Format

Send to

Choose Destination

See 1 citation found by title matching your search:

CODASPY. 2013;2013:59-70.

Efficient Discovery of De-identification Policies Through a Risk-Utility Frontier.

Author information

1
EECS Dept., Vanderbilt University, Nashville, TN, USA.
2
Biomedical Informatics Dept., Vanderbilt University, Nashville, TN, USA.
3
Computer Science Dept., University of South Australia, Mawson Lakes, SA, Australia.

Abstract

Modern information technologies enable organizations to capture large quantities of person-specific data while providing routine services. Many organizations hope, or are legally required, to share such data for secondary purposes (e.g., validation of research findings) in a de-identified manner. In previous work, it was shown de-identification policy alternatives could be modeled on a lattice, which could be searched for policies that met a prespecified risk threshold (e.g., likelihood of re-identification). However, the search was limited in several ways. First, its definition of utility was syntactic - based on the level of the lattice - and not semantic - based on the actual changes induced in the resulting data. Second, the threshold may not be known in advance. The goal of this work is to build the optimal set of policies that trade-off between privacy risk (R) and utility (U), which we refer to as a R-U frontier. To model this problem, we introduce a semantic definition of utility, based on information theory, that is compatible with the lattice representation of policies. To solve the problem, we initially build a set of policies that define a frontier. We then use a probability-guided heuristic to search the lattice for policies likely to update the frontier. To demonstrate the effectiveness of our approach, we perform an empirical analysis with the Adult dataset of the UCI Machine Learning Repository. We show that our approach can construct a frontier closer to optimal than competitive approaches by searching a smaller number of policies. In addition, we show that a frequently followed de-identification policy (i.e., the Safe Harbor standard of the HIPAA Privacy Rule) is suboptimal in comparison to the frontier discovered by our approach.

KEYWORDS:

De-identification; Experimentation; Management; Optimization; Policy; Privacy; Security

Supplemental Content

Full text links

Icon for PubMed Central
Loading ...
Support Center