Developments and Applications of Data Deidentification Technology under Big Data
In this age characterized by rapid growth in the volume of data,data deidentification technologies have become crucial in facilitating the analysis of sensitive information.For instance,healthcare information must be processed through deidentification procedures before being passed to data analysis...
Gespeichert in:
Veröffentlicht in: | 电子科技学刊 2017-09, Vol.15 (3), p.231-239 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 239 |
---|---|
container_issue | 3 |
container_start_page | 231 |
container_title | 电子科技学刊 |
container_volume | 15 |
creator | Hung-Li Chen Yao-Tung Tsou Bo-Chen Tai Szu-Chuang Li Yen-Nun Huang Chia-Mu Yu Yu-Shian Chiu |
description | In this age characterized by rapid growth in the volume of data,data deidentification technologies have become crucial in facilitating the analysis of sensitive information.For instance,healthcare information must be processed through deidentification procedures before being passed to data analysis agencies in order to prevent any exposure of personal details that would violate privacy.As such,privacy protection issues associated with the release of data and data mining have become a popular field of study in the domain of big data.As a strict and verifiable definition of privacy,differential privacy has attracted noteworthy attention and widespread research in recent years.In this study,we analyze the advantages of differential privacy protection mechanisms in comparison to traditional deidentification data protection methods.Furthermore,we examine and analyze the basic theories of differential privacy and relevant studies regarding data release and data mining. |
doi_str_mv | 10.11989/JEST.1674-862X.60804064 |
format | Article |
fullrecord | <record><control><sourceid>wanfang_jour</sourceid><recordid>TN_cdi_wanfang_journals_zgdzkj_e201703005</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><wanfj_id>zgdzkj_e201703005</wanfj_id><sourcerecordid>zgdzkj_e201703005</sourcerecordid><originalsourceid>FETCH-LOGICAL-s1045-616296e6ac20912ecd97c870fb486720a7fb804e40328c2d1cab548ba3643d173</originalsourceid><addsrcrecordid>eNo9js9LwzAcxXNQcMz9D7l6aP3mR5P0ONepk4GCFbyVNElrZk3K2inur7fo8PTgvQ_vPYQwgZSQXOXXD-vnMiVC8kQJ-poKUMBB8DM0-zcv0GIYfA0ZYUIKSWfoqXCfrov9hwvjgHWweNn3nTd69DEMODa40KPGhfN2InxzSnDpzFuIXWy_8SFYt8c3vv1FL9F5o7vBLU46Ry-363J1n2wf7zar5TYZCPAsEUTQXDihDYWcUGdsLo2S0NRcTcdAy6ae_jsOjCpDLTG6zriqNROcWSLZHF399X7p0OjQVrt42IdpsTq29vi-qxwFIoEBZOwHhjFTyQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Developments and Applications of Data Deidentification Technology under Big Data</title><source>Alma/SFX Local Collection</source><creator>Hung-Li Chen ; Yao-Tung Tsou ; Bo-Chen Tai ; Szu-Chuang Li ; Yen-Nun Huang ; Chia-Mu Yu ; Yu-Shian Chiu</creator><creatorcontrib>Hung-Li Chen ; Yao-Tung Tsou ; Bo-Chen Tai ; Szu-Chuang Li ; Yen-Nun Huang ; Chia-Mu Yu ; Yu-Shian Chiu</creatorcontrib><description>In this age characterized by rapid growth in the volume of data,data deidentification technologies have become crucial in facilitating the analysis of sensitive information.For instance,healthcare information must be processed through deidentification procedures before being passed to data analysis agencies in order to prevent any exposure of personal details that would violate privacy.As such,privacy protection issues associated with the release of data and data mining have become a popular field of study in the domain of big data.As a strict and verifiable definition of privacy,differential privacy has attracted noteworthy attention and widespread research in recent years.In this study,we analyze the advantages of differential privacy protection mechanisms in comparison to traditional deidentification data protection methods.Furthermore,we examine and analyze the basic theories of differential privacy and relevant studies regarding data release and data mining.</description><identifier>ISSN: 1674-862X</identifier><identifier>DOI: 10.11989/JEST.1674-862X.60804064</identifier><language>eng</language><publisher>Department of Communications Engineering, Feng Chia University,Taichung 400%Research Center for Information Technology Innovation,Academia Sinica, Taipei 100%Department of Computer Science and Engineering, National Chung Hsing University%Data Analytics Technology & Applications,Institute for Information Industry, Taipei 100</publisher><ispartof>电子科技学刊, 2017-09, Vol.15 (3), p.231-239</ispartof><rights>Copyright © Wanfang Data Co. Ltd. All Rights Reserved.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://www.wanfangdata.com.cn/images/PeriodicalImages/zgdzkj-e/zgdzkj-e.jpg</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Hung-Li Chen</creatorcontrib><creatorcontrib>Yao-Tung Tsou</creatorcontrib><creatorcontrib>Bo-Chen Tai</creatorcontrib><creatorcontrib>Szu-Chuang Li</creatorcontrib><creatorcontrib>Yen-Nun Huang</creatorcontrib><creatorcontrib>Chia-Mu Yu</creatorcontrib><creatorcontrib>Yu-Shian Chiu</creatorcontrib><title>Developments and Applications of Data Deidentification Technology under Big Data</title><title>电子科技学刊</title><description>In this age characterized by rapid growth in the volume of data,data deidentification technologies have become crucial in facilitating the analysis of sensitive information.For instance,healthcare information must be processed through deidentification procedures before being passed to data analysis agencies in order to prevent any exposure of personal details that would violate privacy.As such,privacy protection issues associated with the release of data and data mining have become a popular field of study in the domain of big data.As a strict and verifiable definition of privacy,differential privacy has attracted noteworthy attention and widespread research in recent years.In this study,we analyze the advantages of differential privacy protection mechanisms in comparison to traditional deidentification data protection methods.Furthermore,we examine and analyze the basic theories of differential privacy and relevant studies regarding data release and data mining.</description><issn>1674-862X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNo9js9LwzAcxXNQcMz9D7l6aP3mR5P0ONepk4GCFbyVNElrZk3K2inur7fo8PTgvQ_vPYQwgZSQXOXXD-vnMiVC8kQJ-poKUMBB8DM0-zcv0GIYfA0ZYUIKSWfoqXCfrov9hwvjgHWweNn3nTd69DEMODa40KPGhfN2InxzSnDpzFuIXWy_8SFYt8c3vv1FL9F5o7vBLU46Ry-363J1n2wf7zar5TYZCPAsEUTQXDihDYWcUGdsLo2S0NRcTcdAy6ae_jsOjCpDLTG6zriqNROcWSLZHF399X7p0OjQVrt42IdpsTq29vi-qxwFIoEBZOwHhjFTyQ</recordid><startdate>20170901</startdate><enddate>20170901</enddate><creator>Hung-Li Chen</creator><creator>Yao-Tung Tsou</creator><creator>Bo-Chen Tai</creator><creator>Szu-Chuang Li</creator><creator>Yen-Nun Huang</creator><creator>Chia-Mu Yu</creator><creator>Yu-Shian Chiu</creator><general>Department of Communications Engineering, Feng Chia University,Taichung 400%Research Center for Information Technology Innovation,Academia Sinica, Taipei 100%Department of Computer Science and Engineering, National Chung Hsing University%Data Analytics Technology & Applications,Institute for Information Industry, Taipei 100</general><scope>2B.</scope><scope>4A8</scope><scope>92I</scope><scope>93N</scope><scope>PSX</scope><scope>TCJ</scope></search><sort><creationdate>20170901</creationdate><title>Developments and Applications of Data Deidentification Technology under Big Data</title><author>Hung-Li Chen ; Yao-Tung Tsou ; Bo-Chen Tai ; Szu-Chuang Li ; Yen-Nun Huang ; Chia-Mu Yu ; Yu-Shian Chiu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-s1045-616296e6ac20912ecd97c870fb486720a7fb804e40328c2d1cab548ba3643d173</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hung-Li Chen</creatorcontrib><creatorcontrib>Yao-Tung Tsou</creatorcontrib><creatorcontrib>Bo-Chen Tai</creatorcontrib><creatorcontrib>Szu-Chuang Li</creatorcontrib><creatorcontrib>Yen-Nun Huang</creatorcontrib><creatorcontrib>Chia-Mu Yu</creatorcontrib><creatorcontrib>Yu-Shian Chiu</creatorcontrib><collection>Wanfang Data Journals - Hong Kong</collection><collection>WANFANG Data Centre</collection><collection>Wanfang Data Journals</collection><collection>万方数据期刊 - 香港版</collection><collection>China Online Journals (COJ)</collection><collection>China Online Journals (COJ)</collection><jtitle>电子科技学刊</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hung-Li Chen</au><au>Yao-Tung Tsou</au><au>Bo-Chen Tai</au><au>Szu-Chuang Li</au><au>Yen-Nun Huang</au><au>Chia-Mu Yu</au><au>Yu-Shian Chiu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Developments and Applications of Data Deidentification Technology under Big Data</atitle><jtitle>电子科技学刊</jtitle><date>2017-09-01</date><risdate>2017</risdate><volume>15</volume><issue>3</issue><spage>231</spage><epage>239</epage><pages>231-239</pages><issn>1674-862X</issn><abstract>In this age characterized by rapid growth in the volume of data,data deidentification technologies have become crucial in facilitating the analysis of sensitive information.For instance,healthcare information must be processed through deidentification procedures before being passed to data analysis agencies in order to prevent any exposure of personal details that would violate privacy.As such,privacy protection issues associated with the release of data and data mining have become a popular field of study in the domain of big data.As a strict and verifiable definition of privacy,differential privacy has attracted noteworthy attention and widespread research in recent years.In this study,we analyze the advantages of differential privacy protection mechanisms in comparison to traditional deidentification data protection methods.Furthermore,we examine and analyze the basic theories of differential privacy and relevant studies regarding data release and data mining.</abstract><pub>Department of Communications Engineering, Feng Chia University,Taichung 400%Research Center for Information Technology Innovation,Academia Sinica, Taipei 100%Department of Computer Science and Engineering, National Chung Hsing University%Data Analytics Technology & Applications,Institute for Information Industry, Taipei 100</pub><doi>10.11989/JEST.1674-862X.60804064</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1674-862X |
ispartof | 电子科技学刊, 2017-09, Vol.15 (3), p.231-239 |
issn | 1674-862X |
language | eng |
recordid | cdi_wanfang_journals_zgdzkj_e201703005 |
source | Alma/SFX Local Collection |
title | Developments and Applications of Data Deidentification Technology under Big Data |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T03%3A17%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-wanfang_jour&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Developments%20and%20Applications%20of%20Data%20Deidentification%20Technology%20under%20Big%20Data&rft.jtitle=%E7%94%B5%E5%AD%90%E7%A7%91%E6%8A%80%E5%AD%A6%E5%88%8A&rft.au=Hung-Li%20Chen&rft.date=2017-09-01&rft.volume=15&rft.issue=3&rft.spage=231&rft.epage=239&rft.pages=231-239&rft.issn=1674-862X&rft_id=info:doi/10.11989/JEST.1674-862X.60804064&rft_dat=%3Cwanfang_jour%3Ezgdzkj_e201703005%3C/wanfang_jour%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_wanfj_id=zgdzkj_e201703005&rfr_iscdi=true |