Javascript must be enabled to continue!
Linking Sensitive Data – Applications, Techniques, and Challenges
View through CrossRef
IntroductionThe linking of sensitive databases containing personal identifying information across organisations is an increasingly important task in application domains ranging from health and social science research to national censuses. Various techniques have been developed to facilitate the linking of sensitive databases while at the same time preserving the privacy of individuals represented in these databases.
Objectives and approachWe present several case studies where the privacy-preserving linking of sensitive databases is crucial, and then discuss the advantages and limitations of existing algorithms and techniques to link sensitive databases. We discuss privacy techniques such as Bloom filter encoding, hashing, and secure multi-party computation, from the point of view of a linkage practitioner. We highlight those aspects that are important when selecting or implementing a privacy-preserving linkage technique within practical applications.
ResultsConceptually, linkage techniques can be evaluated across three main dimensions linkage quality, scalability to linking large or multiple databases, and the privacy protection provided by a technique. From a practical perspective, however, several other dimensions are crucial, including the availability of software or ease of implementation, technical knowledge available in an organisation, and the suitability of techniques for a given linkage scenario. Our analysis of a diverse range of linkage techniques has shown that currently no technique provides an adequate solution along all conceptual as well as all practical dimensions.
ConclusionsMore research is required to develop novel techniques that facilitate the privacy-preserving linkage of large sensitive databases across organisations; including new encoding methods and cryptanalysis attacks (where until now most attacks have neglected the attack vectors that likely occur in practice), and novel evaluation measures to assess the privacy provided by linkage techniques. We encourage practitioners to be aware of the identified limitations – as well as the opportunities – of existing privacy-preserving linkage techniques and carefully assess the technical and organisational requirements of such techniques within their institution.
Title: Linking Sensitive Data – Applications, Techniques, and Challenges
Description:
IntroductionThe linking of sensitive databases containing personal identifying information across organisations is an increasingly important task in application domains ranging from health and social science research to national censuses.
Various techniques have been developed to facilitate the linking of sensitive databases while at the same time preserving the privacy of individuals represented in these databases.
Objectives and approachWe present several case studies where the privacy-preserving linking of sensitive databases is crucial, and then discuss the advantages and limitations of existing algorithms and techniques to link sensitive databases.
We discuss privacy techniques such as Bloom filter encoding, hashing, and secure multi-party computation, from the point of view of a linkage practitioner.
We highlight those aspects that are important when selecting or implementing a privacy-preserving linkage technique within practical applications.
ResultsConceptually, linkage techniques can be evaluated across three main dimensions linkage quality, scalability to linking large or multiple databases, and the privacy protection provided by a technique.
From a practical perspective, however, several other dimensions are crucial, including the availability of software or ease of implementation, technical knowledge available in an organisation, and the suitability of techniques for a given linkage scenario.
Our analysis of a diverse range of linkage techniques has shown that currently no technique provides an adequate solution along all conceptual as well as all practical dimensions.
ConclusionsMore research is required to develop novel techniques that facilitate the privacy-preserving linkage of large sensitive databases across organisations; including new encoding methods and cryptanalysis attacks (where until now most attacks have neglected the attack vectors that likely occur in practice), and novel evaluation measures to assess the privacy provided by linkage techniques.
We encourage practitioners to be aware of the identified limitations – as well as the opportunities – of existing privacy-preserving linkage techniques and carefully assess the technical and organisational requirements of such techniques within their institution.
Related Results
A Study on the Difference in Aging Characteristics of Sensitive and Non‐Sensitive Skin
A Study on the Difference in Aging Characteristics of Sensitive and Non‐Sensitive Skin
ABSTRACTBackgroundAccording to Euromonitor and T Mall data statistics from 2017 to 2022, the Chinese market for sensitive skin (SS) skincare is growing by 20% every year, and anti‐...
Rodnoosjetljiv jezik na primjeru njemačkih časopisa Brigitte i Der Spiegel
Rodnoosjetljiv jezik na primjeru njemačkih časopisa Brigitte i Der Spiegel
On the basis of the comparative analysis of texts of the German biweekly magazine Brigitte and the weekly magazine Der Spiegel and under the presumption that gender-sensitive langu...
Dynamic distributed KCi‐slice data publishing model with multiple sensitive attributes
Dynamic distributed KCi‐slice data publishing model with multiple sensitive attributes
SUMMARYPrivacy‐preserving data publishing (PPDP) provides scope for performing various types of analytics by the researcher on the published data without revealing the individuals'...
Effect of the cross-linking agent on the cross-linking degree and electrical properties of cross-linked polyethylene
Effect of the cross-linking agent on the cross-linking degree and electrical properties of cross-linked polyethylene
Abstract
To study the effect of a cross-linking agent on the cross-linking degree and electrical properties of cross-linked polyethylene, different mass fractions of...
Test linking by pairwise comparisons of item difficulty
Test linking by pairwise comparisons of item difficulty
To obtain comparability between scores on different forms of tests and exams, one can use test equating or linking methods. Most equating and linking methods require either common ...
TGFβ-1 Induced Cross-Linking of the Extracellular Matrix of Primary Human Dermal Fibroblasts
TGFβ-1 Induced Cross-Linking of the Extracellular Matrix of Primary Human Dermal Fibroblasts
Excessive cross-linking is a major factor in the resistance to the remodelling of the extracellular matrix (ECM) during fibrotic progression. The role of TGFβ signalling in impairi...
HPC - Big Data Convergence : Managing theDiversity of Application Profiles on HPC Facilities
HPC - Big Data Convergence : Managing theDiversity of Application Profiles on HPC Facilities
Convergence HPC - Big Data : Gestion de différentes catégories d'applications sur des infrastructures HPC
Le calcul haute performance est un domaine scientifique da...
Evaluating Binary Encoding Techniques in The Presence of Missing Values in Privacy-Preserving Record Linkage
Evaluating Binary Encoding Techniques in The Presence of Missing Values in Privacy-Preserving Record Linkage
IntroductionApplications in domains ranging from healthcare to national security increasingly require records about individuals in sensitive databases to be linked in privacy-prese...

