Skip to main content

Fake Injection Strategies for Private Phonetic Matching

  • Conference paper
Data Privacy Management and Autonomous Spontaneus Security (DPM 2011, SETOP 2011)

Abstract

In many aspects of everyday life, from education to health care and from economics to homeland security, information exchange involving companies or government agencies has become a common application. Locating the same real world entities within this information however is not trivial at all due to insufficient identifying information, misspellings, etc. The problem becomes even more complicated when privacy considerations arise. This introduction describes an informal approach to the privacy preserving record linkage problem. In this paper we provide a solution to this problem by examining the alternatives offered by phonetic codes, a range of algorithms which despite their age, are still used for record linkage purposes. The main contribution of our work, as our extensive experimental evaluation indicates, is that our methodology manages to offer privacy guarantees for performing Privacy Preserving Record Linkage without the need of computationally expensive cryptographic methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Atallah, M.J., Kerschbaum, F., Du, W.: Secure and private sequence comparisons. In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, pp. 39–44. ACM, New York (2003)

    Chapter  Google Scholar 

  2. Christen, P.: A comparison of personal name matching: Techniques and practical issues. In: Workshop on Mining Complex Data, held at IEEE ICDM 2006, Hong Kong (2006)

    Google Scholar 

  3. Christen, P.: Febrl-: an open source data cleaning, deduplication and record linkage system with a graphical user interface. In: Proceeding of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1065–1068. ACM (2008)

    Google Scholar 

  4. Christen, P.: A survey of indexing techniques for scalable record linkage and deduplication. IEEE Transactions on Knowledge and Data Engineering 99(PrePrints) (2011)

    Google Scholar 

  5. Churches, T., Christen, P.: Blind Data Linkage Using n-gram Similarity Comparisons. In: Dai, H., Srikant, R., Zhang, C. (eds.) PAKDD 2004. LNCS (LNAI), vol. 3056, pp. 121–126. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Clifton, C., Kantarcioglu, M., Doan, A., Schadow, G., Vaidya, J., Elmagarmid, A., Suciu, D.: Privacy-preserving data integration and sharing. In: DMKD 2004: Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, pp. 19–26. ACM (2004)

    Google Scholar 

  7. Durham, E.A., Xue, Y., Kantarcioglu, M., Malin, B.: Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage. Information Fusion (in press, 2011)

    Google Scholar 

  8. Elfeky, M.G., Elmagarmid, A.K., Verykios, V.S.: Tailor: A record linkage tool box. In: ICDE, pp. 17–28 (2002)

    Google Scholar 

  9. Elmagarmid, A.K., Ipeirotis, P.G., Verykios, V.S.: Duplicate record detection: A survey. IEEE Trans. Knowl. Data Eng. 19(1), 1–16 (2007)

    Article  Google Scholar 

  10. Gill, L.E.: The Oxford medical record linkage system. In: Int’l Record Linkage Workshop and Exposition, pp. 15–33 (1997)

    Google Scholar 

  11. Hall, R., Fienberg, S.E.: Privacy-Preserving Record Linkage. In: Domingo-Ferrer, J., Magkos, E. (eds.) PSD 2010. LNCS, vol. 6344, pp. 269–283. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  12. Inan, A., Kantarcioglu, M., Bertino, E., Scannapieco, M.: A hybrid approach to private record linkage. In: ICDE, pp. 496–505 (2008)

    Google Scholar 

  13. Inan, A., Kantarcioglu, M., Ghinita, G., Bertino, E.: Private record matching using differential privacy. In: Proceedings of the 13th International Conference on Extending Database Technology, EDBT 2010, pp. 123–134. ACM, New York (2010)

    Chapter  Google Scholar 

  14. Kantarcioglu, M., Jiang, W., Malin, B.: A Privacy-Preserving Framework for Integrating Person-Specific Databases. In: Domingo-Ferrer, J., Saygın, Y. (eds.) PSD 2008. LNCS, vol. 5262, pp. 298–314. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  15. Karakasidis, A., Verykios, V.S.: Privacy preserving record linkage using phonetic codes. In: Proceedings of the 4th Balkan Conference of Informatics, pp. 101–106 (2009)

    Google Scholar 

  16. Karakasidis, A., Verykios, V.S.: Advances in privacy preserving record linkage. In: E-Activity and Intelligent Web Construction: Effects of Social Design, pp. 22–29. IGI Global (2011)

    Google Scholar 

  17. Karakasidis, A., Verykios, V.S.: Secure blocking + secure matching = secure record linkage. J. of Comp. Science and Engineering 5(3), 101–106 (2011)

    Google Scholar 

  18. Levenshtein, V.I.: Binary Codes Capable of Correcting Deletions, Insertions and Reversals. Soviet Physics Doklady 10, 707 (1966)

    MathSciNet  Google Scholar 

  19. Morgenstern, M.: Security and inference in multilevel database and knowledge-base systems. In: Proceedings of the 1987 ACM SIGMOD International Conference on Management of Data, SIGMOD 1987, pp. 357–373. ACM, New York (1987)

    Chapter  Google Scholar 

  20. BBC news (2010), http://news.bbc.co.uk/2/hi/business/8562381.stm

  21. Odell, M., Russell, R.C.: The Soundex coding system. US Patents, 1261167 (1918)

    Google Scholar 

  22. Philips, L.: Hanging on the metaphone. Computer Language 7(12) (December 1990)

    Google Scholar 

  23. Rivest, R.L.: The MD5 message-digest algorithm (rfc 1321), http://www.ietf.org/rfc/rfc1321.txt?number=1321

  24. Scannapieco, M., Figotin, I., Bertino, E., Elmagarmid, A.K.: Privacy preserving schema and data matching. In: SIGMOD Conference, pp. 653–664 (2007)

    Google Scholar 

  25. Schnell, R., Bachteler, T., Reiher, J.: Privacy-preserving record linkage using bloom filters. BMC Medical Informatics and Decision Making 9(1), 41+ (2009)

    Article  Google Scholar 

  26. Shannon, C.E.: A mathematical theory of communication. The Bell System Technical Journal 27, 379–423 (1948)

    MathSciNet  MATH  Google Scholar 

  27. Sweeney, L.: K-anonymity: A model for protecting privacy. International Journal of Uncertainty Fuzziness and Knowledge Based Systems 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  28. Taft, R.L.: Name search techniques. Technical report, New York State Identification and Intelligence System, Albany, N.Y. (February 1970)

    Google Scholar 

  29. Trepetin, S.: Privacy-preserving string comparisons in record linkage systems: A review. Information Security Journal: A Global Perspective 17(5&6), 253–266 (2008)

    Article  Google Scholar 

  30. Verykios, V.S., Karakasidis, A., Mitrogiannis, V.K.: Privacy preserving record linkage approaches. Int. J. Data Mining, Modelling and Management 1(2), 206–221 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Karakasidis, A., Verykios, V.S., Christen, P. (2012). Fake Injection Strategies for Private Phonetic Matching. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds) Data Privacy Management and Autonomous Spontaneus Security. DPM SETOP 2011 2011. Lecture Notes in Computer Science, vol 7122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28879-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28879-1_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28878-4

  • Online ISBN: 978-3-642-28879-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics