Back to Search
Start Over
A SURVEY ON DATA DE-IDENTIFICATION TO PROTECT PERSONAL INFORMATION.
- Source :
- International Conference on Ongoing Research in Management & IT; 2018, p496-503, 8p
- Publication Year :
- 2018
-
Abstract
- In this digital information era, the data is an important asset of the organization so the security of the data is a vital role in the industry. De-identification is most commonly undertaken to protect the privacy of individuals. It aims to allow data to be used by others without the possibility of individuals being identified. Several U.S laws, regulations and policies specify that data should be de-identified prior to sharing [4]. De-identification is not a single technique, but a collection of approaches, algorithms, and tools that can be applied to different kinds of data with differing levels of effectiveness. This research paper provides an overview of de-identification issues and terminology. It summarizes significant publications to date involving de-identification and re-identification. Paper also covers importance and utility of data deidentification, De-Identification Data Flow Model and relation between De-Identification and Masking. Authors do not make recommendations regarding the appropriateness of de-identification or specific de-identification algorithms. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 23200065
- Database :
- Complementary Index
- Journal :
- International Conference on Ongoing Research in Management & IT
- Publication Type :
- Conference
- Accession number :
- 128553101