메뉴 건너뛰기




Volumn 50, Issue , 2014, Pages 62-76

A flexible approach to distributed data anonymization

Author keywords

Anonymization; Commutative encryption; Distribution; Personal data protection; Privacy; Secure multi party computing; SMC

Indexed keywords

BIOINFORMATICS; COMPUTER APPLICATIONS;

EID: 84905263847     PISSN: 15320464     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jbi.2013.12.002     Document Type: Article
Times cited : (41)

References (63)
  • 1
    • 84905277867 scopus 로고    scopus 로고
    • B. Consortium Goals-International Cancer Genome Consortium.
    • B. Consortium Goals-International Cancer Genome Consortium. http://icgc.org/icgc/goals-structure-policies-guidelines/b-consortium-goals.
  • 2
    • 84905260031 scopus 로고    scopus 로고
    • BBMRI-LPC - a four-year project to help scientists to have better access to large European studies on health
    • Perola M, van Ommen G-J. BBMRI-LPC - a four-year project to help scientists to have better access to large European studies on health; 2013. http://www.bbmri-lpc.org/BBMRI-LPC_Press_release.pdf.
    • (2013)
    • Perola, M.1    van Ommen, G.-J.2
  • 3
    • 84905241715 scopus 로고    scopus 로고
    • Sharing research data to improve public health: full joint statement by funders of health research - Wellcome Trust.
    • Sharing research data to improve public health: full joint statement by funders of health research - Wellcome Trust. http://www.wellcome.ac.uk/About-us/Policy/Spotlight-issues/Data-sharing/Public-health-and-epidemiology/WTDV030690.htm.
  • 4
    • 84905277868 scopus 로고    scopus 로고
    • OECD Principles and Guidelines for Access to Research Data from Public Funding.
    • OECD Principles and Guidelines for Access to Research Data from Public Funding. http://www.oecd.org/science/sci-tech/oecdprinciplesandguidelinesforaccesstoresearchdatafrompublicfunding.htm.
  • 5
    • 72949114284 scopus 로고    scopus 로고
    • Translational informatics: enabling high-throughput research paradigms
    • Payne P., et al. Translational informatics: enabling high-throughput research paradigms. Physiol Genomics 2009, 39(3):131-140.
    • (2009) Physiol Genomics , vol.39 , Issue.3 , pp. 131-140
    • Payne, P.1
  • 6
    • 78650415869 scopus 로고    scopus 로고
    • Assessing the privacy risks of data sharing in genomics
    • Heeney C., et al. Assessing the privacy risks of data sharing in genomics. Public Health Genomics 2011, 14(1):17-25.
    • (2011) Public Health Genomics , vol.14 , Issue.1 , pp. 17-25
    • Heeney, C.1
  • 7
    • 84905277869 scopus 로고    scopus 로고
    • Health insurance portability and accountability act of 1996, Public Law Gazette
    • Health insurance portability and accountability act of 1996, Public Law Gazette; 1996. p. 1-349.
    • (1996) , pp. 1-349
  • 8
    • 84905260027 scopus 로고    scopus 로고
    • Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data.
    • Communities 38 (L. 281).
    • Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data. Off. J. Eur. Communities 38 (L. 281).
    • Off. J. Eur.
  • 9
    • 84860789494 scopus 로고    scopus 로고
    • ELSI 2.0 for genomics and society
    • Kaye J., et al. ELSI 2.0 for genomics and society. Science 2012, 4-5.
    • (2012) Science , pp. 4-5
    • Kaye, J.1
  • 10
    • 33845354052 scopus 로고    scopus 로고
    • Trends in ethical and legal frameworks for the use of human biobanks
    • Cambon-Thomsen A., et al. Trends in ethical and legal frameworks for the use of human biobanks. Eur Respir J 2007, 30(2):373-382.
    • (2007) Eur Respir J , vol.30 , Issue.2 , pp. 373-382
    • Cambon-Thomsen, A.1
  • 11
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: k-, and its enforcement through generalization and suppression
    • Samarati P, Sweeney L. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Proc IEEE symp on security and privacy; 1998.
    • (1998) Proc IEEE symp on security and privacy
    • Samarati, P.1    Sweeney, L.2
  • 12
    • 0000072558 scopus 로고
    • Finding a needle in a haystack or identifying anonymous census records
    • Dalenius T. Finding a needle in a haystack or identifying anonymous census records. J Off Stat 1986, 2(3):329-336.
    • (1986) J Off Stat , vol.2 , Issue.3 , pp. 329-336
    • Dalenius, T.1
  • 13
    • 84905277865 scopus 로고    scopus 로고
    • Rethinking the honest broker in the changing face of security and privacy.
    • Rasmussen L., et al. Rethinking the honest broker in the changing face of security and privacy. In: Proc AMIA annu symp; 2012. p. 1554-6.
    • (2012) Proc AMIA annu symp , pp. 1554-1556
    • Rasmussen, L.1
  • 14
    • 69549114557 scopus 로고    scopus 로고
    • A globally optimal k-anonymity method for the de-identification of health data
    • Emam K.E., et al. A globally optimal k-anonymity method for the de-identification of health data. J Am Med Inform Assoc 2009, 16(5):670-682.
    • (2009) J Am Med Inform Assoc , vol.16 , Issue.5 , pp. 670-682
    • Emam, K.E.1
  • 15
    • 78651539208 scopus 로고    scopus 로고
    • Efficient anonymizations with enhanced utility
    • Goldberger J., Tassa T. Efficient anonymizations with enhanced utility. Trans Data Privacy 2010, 3(2):149-175.
    • (2010) Trans Data Privacy , vol.3 , Issue.2 , pp. 149-175
    • Goldberger, J.1    Tassa, T.2
  • 17
    • 79958053421 scopus 로고    scopus 로고
    • Anonymity in data publishing and distribution.
    • PhD thesis, Madison, WI, USA
    • Lefevre KR. Anonymity in data publishing and distribution. PhD thesis, Madison, WI, USA; 2007.
    • (2007)
    • Lefevre, K.R.1
  • 18
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • Samarati P. Protecting respondents' identities in microdata release. IEEE Trans Knowl Data Eng 2001, 13(6):1010-1027.
    • (2001) IEEE Trans Knowl Data Eng , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 21
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalization and suppression
    • Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertain Fuzziness Knowl-Based Syst 2002, 10(5):571-588.
    • (2002) Int J Uncertain Fuzziness Knowl-Based Syst , vol.10 , Issue.5 , pp. 571-588
    • Sweeney, L.1
  • 22
    • 84874203892 scopus 로고    scopus 로고
    • Attribute utility motivated k-anonymization of datasets to support the heterogeneous needs of biomedical researchers.
    • Ye H, Chen ES. Attribute utility motivated k-anonymization of datasets to support the heterogeneous needs of biomedical researchers. AMIA ann symp proc; 2011. p. 1573-82.
    • (2011) AMIA ann symp proc , pp. 1573-1582
    • Ye, H.1    Chen, E.S.2
  • 23
    • 28444499680 scopus 로고    scopus 로고
    • Top-down specialization for information and privacy preservation
    • Fung B, et al. Top-down specialization for information and privacy preservation. In: Proc int conf on data engineering 2005. p. 205-16.
    • (2005) Proc int conf on data engineering , pp. 205-216
    • Fung, B.1
  • 27
    • 34548689125 scopus 로고    scopus 로고
    • Thoughts on k-anonymization
    • Nergiz M.E., Clifton C. Thoughts on k-anonymization. Data Knowl Eng 2007, 63(3):622-645.
    • (2007) Data Knowl Eng , vol.63 , Issue.3 , pp. 622-645
    • Nergiz, M.E.1    Clifton, C.2
  • 29
    • 34548805858 scopus 로고    scopus 로고
    • t-Closeness: privacy beyond k-anonymity and l-diversity
    • Li N, et al. t-Closeness: privacy beyond k-anonymity and l-diversity. In: Proc int conf on data engineering 2007. p. 106-15.
    • (2007) Proc int conf on data engineering , pp. 106-115
    • Li, N.1
  • 30
    • 78149335185 scopus 로고    scopus 로고
    • Centralized and distributed anonymization for high-dimensional healthcare data
    • Mohammed N., Fung B. Centralized and distributed anonymization for high-dimensional healthcare data. ACM Trans Knowl Discovery Data 2010, 4(4):1-33.
    • (2010) ACM Trans Knowl Discovery Data , vol.4 , Issue.4 , pp. 1-33
    • Mohammed, N.1    Fung, B.2
  • 31
    • 35448937300 scopus 로고    scopus 로고
    • Hiding the presence of individuals from shared databases
    • ACM
    • Nergiz M.E., et al. Hiding the presence of individuals from shared databases. Proc int conf on management of data (SIGMOD) 2007, 665-676. ACM.
    • (2007) Proc int conf on management of data (SIGMOD) , pp. 665-676
    • Nergiz, M.E.1
  • 32
    • 33749571958 scopus 로고    scopus 로고
    • (α,k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing
    • ACM
    • Wong R.C.-W., et al. (α,k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. Proc int conf on knowl disc data min (KDD) 2006, 754-759. ACM.
    • (2006) Proc int conf on knowl disc data min (KDD) , pp. 754-759
    • Wong, R.C.-W.1
  • 33
  • 34
    • 34548710709 scopus 로고    scopus 로고
    • Aggregate query answering on anonymized tables
    • IEEE
    • Zhang Q., et al. Aggregate query answering on anonymized tables. Proc int conf on data engineering 2007, 116-125. IEEE.
    • (2007) Proc int conf on data engineering , pp. 116-125
    • Zhang, Q.1
  • 35
    • 57149132810 scopus 로고    scopus 로고
    • Preservation of proximity privacy in publishing numerical sensitive data
    • ACM
    • Li J., et al. Preservation of proximity privacy in publishing numerical sensitive data. Proc int conf on management of data (SIGMOD) 2008, 473-486. ACM.
    • (2008) Proc int conf on management of data (SIGMOD) , pp. 473-486
    • Li, J.1
  • 36
    • 67649655744 scopus 로고    scopus 로고
    • A general proximity privacy principle
    • IEEE
    • Wang T., et al. A general proximity privacy principle. Proc int conf on data engineering 2009, 1279-1282. IEEE.
    • (2009) Proc int conf on data engineering , pp. 1279-1282
    • Wang, T.1
  • 37
    • 35448967088 scopus 로고    scopus 로고
    • M-invariance: towards privacy preserving re-publication of dynamic datasets
    • ACM
    • Xiao X., Tao Y. M-invariance: towards privacy preserving re-publication of dynamic datasets. Proc int conf on management of data (SIGMOD) 2007, 689-700. ACM.
    • (2007) Proc int conf on management of data (SIGMOD) , pp. 689-700
    • Xiao, X.1    Tao, Y.2
  • 40
    • 36048997303 scopus 로고    scopus 로고
    • A secure distributed framework for achieving k-anonymity
    • Jiang W., Clifton C. A secure distributed framework for achieving k-anonymity. VLDB J 2006, 15(4):316.
    • (2006) VLDB J , vol.15 , Issue.4 , pp. 316
    • Jiang, W.1    Clifton, C.2
  • 44
    • 84863607195 scopus 로고    scopus 로고
    • Secure distributed computation of anonymized views of shared databases
    • 11:1-11:43
    • Tassa T., Gudes E. Secure distributed computation of anonymized views of shared databases. ACM Trans Database Syst 2012, 37(2):11:1-11:43.
    • (2012) ACM Trans Database Syst , vol.37 , Issue.2
    • Tassa, T.1    Gudes, E.2
  • 46
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • Kantarcioglu M., Clifton C. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans Knowl Data Eng 2004, 16(9):1026-1037.
    • (2004) IEEE Trans Knowl Data Eng , vol.16 , Issue.9 , pp. 1026-1037
    • Kantarcioglu, M.1    Clifton, C.2
  • 48
    • 84905277866 scopus 로고    scopus 로고
    • ANSI, ANSI X9.62:2005 Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA)
    • ANSI, ANSI X9.62:2005 Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA) (2005).
    • (2005)
  • 49
    • 33751508709 scopus 로고    scopus 로고
    • Recommendation for key management Part 1: General (revision 3).
    • NIST special publication
    • Barker E, et al. Recommendation for key management Part 1: General (revision 3). NIST special publication (July); 2011. p. 1-147.
    • (2011) , Issue.JULY , pp. 1-147
    • Barker, E.1
  • 50
    • 84905260025 scopus 로고    scopus 로고
    • The GNU Multiple Precision Arithmetic Library; August 2013.
    • The GNU Multiple Precision Arithmetic Library; August 2013. http://gmplib.org/.
  • 51
    • 84905223907 scopus 로고    scopus 로고
    • ARX - Powerful Data Anonymization; August 2013.
    • ARX - Powerful Data Anonymization; August 2013. http://arx.deidentifier.org/.
  • 53
    • 38149068986 scopus 로고    scopus 로고
    • Deterministic and efficiently searchable encryption
    • Springer
    • Bellare M., et al. Deterministic and efficiently searchable encryption. Advances in cryptology-CRYPTO 2007 2007, vol. 4622:535-552. Springer.
    • (2007) Advances in cryptology-CRYPTO 2007 , vol.4622 , pp. 535-552
    • Bellare, M.1
  • 54
    • 84905236497 scopus 로고    scopus 로고
    • Health Insurance Portability and Accountability Act (HIPAA)
    • Health Insurance Portability and Accountability Act (HIPAA), Public Law; 1996. p. 1-349.
    • (1996) Public Law , pp. 1-349
  • 55
    • 79960442271 scopus 로고    scopus 로고
    • Anonymity meets game theory: secure data integration with malicious participants
    • Mohammed N., et al. Anonymity meets game theory: secure data integration with malicious participants. VLDB J 2011, 20(4):567-588.
    • (2011) VLDB J , vol.20 , Issue.4 , pp. 567-588
    • Mohammed, N.1
  • 56
    • 84873136644 scopus 로고    scopus 로고
    • Detecting inconsistencies in private data with secure function evaluation.
    • Tech rep 11-006, Purdue University
    • Talukder N, et al. Detecting inconsistencies in private data with secure function evaluation. Tech rep 11-006, Purdue University; 2011.
    • (2011)
    • Talukder, N.1
  • 57
    • 39749149272 scopus 로고    scopus 로고
    • Privacy-preserving imputation of missing data
    • Jagannathan G., Wright R. Privacy-preserving imputation of missing data. Data Knowl Eng 2008, 65(1):40-56.
    • (2008) Data Knowl Eng , vol.65 , Issue.1 , pp. 40-56
    • Jagannathan, G.1    Wright, R.2
  • 58
    • 84905241714 scopus 로고    scopus 로고
    • RFC 5246 - The Transport Layer Security (TLS) protocol version 1.2. Tech rep; August 2008.
    • Dierks T, Rescorla E. RFC 5246 - The Transport Layer Security (TLS) protocol version 1.2. Tech rep; August 2008.
    • Dierks, T.1    Rescorla, E.2
  • 59
    • 82555187188 scopus 로고    scopus 로고
    • A systematic review of re-identification attacks on health data.
    • El Emam K, et al. A systematic review of re-identification attacks on health data. PloS one 2011 6 (12).
    • (2011) PloS one , vol.6 , Issue.12
    • El Emam, K.1
  • 60
    • 74249091457 scopus 로고    scopus 로고
    • Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research
    • Malin B., et al. Technical and policy approaches to balancing patient privacy and data sharing in clinical and translational research. J Investig Med 2010, 58(1):11-18.
    • (2010) J Investig Med , vol.58 , Issue.1 , pp. 11-18
    • Malin, B.1
  • 61
    • 80053335117 scopus 로고    scopus 로고
    • And mitigation strategies
    • Malin B., et al. and mitigation strategies. Hum Genet 2011, 130(3):383-392.
    • (2011) Hum Genet , vol.130 , Issue.3 , pp. 383-392
    • Malin, B.1
  • 62
    • 84879459110 scopus 로고    scopus 로고
    • Use of generalised additive models to categorise continuous variables in clinical prediction
    • Barrio I., et al. Use of generalised additive models to categorise continuous variables in clinical prediction. BMC Med Res Methodol 2013, 13(1):83.
    • (2013) BMC Med Res Methodol , vol.13 , Issue.1 , pp. 83
    • Barrio, I.1
  • 63
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • Springer
    • Kissner L., Song D. Privacy-preserving set operations. Lect Notes Comput Sci 2005, 241-257. Springer.
    • (2005) Lect Notes Comput Sci , pp. 241-257
    • Kissner, L.1    Song, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.