2019
DOI: 10.23889/ijpds.v4i1.1094
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preserving linkage using multiple dynamic match keys

Abstract: IntroductionAvailable and practical methods for privacy preserving linkage have shortcomings: methods utilising anonymous linkage codes provide limited accuracy while methods based on Bloom filters have proven vulnerable to frequency-based attacks. ObjectivesIn this paper, we present and evaluate a novel protocol that aims to meld both the accuracy of the Bloom filter method with the privacy achievable through the anonymous linkage code methodology. MethodsThe protocol involves creating multiple ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

4
3

Authors

Journals

citations
Cited by 11 publications
(35 citation statements)
references
References 26 publications
0
35
0
Order By: Relevance
“…As a result, further modifications to Bloom filter encodings have been suggested [ 16 , 17 ]. Work in this area is ongoing, although it should be noted that these modifications have an effect on linkage quality, with record-level Bloom filters unable to achieve as high linkage quality as found with field/key-level Bloom filters [ 7 ].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…As a result, further modifications to Bloom filter encodings have been suggested [ 16 , 17 ]. Work in this area is ongoing, although it should be noted that these modifications have an effect on linkage quality, with record-level Bloom filters unable to achieve as high linkage quality as found with field/key-level Bloom filters [ 7 ].…”
Section: Discussionmentioning
confidence: 99%
“…The data was encoded for privacy preserving linkage using field-based Bloom filters; each identifier was encoded into a separate Bloom filter, with a standard probabilistic record linkage method used on these encoded identifiers. This approach has been described previously in the literature [ 3 ]; previous studies suggest it provides higher linkage quality than other privacy preserving methods [ 7 ].…”
Section: Methodsmentioning
confidence: 99%
“…The use of combinations of QID values (called linkage keys) is commonly used for deterministic linkage [6]. A single attribute combination (such as SLK-581 [23]) or multiple attribute combinations (such as p-signatures [34]), which can improve the likelihood of identifying matches [29], can be used to generate linkage keys to identify matches. However, linkage keys cannot tolerate differences in QID values, nor can they handle missing values or use additional information such as relationships between records [23,29,34].…”
Section: Related Workmentioning
confidence: 99%
“…We now briefly describe the main steps of multiple dynamic match-key encoding as proposed by Randall et al [5]. Common notations used throughout the paper are shown in Table 1.…”
Section: Multiple Dynamic Match-key Approachmentioning
confidence: 99%
“…The multiple dynamic match-key approach [5] is a recently proposed method for PPRL which aims to provide privacy protection against frequency attacks, while achieving high linkage quality. As we describe next, the main idea of this approach is to generate distinct hash-codes (called match-key values) using attribute value combinations (called match-keys) and compare these match-key values across databases to identify matching pairs of records.…”
Section: Introductionmentioning
confidence: 99%