Anonymization Procedures for Tabular Data: An Explanatory Technical and Legal Synthesis
-
Published:2023-09-01
Issue:9
Volume:14
Page:487
-
ISSN:2078-2489
-
Container-title:Information
-
language:en
-
Short-container-title:Information
Author:
Aufschläger Robert1ORCID, Folz Jakob1ORCID, März Elena2ORCID, Guggumos Johann2ORCID, Heigl Michael1ORCID, Buchner Benedikt2ORCID, Schramm Martin1ORCID
Affiliation:
1. Technology Campus Vilshofen, Deggendorf Institute of Technology, 94474 Vilshofen an der Donau, Germany 2. Faculty of Law, University of Augsburg, 86159 Augsburg, Germany
Abstract
In the European Union, Data Controllers and Data Processors, who work with personal data, have to comply with the General Data Protection Regulation and other applicable laws. This affects the storing and processing of personal data. But some data processing in data mining or statistical analyses does not require any personal reference to the data. Thus, personal context can be removed. For these use cases, to comply with applicable laws, any existing personal information has to be removed by applying the so-called anonymization. However, anonymization should maintain data utility. Therefore, the concept of anonymization is a double-edged sword with an intrinsic trade-off: privacy enforcement vs. utility preservation. The former might not be entirely guaranteed when anonymized data are published as Open Data. In theory and practice, there exist diverse approaches to conduct and score anonymization. This explanatory synthesis discusses the technical perspectives on the anonymization of tabular data with a special emphasis on the European Union’s legal base. The studied methods for conducting anonymization, and scoring the anonymization procedure and the resulting anonymity are explained in unifying terminology. The examined methods and scores cover both categorical and numerical data. The examined scores involve data utility, information preservation, and privacy models. In practice-relevant examples, methods and scores are experimentally tested on records from the UCI Machine Learning Repository’s “Census Income (Adult)” dataset.
Subject
Information Systems
Reference74 articles.
1. The GDPR and unstructured data: Is anonymization possible?;Weitzenboeck;Int. Data Priv. Law,2022 2. Samarati, P., and Sweeney, L. (1998, January 3–6). Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA. 3. K-Anonymity: A Model for Protecting Privacy;Sweeney;Int. J. Uncertain. Fuzziness-Knowl.-Based Syst.,2002 4. Ford, E., Tyler, R., Johnston, N., Spencer-Hughes, V., Evans, G., Elsom, J., Madzvamuse, A., Clay, J., Gilchrist, K., and Rees-Roberts, M. (2023). Challenges Encountered and Lessons Learned when Using a Novel Anonymised Linked Dataset of Health and Social Care Records for Public Health Intelligence: The Sussex Integrated Dataset. Information, 14. 5. Becker, B., and Kohavi, R. (2023, May 15). Adult. UCI Machine Learning Repository. Available online: https://archive-beta.ics.uci.edu/dataset/2/adult.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|