A taxonomy of privacy-preserving record linkage techniques
Reads0
Chats0
TLDR
This paper presents an overview of techniques that allow the linking of databases between organizations while at the same time preserving the privacy of these data, and presents a taxonomy of PPRL techniques to characterize these techniques along 15 dimensions.About:
This article is published in Information Systems.The article was published on 2013-09-01 and is currently open access. It has received 241 citations till now. The article focuses on the topics: Record linkage & Data warehouse.read more
Citations
More filters
Journal ArticleDOI
A fast privacy-preserving patient record linkage of time series data
TL;DR: In this article , a fast and reliable record linkage algorithm was proposed to accurately match patient records in the original and subset databases while maintaining privacy, and a privacy preserving framework was introduced to enable health institutions to safely release their raw time series records to researchers with bare minimum amount of identifying information.
Journal ArticleDOI
Privacy-preserving record linkage using autoencoders
TL;DR: In this paper , the authors proposed a method based on autoencoders that transforms Bloom Filters into vectors of real numbers to achieve a high comparison quality of the generated numerical vectors and guarantee the comparability of encodings generated by different data owners.
Book ChapterDOI
An Overview of Big Data Issues in Privacy-Preserving Record Linkage
TL;DR: This paper proposes an analysis tool for the computational aspects of PPRL, and characterize existing P PRL techniques along five dimensions, and identifies research gaps in current literature and promising directions for future work.
Posted Content
Accurate and Efficient Suffix Tree Based Privacy-Preserving String Matching.
TL;DR: In this article, the authors proposed a novel approach for accurate and efficient privacy-preserving string matching based on suffix trees that are encoded using chained hashing and incorporated a hashing based encoding technique upon the encoded suffixes to improve privacy against frequency attacks such as those exploiting Benford's law.
Book ChapterDOI
Record Linkage als zentraler Baustein der Forschung mit Registern und Big Data-Nutzungen
TL;DR: In untechnischen Veroffentlichungen wird gelegentlich der Begriff „fuzzy matching“ verwendet, wobei dieser keine feste Bedeutung besitzt as mentioned in this paper.
References
More filters
Book
Data Mining: Concepts and Techniques
TL;DR: This book presents dozens of algorithms and implementation examples, all in pseudo-code and suitable for use in real-world, large-scale data mining projects, and provides a comprehensive, practical look at the concepts and techniques you need to get the most out of real business data.
Journal ArticleDOI
Indexing by Latent Semantic Analysis
TL;DR: A new method for automatic indexing and retrieval to take advantage of implicit higher-order structure in the association of terms with documents (“semantic structure”) in order to improve the detection of relevant documents on the basis of terms found in queries.
Journal ArticleDOI
k -anonymity: a model for protecting privacy
TL;DR: The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment and examines re-identification attacks that can be realized on releases that adhere to k- anonymity unless accompanying policies are respected.
Journal ArticleDOI
Space/time trade-offs in hash coding with allowable errors
TL;DR: Analysis of the paradigm problem demonstrates that allowing a small number of test messages to be falsely identified as members of the given set will permit a much smaller hash area to be used without increasing reject time.