Ensuring privacy in the digital age: an algorithmic approach to data de-identification and re-identification risks

Authors

  • Zarina Azizova Tashkent University of Information Technologies named after Muhammad al-Khwarizmi
  • Abdukhalil Ganiev

Keywords:

personal data, anonymization, data protection, data depersonalization, data de-identification, re-identification

Abstract

 This paper examines the fundamental properties of personal data and explores anonymization as a strategic approach to safeguarding privacy. It outlines the stages involved in de-identifying personal data, investigates the vulnerabilities and lead to re-identification, and analyzes the motivations behind such attacks. Additionally, the study provides a comprehensive overview of the entire lifecycle of personal data, including its collection, processing and anonymization techniques.

References

S.-C. Cha, K.-H. Yeh, A Data-Driven Security Risk Assessment Scheme for Personal Data Protection, in IEEE Access, vol. 6, pp. 50510-50517, 2018, doi: 10.1109/ACCESS.2018.2868726.

A. A. Ganiev, K. F. Kerimov and Z. I. Azizova, Understanding of Data De-identification: Issues of Relevance and Problems, 2021 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 2021, pp. 1-4, doi: 10.1109/ICISCT52966.2021.9670054J.

I. Sibikina, N. Davidyuk, I. Kosmacheva, I. Kuchin and S. Belov, The Algorithm for Controlling the Use of Big Personal Data, 2020 International Conference Engineering and Telecommunication (En&T), Dolgoprudny, Russia, 2020, pp. 1-5, doi: 10.1109/EnT50437.2020.9431268.

A. Pervushin, V. Ermachkova and A. Spivak, Determination of loss of information during data anonymization procedure, 2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT), Baku, Azerbaijan, 2016, pp. 1-5, doi: 10.1109/ICAICT.2016.7991650.

B. Riedl, V. Grascher, S. Fenz and T. Neubauer, Pseudonymization for improving the Privacy in E-Health Applications, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), Waikoloa, HI, USA, 2008, pp. 255-255, doi: 10.1109/HICSS.2008.366

J. Gulcher, K. Kristjansson, H. Gudbjartsson, K., and Stefanson, Protection of privacy by third-party encryption in genetic research, European journal of human genetics, vol. 8, pp. 739-742, 2000.

U.S. Department of Health and Human Services (HHS). (1996). Health Insurance Portability and Accountability Act of 1996 (HIPAA). Public Law 104–191.

L. Sweeney, Simple Demographics Often Identify People Uniquely. Carnegie Mellon University, Data Privacy Working Paper 3. Pittsburgh 2000. pp.1-34.

Published

2025-05-20

How to Cite

Azizova, Z., & Ganiev, A. (2025). Ensuring privacy in the digital age: an algorithmic approach to data de-identification and re-identification risks . The Descendants of Al-Fargani, (2), 15–19. Retrieved from http://al-fargoniy.uz/index.php/journal/article/view/814

Issue

Section

Статьи

Categories