2020
DOI: 10.23889/ijpds.v5i1.1345
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Attack on Multiple Dynamic Match-key based Privacy-Preserving Record Linkage

Abstract: Introduction Over the last decade, the demand for linking records about people across databases has increased in various domains. Privacy challenges associated with linking sensitive information led to the development of privacy-preserving record linkage techniques. The multiple dynamic match-key encoding approach recently proposed by Randall et al. (IJPDS, 2019) is such a technique aimed at providing sufficient privacy for linkage applications while obtaining high linkage quality. However, the use of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…It should be noted that while we performed an assessment of data quality, we did not conduct a separate privacy analysis of the encoded databases. Prior to a full implementation of PPRL at NCHS, a privacy risk-reidentification analysis would need to be conducted as well [24][25][26]. This would enable us to identify any potential known risks and assess if there are any mitigation strategies that could be implemented to maintain the protection of Nevertheless, the data quality results of this case study are encouraging.…”
Section: Discussionmentioning
confidence: 91%
“…It should be noted that while we performed an assessment of data quality, we did not conduct a separate privacy analysis of the encoded databases. Prior to a full implementation of PPRL at NCHS, a privacy risk-reidentification analysis would need to be conducted as well [24][25][26]. This would enable us to identify any potential known risks and assess if there are any mitigation strategies that could be implemented to maintain the protection of Nevertheless, the data quality results of this case study are encouraging.…”
Section: Discussionmentioning
confidence: 91%
“…Another key consideration is the security and privacy offered by different linkage methods. While Bloom filter and multiple match key encoding are more efficient methods of linking, there may be some trade-offs between data linkage quality and vulnerability to privacy attacks [32,[34][35][36]. Homomorphic encryption algorithms offer exceptional security, and the proposed methodology delivers a highly accurate data linkage, with the trade-off instead being computational resources.…”
Section: Discussionmentioning
confidence: 99%
“…To quantify the similarity of the distribution of a set of autoencoder encodings compared to a normal distribution N (0, 1), we use the histogram intersection measure [38,45] 1 . For each of the d dimensions, we generate a histogram he of the encodings using b bins of equal width and similarly generate a histogram hn for a normal distribution with the same width and the same number of bins and data points as for the number of encodings.…”
Section: Discussion Of Privacy Aspectsmentioning
confidence: 99%