Back to Search Start Over

A SURVEY ON DATA DE-IDENTIFICATION TO PROTECT PERSONAL INFORMATION.

Authors :
Jain, Ruby Bhuvan
Puri, Manimala
Jain, Umesh
Source :
International Conference on Ongoing Research in Management & IT; 2018, p496-503, 8p
Publication Year :
2018

Abstract

In this digital information era, the data is an important asset of the organization so the security of the data is a vital role in the industry. De-identification is most commonly undertaken to protect the privacy of individuals. It aims to allow data to be used by others without the possibility of individuals being identified. Several U.S laws, regulations and policies specify that data should be de-identified prior to sharing [4]. De-identification is not a single technique, but a collection of approaches, algorithms, and tools that can be applied to different kinds of data with differing levels of effectiveness. This research paper provides an overview of de-identification issues and terminology. It summarizes significant publications to date involving de-identification and re-identification. Paper also covers importance and utility of data deidentification, De-Identification Data Flow Model and relation between De-Identification and Masking. Authors do not make recommendations regarding the appropriateness of de-identification or specific de-identification algorithms. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
23200065
Database :
Complementary Index
Journal :
International Conference on Ongoing Research in Management & IT
Publication Type :
Conference
Accession number :
128553101