2016
DOI: 10.1016/j.ijinfomgt.2016.08.002
|View full text |Cite
|
Sign up to set email alerts
|

Re-identification attacks—A systematic literature review

Abstract: The publication of increasing amounts of anonymised open source data has resulted in a worryingly rising number of successful re-identification attacks. This has a number of privacy and security implications both on an individual and corporate level. This paper uses a Systematic Literature Review to investigate the depth and extent of this problem as reported in peer reviewed literature. Using a detailed protocol ,seven research portals were explored, 10,873 database entries were searched, from which a subset … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
44
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 61 publications
(44 citation statements)
references
References 37 publications
0
44
0
Order By: Relevance
“…(1) Identification attack: Identification attack identifies a user's name or identity-based on some public dataset [76]. It is also called re-identification [53,58] when anonymisation is reversed. Such kind of attack is illustrated in Fig.…”
Section: Attack and Threat Modelsmentioning
confidence: 99%
“…(1) Identification attack: Identification attack identifies a user's name or identity-based on some public dataset [76]. It is also called re-identification [53,58] when anonymisation is reversed. Such kind of attack is illustrated in Fig.…”
Section: Attack and Threat Modelsmentioning
confidence: 99%
“…• Linkage attacks: The last scenario assumes an attacker is able to link the privacy enhanced data with other sources of information that, in combination, reveal sensitive details bout the original data. These sources of information can represent parts of the biometric data not considered critical from a privacy perspective, prior knowledge, multiple instances of the same privacy-enhanced data, or external sources of information, for which a link with the privacy-enhanced data can be established [23], [74], [268], [269].…”
Section: Evaluating Robustnessmentioning
confidence: 99%
“…PISS emphasizes that all collected personal data should be immediately de-identified and stored separately from their profile data 9,10 . However, even after the de-identification, anonymized personal data still face re-identification risk and are vulnerable to linkage attacks launched by either honest but curious data collectors or malicious hackers 11,12 . Therefore, the re-identification risk of individual data not only reflects the privacy risk level of individuals but also supports regulators in formulating privacy protection policies.…”
Section: Introductionmentioning
confidence: 99%