Access the full text.
Sign up today, get DeepDyve free for 14 days.
Department of Health and Human Services (2000)
The health insurance portability and accountability act of 1996
E. Bertino (2016)
Introduction to Data Science and EngineeringData Science and Engineering, 1
Bee-Chung Chen, Daniel Kifer, K. LeFevre, Ashwin Machanavajjhala (2009)
Privacy-Preserving Data PublishingFound. Trends Databases, 2
Mercedes Rodriguez-Garcia, Montserrat Batet, David Sánchez (2015)
Semantic Noise: Privacy-Protection of Nominal Microdata through Uncorrelated Noise Addition2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI)
S. Meystre, J. Friedlin, B. South, Shuying Shen, M. Samore (2010)
Automatic de-identification of textual documents in the electronic health record: a review of recent researchBMC Medical Research Methodology, 10
I. Pigeot, S. Henauw, R. Foraita, I. Jahn, W. Ahrens (2010)
Primary Prevention from the Epidemiology Perspective: Three Examples from the PracticeBMC Medical Research Methodology, 10
David Sánchez, Montserrat Batet, Alexandre Viejo (2014)
Utility-preserving sanitization of semantically correlated terms in textual documentsInf. Sci., 279
B. Anandan, Chris Clifton (2011)
Significance of Term Relationships on Anonymization2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 3
Andreas Holzinger (2016)
Interactive machine learning for health informatics: when do we need the human-in-the-loop?Brain Informatics, 3
A. Hundepool, J. Domingo-Ferrer, L. Franconi, Sarah Giessing, Eric Nordholt, K. Spicer, P. Wolf (2012)
Statistical Disclosure Control
Rudi Cilibrasi, P. Vitányi (2004)
The Google Similarity DistanceIEEE Transactions on Knowledge and Data Engineering, 19
N. Terry, L. Francis (2007)
Ensuring the Privacy and Confidentiality of Electronic Health RecordsSocial Science Research Network
Amir Harel, A. Shabtai, L. Rokach, Y. Elovici
Ieee Transactions on Dependable and Secure Computing M-score: a Misuseability Weight Measure
Peter Kieseberg, Heidelinde Hobel, S. Schrittwieser, E. Weippl, Andreas Holzinger (2014)
Protecting Anonymity in Data-Driven Biomedical Science
C. Dwork (2006)
Differential Privacy
P. Samarati, L. Sweeney (1998)
Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression
David Sánchez, J. Domingo-Ferrer, Sergio Martínez, Jordi Soria-Comas (2015)
Utility-preserving differentially private data releases via individual ranking microaggregationArXiv, abs/1512.02897
E. Bier, Richard Chow, P. Golle, Tracy King, Jessica Staddon (2009)
The Rules of Redaction: Identify, Protect, Review (and Repeat)IEEE Security & Privacy, 7
A. Hundepool, J. Domingo-Ferrer, L. Franconi, Sarah Giessing, Eric Nordholt, K. Spicer, P. Wolf (2012)
Statistical Disclosure Control: Hundepool/Statistical Disclosure Control
David Sánchez, Montserrat Batet (2014)
C‐sanitized: A privacy model for document redaction and sanitizationJournal of the Association for Information Science and Technology, 67
Data Science and Engineering, 1
J. Domingo-Ferrer, David Sánchez, Jordi Soria-Comas (2016)
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections
Richard Chow, P. Golle, Jessica Staddon (2008)
Detecting privacy leaks using corpus-based association rules
IEEE Transactions on Dependable and Secure Computing, 9
J. Domingo-Ferrer, F. Sebé, Jordi Castellà-Roca (2004)
On the Security of Noise Addition for Privacy in Statistical Databases
B. Fung, Ke Wang, Rui Chen, Philip Yu (2010)
Privacy-preserving data publishing: A survey of recent developmentsACM Comput. Surv., 42
Ji-Won Byun, Tiancheng Li, E. Bertino, Ninghui Li, Yonglak Sohn (2009)
Privacy-preserving incremental data disseminationJ. Comput. Secur., 17
University of Illinois Law Review, 2007
Jianneng Cao, B. Carminati, E. Ferrari, K. Tan (2011)
CASTLE: Continuously Anonymizing Data StreamsIEEE Transactions on Dependable and Secure Computing, 8
Peter Kieseberg, Bernd Malle, P. Frühwirt, E. Weippl, Andreas Holzinger (2016)
A tamper-proof audit and control system for the doctor in the loopBrain Informatics, 3
PurposeThe purpose of this paper is to propose a privacy-preserving paradigm for open data sharing based on the following foundations: subjects have unique privacy requirements; personal data are usually published incrementally in different sources; and privacy has a time-dependent element.Design/methodology/approachThis study first discusses the privacy threats related to open data sharing. Next, these threats are tackled by proposing a new privacy-preserving paradigm. The main challenges related to the enforcement of the paradigm are discussed, and some suitable solutions are identified.FindingsClassic privacy-preserving mechanisms are ineffective against observers constantly monitoring and aggregating pieces of personal data released through the internet. Moreover, these methods do not consider individual privacy needs.Research limitations/implicationsThis study characterizes the challenges to the tackled by a new paradigm and identifies some promising works, but further research proposing specific technical solutions is suggested.Practical implicationsThis work provides a natural solution to dynamic and heterogeneous open data sharing scenarios that require user-controlled personalized privacy protection.Social implicationsThere is an increasing social understanding of the privacy threats that the uncontrolled collection and exploitation of personal data may produce. The new paradigm allows subjects to be aware of the risks inherent to their data and to control their release.Originality/valueContrary to classic data protection mechanisms, the new proposal centers privacy protection on the individuals, and considers the privacy risks through the whole life cycle of the data release.
Online Information Review – Emerald Publishing
Published: Jun 12, 2017
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.