2008 IEEE 24th International Conference on Data Engineering 2008
DOI: 10.1109/icde.2008.4497458
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Approach to Private Record Linkage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
70
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 83 publications
(70 citation statements)
references
References 23 publications
0
70
0
Order By: Relevance
“…Inan et al claim that cryptographic operations are often slow for use in practical record linkage of large data sets. Towards this end, they propose separating data records into small subsets and then perform linkage only within a subset using homomorphic encryption [22,23]. While encryption based techniques are known to provide stronger security and privacy guarantees, earlier works have disregarded its practical significance (or applied it in a limited manner) on grounds of heavy computation and communication complexity.…”
Section: Related Workmentioning
confidence: 99%
“…Inan et al claim that cryptographic operations are often slow for use in practical record linkage of large data sets. Towards this end, they propose separating data records into small subsets and then perform linkage only within a subset using homomorphic encryption [22,23]. While encryption based techniques are known to provide stronger security and privacy guarantees, earlier works have disregarded its practical significance (or applied it in a limited manner) on grounds of heavy computation and communication complexity.…”
Section: Related Workmentioning
confidence: 99%
“…Al-Lawati et al [7] proposed a secure three-party blocking protocol in 2005 which achieves highperformance PPRL by using secure hash encoding for computing the TF-IDF distance measure in a secure fashion. Inan et al [4] proposed a hybrid approach that combines generalization and cryptographic techniques to solve the PPRL problem in 2008. An approach to PPRL was proposed by Karakasidis et al [8] in 2011 a secure blocking based on phonetic encoding algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…As to the approaches between two databases: In [3], the two-party private blocking (TPPB) method avoids the use of a third party and cryptographic techniques and instead trades off privacy for blocking quality. In [4], Inan et al suggest creating forming generalized hierarchies (FGH) for reducing the cost of PPRL. However, the forming hierarchies may cause the blocks over-generalization and reduce the accuracy of blocking.…”
Section: Introductionmentioning
confidence: 99%
“…One approach is given in [20]. In order to make the blocking step efficient the proposal is to first k-anonymize [35] the database rows, then share them.…”
Section: Blockingmentioning
confidence: 99%