2019
DOI: 10.1186/s13174-018-0098-z
|View full text |Cite
|
Sign up to set email alerts
|

Pseudonymization risk analysis in distributed systems

Abstract: In an era of big data, online services are becoming increasingly data-centric; they collect, process, analyze and anonymously disclose growing amounts of personal data in the form of pseudonymized data sets. It is crucial that such systems are engineered to both protect individual user (data subject) privacy and give back control of personal data to the user. In terms of pseudonymized data this means that unwanted individuals should not be able to deduce sensitive information about the user. However, the pleth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(4 citation statements)
references
References 22 publications
0
3
0
1
Order By: Relevance
“…As a graphic example, consider the use of risk analysis in one of the leading regional enterprises of Kursk city and Kursk region -JSC the Institute of Ecological Safety (INSTEB). For more effective work, a preliminary self-assessment of JSC INSTEB was carried out using SWOT analysis (Neumann, Grace, Burns, & Surridge, 2019), which resulted in the identification of positive factors and threats to the internal and external environment, as well as the organization potential. In order to provide a more comprehensive presentation of information, we will reflect the results of the conducted research and present the risk analysis in details.…”
Section: Resultsmentioning
confidence: 99%
“…As a graphic example, consider the use of risk analysis in one of the leading regional enterprises of Kursk city and Kursk region -JSC the Institute of Ecological Safety (INSTEB). For more effective work, a preliminary self-assessment of JSC INSTEB was carried out using SWOT analysis (Neumann, Grace, Burns, & Surridge, 2019), which resulted in the identification of positive factors and threats to the internal and external environment, as well as the organization potential. In order to provide a more comprehensive presentation of information, we will reflect the results of the conducted research and present the risk analysis in details.…”
Section: Resultsmentioning
confidence: 99%
“…Finally, pseudonymization is a process in which there is a replacement of direct and indirect identifiers by coded identifiers that do not allow their interpretation outside the context in which they are used (Starchon and Pikulik, 2019). As Neumann et al (2019) state, pseudonymization contributes to increase data security and may decrease the data caused by possible leaks. This advantage was also mentioned by CS1 as pseudonymized data and their encryption processes are kept separate.…”
Section: Discussionmentioning
confidence: 99%
“…El cifrado con clave secreta es una técnica aplicada para el reconocimiento de información usando contraseñas de seguridad que permite descifrar valores o datos acerca de un usuario, su eficiencia se relaciona con el compromiso del personal autorizado en proteger los datos y almacenarlos en entornos seguros (Neumann et al, 2019).…”
Section: Secretaunclassified