Digital Library[ Search Result ]
Privacy-Preserving Data Publishing: Research on Trends in De-identification Techniques for Structured and Unstructured Data
Yongki Hong, Gihyuk Ko, Heedong Yang, Seung Hwan Ryu
http://doi.org/10.5626/JOK.2023.50.11.1008
The advent of AI has seen an increased demand for data for AI development, leading to a proliferation of data sharing and distribution. However, there is also the risk of personal information disclosure during data utilization and therefore, it is necessary to undergo a process of de-identification before distributing the data. Privacy-Preserving Data Publishing (PPDP) is a series of procedures aimed at adhering to specified privacy guidelines while maximizing the utility of data. It has been continuously researched and developed. Since the early 2000s, techniques for de-identifying structured data (e.g., tables or relational data) were studied. As a significant portion of the collected data is now unstructured data and its proportion is increasing, research on de-identification techniques for unstructured data is also actively being conducted. In this paper, we aim to introduce the existing de-identification techniques for structured data and discuss recent trends in de-identification techniques for unstructured data.
Models for Privacy-preserving Data Publishing : A Survey
Jongseon Kim, Kijung Jung, Hyukki Lee, Soohyung Kim, Jong Wook Kim, Yon Dohn Chung
In recent years, data are actively exploited in various fields. Hence, there is a strong demand for sharing and publishing data. However, sensitive information regarding people can breach the privacy of an individual. To publish data while protecting an individual’s privacy with minimal information distortion, the privacy- preserving data publishing(PPDP) has been explored. PPDP assumes various attacker models and has been developed according to privacy models which are principles to protect against privacy breaching attacks. In this paper, we first present the concept of privacy breaching attacks. Subsequently, we classify the privacy models according to the privacy breaching attacks. We further clarify the differences and requirements of each privacy model.
Re-anonymization Technique for Dynamic Data Using Decision Tree Based Machine Learning
Young Ki Kim, Choong Seon Hong
In recent years, new technologies such as Internet of Things, Cloud Computing and Big Data are being widely used. And the type and amount of data is dramatically increasing. This makes security an important issue. In terms of leakage of sensitive personal information. In order to protect confidential information, a method called anonymization is used to remove personal identification elements or to substitute the data to some symbols before distributing and sharing the data. However, the existing method performs anonymization by generalizing the level of quasi-identifier hierarchical. It requires a higher level of generalization in case where k-anonymity is not satisfied since records in data table are either added or removed. Loss of information is inevitable from the process, which is one of the factors hindering the utility of data. In this paper, we propose a novel anonymization technique using decision tree based machine learning to improve the utility of data by minimizing the loss of information.
A Study on Service-based Secure Anonymization for Data Utility Enhancement
Chikwang Hwang, Jongwon Choe, Choong Seon Hong
Personal information includes information about a living human individual. It is the information identifiable through name, resident registration number, and image, etc. Personal information which is collected by institutions can be wrongfully used, because it contains confidential information of an information object. In order to prevent this, a method is used to remove personal identification elements before distributing and sharing the data. However, even when the identifier such as the name and the resident registration number is removed or changed, personal information can be exposed in the case of a linking attack. This paper proposes a new anonymization technique to enhance data utility. To achieve this, attributes that are utilized in service tend to anonymize at a low level. In addition, the anonymization technique of the proposal can provide two or more anonymized data tables from one original data table without concern about a linking attack. We also verify our proposal by using the cooperative game theory.
Search

Journal of KIISE
- ISSN : 2383-630X(Print)
- ISSN : 2383-6296(Electronic)
- KCI Accredited Journal
Editorial Office
- Tel. +82-2-588-9240
- Fax. +82-2-521-1352
- E-mail. chwoo@kiise.or.kr