2014
DOI: 10.1016/j.jbi.2014.03.015
|View full text |Cite
|
Sign up to set email alerts
|

A framework to preserve the privacy of electronic health data streams

Abstract: The anonymization of health data streams is important to protect these data against potential privacy breaches. A large number of research studies aiming at offering privacy in the context of data streams has been recently conducted. However, the techniques that have been proposed in these studies generate a significant delay during the anonymization process, since they concentrate on applying existing privacy models (e.g., k-anonymity and l-diversity) to batches of data extracted from data streams in a period… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0
1

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(33 citation statements)
references
References 12 publications
0
32
0
1
Order By: Relevance
“…In the counterfeiting approach, a record is attempted to be hidden within a group of records. By hiding each record within a group of fake records, we avoid the delay inherent to the previous approach Kim et al (2014). The main drawback is the overhead introduced by the addition of fake records.…”
Section: Data Stream Anonymisationmentioning
confidence: 99%
“…In the counterfeiting approach, a record is attempted to be hidden within a group of records. By hiding each record within a group of fake records, we avoid the delay inherent to the previous approach Kim et al (2014). The main drawback is the overhead introduced by the addition of fake records.…”
Section: Data Stream Anonymisationmentioning
confidence: 99%
“…He et al [14] proposed a graph-based anonymization algorithm to prevent equivalence attacks on incremental anonymized data. Noise addition [16,17] is the main idea of perturbation. In [15], a polynomial-time algorithm based on the (k, e)-anonymity model was designed to solve the problem of an incremental privacy breach.…”
Section: Of 18mentioning
confidence: 99%
“…Kim et al in [8] proposed a delay-free anonymization framework, to protect data against potential privacy breaches. Unlike existing work, l-diverse artificial sensitive data are generated and added to main sensitive data instead of quasiidentifier attribute be generalized.…”
Section: Related Workmentioning
confidence: 99%