Privacy-Preserving String Comparisons in Record Linkage Systems: A Review

作者: Stanley Trepetin

DOI: 10.1080/19393550802492503

关键词: IdentifierLinkage (mechanical)Computer securityInformation retrievalEvent (computing)Record linkageIdeal (set theory)Computer scienceFace (geometry)String (computer science)Data set (IBM mainframe)

摘要: We face a growing need to be able perform linkage among data set records connect about the same individual, organization or event so that further analysis becomes possible. At time, we also do better job of protecting privacy individuals identified by records. Therefore, it would ideal if could effectively performed based not on actual but some anonymous form without diminishing ability link whose identifiers are only “close” each other, equal, because typical recording errors. This paper reviews existing proposals for how such anonymized string comparisons might accomplished, demonstrates methods have various operational deficiencies. It therefore argues new, more capable needed.

参考文章(14)
Shaun J. Grannis, J. Marc Overhage, Clement J. McDonald, Real world performance of approximate string comparators for use in patient matching Studies in health technology and informatics. ,vol. 107, pp. 43- 47 ,(2004) , 10.3233/978-1-60750-949-3-43
L. M. Olson, J. M. Dean, L. J. Cook, Probabilistic record linkage: relationships between file sizes, identifiers and match weights. Methods of Information in Medicine. ,vol. 40, pp. 196- 203 ,(2001) , 10.1055/S-0038-1634155
Peter Szolovits, Stanley Trepetin, Privacy in context: the costs and benefits of a new deidentification method Privacy in context: the costs and benefits of a new deidentification method. pp. 1- 1 ,(2006)
Tim Churches, Peter Christen, Some methods for blindfolded record linkage. BMC Medical Informatics and Decision Making. ,vol. 4, pp. 9- 9 ,(2004) , 10.1186/1472-6947-4-9
Wenliang Du, Mikhail J. Atallah, Protocols for Secure Remote Database Access with Approximate Matching computer and communications security. pp. 87- 111 ,(2001) , 10.1007/978-1-4615-1467-1_6
Min-Shiang Hwang, Wei-Pang Yang, A two-phase encryption scheme for enhancing database security Journal of Systems and Software. ,vol. 31, pp. 257- 265 ,(1995) , 10.1016/0164-1212(94)00102-2
Hermann Brenner, Irene Schmidtmann, Christa Stegmaier, Effects of record linkage errors on registry-based follow-up studies. Statistics in Medicine. ,vol. 16, pp. 2633- 2643 ,(1997) , 10.1002/(SICI)1097-0258(19971215)16:23<2633::AID-SIM702>3.0.CO;2-1
George I. Davida, David L. Wells, John B. Kam, A database encryption system with subkeys ACM Transactions on Database Systems. ,vol. 6, pp. 312- 328 ,(1981) , 10.1145/319566.319580
Frank L. Greitzer, Andrew P. Moore, Dawn M. Cappelli, Dee H. Andrews, Lynn A. Carroll, Thomas D. Hull, Combating the Insider Cyber Threat ieee symposium on security and privacy. ,vol. 6, pp. 61- 64 ,(2008) , 10.1109/MSP.2008.8
Michael N. Jones, D. J. K. Mewhort, Case-sensitive letter and bigram frequency counts from large-scale English corpora. Behavior Research Methods Instruments & Computers. ,vol. 36, pp. 388- 396 ,(2004) , 10.3758/BF03195586