The proper protection of personal information is Many countries have laws on these issues such as the increasingly becoming an important issue in an age where misuse Personal Information Protection and Electronic Documents of personal information and identity theft are widespread. At Act (PIPEDA) [4], and the Platform for Privacy Preferences times there is a need however for management or statistical Project (P3P) [5]. An overview of PIPEDA and its principles purposes based on personal information in aggregated form. The will be presented later in the paper in section 3. The P3P k-anonymization technique has been developed to de-associate system enables websites to express their privacy practices in a sensitive attributes and anonymise the information needed to a standard format that can be retrieved automatically and point where the identity and associated details cannot be interpreted easily by user agents. P3P user agents therefore reconstructed.~~~~1 trree asl y sragns.PPusraensterfr reconstructed. provide a mechanism where users can be informed of siteThe protection of personal information has manifested itself in practices (in both machine-and human-readable formats) and various forms, ranging from legislation, to policies such as P3P to automate decision-making based on these practices when and also information systems such as Hippocratic database.appropriate. This has the benefit that users need not read the Unfortunately, none of these provide support for statistical data privacy policies at every site they visit [5] and will be informed research and analysis. The traditional k-anonymity technique if there are changes. However, setting the rules does not proposes a solution to this problem, but determining which guarantee their diligent execution. What is much better is to information can be generalized and which information needs to concentrate on approaches that can actually monitor and be suppressed is potentially difficult to determine. enforce privacy protection at a technical level. Privacyenforcing technology aims at ensuring that privacy laws and In this paper we propose a new idea that integrates personal guidelines are actually applied to the data. Thus, an information ontology with the concept of k-anonymity [1], in information system based on these principles, is designed to order to overcome these problems. We demonstrate the idea with embed components that allow monitoring and ensuring a prototype in the context of healthcare data management, a compliance of the system to privacy rules, guidelines and sector in which maintaining the privacy of individual information conditions. is essential.One of the most frequently used approaches to ensure Keywords-K-anonymityt; Ontology; ; Data acces management privacy of released data is to modify the data by removing all information that can directly link data items to specific individuals.This technique is referred to as data anonymization. But removing the identity information from theIn an age of unprecedented storage, access and retrieval of relea...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.