A Comparative Study of Privacy Protection Algorithms Applied to Databases in the Health Area

  • Francimaria Nascimento Federal University of Rio Grande do Norte
  • Karliane Vale Federal University of Rio Grande do Norte
  • Flavius Gorgônio Federal University of Rio Grande do Norte

Abstract


The growing increase in the volume of data which is collected, stored and shared by health institutions creates benefits for the process of decision making based on the knowledge obtained from applying data analysis and data mining techniques, aiming to achieve relevant information. Despite the obtained benefits, sharing this specific kind of data in its original raw format may compromise patients’ privacy. In an attempt to validate solutions for this problem, this article considers and compares data anonymization and perturbation techniques, assessing their efficiency in providing privacy and safety of shared data, more specifically, when applied to databases of the health field.

Keywords: Privacy Protection, Health, Protection Algorithms, Data Disruption, Privacy, Security

References

Agrawal, R. and Srikant, R. (2000). Privacy-preserving data mining. In ACM Sigmod Record, volume 29, pages 439–450, California. ACM.

Byun, J., Kamara, A., Bertino, E., and Li, N. (2007). Efficient k-anonymization using clustering techniques. In 12th Int Con Database Syst Adv App, pages 188–200, Berlin.

Emam, K. (2006). Data anonymization practices in clinical research: a descriptive study. CHEO Research Institute, Ottawa.

Kedar, S., Dhawale, S., Vaibhav, W., Kadam, P., Wani, S., and Ingale, P. (2013). Privacy preserving data mining. Advanced Res. in Comp. and Com. Eng., 2(4):1677–1680.

Kumari, A., Rao, R., and Suman, M. (2012). Vector quantization for privacy preserving clustering in data mining. Advance Computing, 3(6):69–74.

Li, N., Li, T., and Venkatasubramaniam, S. (2007). t-Closeness. In 23rd International Conference on Data Engineering, 2007, pages 106–115, Istambul. IEEE.

Lidell, Y. and Pinkas, B. (2000). Privacy-preserving data mining. In International Cryptology Conference on Advances in Cryptology, 1880, pages 36–54, California. Springer.

Liu, L., Yang, K., Hu, L., and Li, L. (2012). Using noise addition method based on pre-mining to protect healthcare privacy. Journal Control Eng. App. Inf., 14(2):58–64.

Machanavajjhala, A., Kifer, D., Gehrke, J., and Venkitasubramaniam, M. (2007). l-diversity: Privacy beyond k-anonymity. ACM Transactions on KDD, 1(3):52.

Oliveira, S. and Zaïane, O. (2007). A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration. Com&Sec, 26(1):81–93.

Oliveira, S. and Zaïane, O. (2010). Privacy Preserving Clustering by Data Transformation. Journal of Information and Data Management, 1(1):37–51.

Sinha, B. and Kumar, J. (2010). Privacy Preserving Clustering In Data Mining. PhD thesis, National Institute of Technology Rourkela, Rourkela.

Xiao, X. and Tao, Y. (2006). Anatomy: Simple and effective privacy preservation. In Proc. of the 32nd Int. Conf. on Very Large Data Bases, pages 139–150, Hong Kong.
Published
2018-08-25
NASCIMENTO, Francimaria; VALE, Karliane; GORGÔNIO, Flavius. A Comparative Study of Privacy Protection Algorithms Applied to Databases in the Health Area. In: BRAZILIAN SYMPOSIUM ON DATABASES (SBBD), 33. , 2018, Rio de Janeiro. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2018 . p. 301-306. ISSN 2763-8979. DOI: https://doi.org/10.5753/sbbd.2018.22247.