2017
DOI: 10.1016/j.jisa.2017.01.002
|View full text |Cite
|
Sign up to set email alerts
|

Secure pseudonymisation for privacy-preserving probabilistic record linkage

Abstract: Record linkage is becoming an increasingly important tool in many areas of research -particularly medical research, where the relevant data often reside in more than one location. In the absence of a reliable and unique identifier probabilistic approaches to linkage are often employed. This linkage generally exploits the information contained in the fields that are common to a record pair. In classical record linkage the values in common fields are simply compared for equality. As values might contain typograp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 18 publications
0
16
0
Order By: Relevance
“…We show that our encoding technique is significantly more secure than popular Bloom filter encoding [8,13], which is known to be vulnerable to cryptanalysis attacks [2,6,14]. We evaluate our technique on large real databases, which validates that, compared to existing PPRL encodings [8,11], this technique can efficiently and accurately calculate similarities between encoded values while providing privacy against cryptanalysis attacks.…”
Section: Contributionmentioning
confidence: 61%
See 4 more Smart Citations
“…We show that our encoding technique is significantly more secure than popular Bloom filter encoding [8,13], which is known to be vulnerable to cryptanalysis attacks [2,6,14]. We evaluate our technique on large real databases, which validates that, compared to existing PPRL encodings [8,11], this technique can efficiently and accurately calculate similarities between encoded values while providing privacy against cryptanalysis attacks.…”
Section: Contributionmentioning
confidence: 61%
“…However, as we discuss in Sect. 5, this tabulation hash encoding approach [11] has significantly higher computational complexity compared to BF encoding. As a result, for encoding very large databases the practical use of this approach is questionable.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations