Ensuring privacy in the digital age: an algorithmic approach to data de-identification and re-identification risks
Ключевые слова:
personal data, anonymization, data protection, data depersonalization, data de-identification, re-identificationАннотация
This paper examines the fundamental properties of personal data and explores anonymization as a strategic approach to safeguarding privacy. It outlines the stages involved in de-identifying personal data, investigates the vulnerabilities and lead to re-identification, and analyzes the motivations behind such attacks. Additionally, the study provides a comprehensive overview of the entire lifecycle of personal data, including its collection, processing and anonymization techniques.
Библиографические ссылки
S.-C. Cha, K.-H. Yeh, A Data-Driven Security Risk Assessment Scheme for Personal Data Protection, in IEEE Access, vol. 6, pp. 50510-50517, 2018, doi: 10.1109/ACCESS.2018.2868726.
A. A. Ganiev, K. F. Kerimov and Z. I. Azizova, Understanding of Data De-identification: Issues of Relevance and Problems, 2021 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 2021, pp. 1-4, doi: 10.1109/ICISCT52966.2021.9670054J.
I. Sibikina, N. Davidyuk, I. Kosmacheva, I. Kuchin and S. Belov, The Algorithm for Controlling the Use of Big Personal Data, 2020 International Conference Engineering and Telecommunication (En&T), Dolgoprudny, Russia, 2020, pp. 1-5, doi: 10.1109/EnT50437.2020.9431268.
A. Pervushin, V. Ermachkova and A. Spivak, Determination of loss of information during data anonymization procedure, 2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT), Baku, Azerbaijan, 2016, pp. 1-5, doi: 10.1109/ICAICT.2016.7991650.
B. Riedl, V. Grascher, S. Fenz and T. Neubauer, Pseudonymization for improving the Privacy in E-Health Applications, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), Waikoloa, HI, USA, 2008, pp. 255-255, doi: 10.1109/HICSS.2008.366
J. Gulcher, K. Kristjansson, H. Gudbjartsson, K., and Stefanson, Protection of privacy by third-party encryption in genetic research, European journal of human genetics, vol. 8, pp. 739-742, 2000.
U.S. Department of Health and Human Services (HHS). (1996). Health Insurance Portability and Accountability Act of 1996 (HIPAA). Public Law 104–191.
L. Sweeney, Simple Demographics Often Identify People Uniquely. Carnegie Mellon University, Data Privacy Working Paper 3. Pittsburgh 2000. pp.1-34.
Загрузки
Дополнительные файлы
Опубликован
Как цитировать
Лицензия
Copyright (c) 2025 Zarina Azizova, Abdukhalil Ganiev

Это произведение доступно по лицензии Creative Commons «Attribution» («Атрибуция») 4.0 Всемирная.