2019
DOI: 10.48550/arxiv.1902.00717
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

De-Health: All Your Online Health Information Are Belong to Us

Abstract: In this paper, we study the privacy of online health data. We present a novel online health data De-Anonymization (DA) framework, named De-Health. De-Health consists of two phases: Top-K DA, which identifies a candidate set for each anonymized user, and refined DA, which de-anonymizes an anonymized user to a user in its candidate set. By employing both candidate selection and DA verification schemes, De-Health significantly reduces the DA space by several orders of magnitude while achieving promising DA accura… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 32 publications
0
1
0
Order By: Relevance
“…Health information breaches are on the rise in Canada (29)(30)(31), and AIs and other algorithms are contributing to a growing inability to protect health information (32)(33). Recent studies have highlighted how emerging computational strategies can identify individuals from information in health data repositories (34), with the result that information that has been anonymized and scrubbed of all identifiers can be reidentified (35)(36)(37)(38). This sort of re-identification can "effectively nullify scrubbing and compromise privacy."…”
Section: Privacy Concernsmentioning
confidence: 99%
“…Health information breaches are on the rise in Canada (29)(30)(31), and AIs and other algorithms are contributing to a growing inability to protect health information (32)(33). Recent studies have highlighted how emerging computational strategies can identify individuals from information in health data repositories (34), with the result that information that has been anonymized and scrubbed of all identifiers can be reidentified (35)(36)(37)(38). This sort of re-identification can "effectively nullify scrubbing and compromise privacy."…”
Section: Privacy Concernsmentioning
confidence: 99%