacy-preserving string matching based on suffix trees that are encoded using chained hashing and incorporated a hashing based encoding technique upon the encoded suffixes to improve privacy against frequency attacks such as those exploiting Benford's law.
Book ChapterDOI

Record Linkage als zentraler Baustein der Forschung mit Registern und Big Data-Nutzungen

TL;DR: In untechnischen Veroffentlichungen wird gelegentlich der Begriff „fuzzy matching“ verwendet, wobei dieser keine feste Bedeutung besitzt as mentioned in this paper.
References
More filters
Book

Data Mining: Concepts and Techniques

TL;DR: This book presents dozens of algorithms and implementation examples, all in pseudo-code and suitable for use in real-world, large-scale data mining projects, and provides a comprehensive, practical look at the concepts and techniques you need to get the most out of real business data.
Journal ArticleDOI

Indexing by Latent Semantic Analysis

TL;DR: A new method for automatic indexing and retrieval to take advantage of implicit higher-order structure in the association of terms with documents (“semantic structure”) in order to improve the detection of relevant documents on the basis of terms found in queries.
Journal ArticleDOI

k -anonymity: a model for protecting privacy

TL;DR: The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment and examines re-identification attacks that can be realized on releases that adhere to k- anonymity unless accompanying policies are respected.
Journal ArticleDOI

Space/time trade-offs in hash coding with allowable errors

TL;DR: Analysis of the paradigm problem demonstrates that allowing a small number of test messages to be falsely identified as members of the given set will permit a much smaller hash area to be used without increasing reject time.
Related Papers (5)