Data Privacy-Identification Hiding Using K-Anonymity

Provided by: Creative Commons
Topic: Data Management
Format: PDF
Consider a data holder, such as a hospital or a bank that has a privately held collection of person-specific, field structured data. Suppose the data holder wants to share a version of the data with researchers. How can a data holder release a version of its private data with scientific guarantees that the individuals who are the subjects of the data cannot be re-identified while the data remain practically useful? This paper is to preserve the user sensitive data from misuse, by including a formal protection model named k-anonymity and the connection is kept anonymous.

Find By Topic