Skip to main content

Research Issue in Data Anonymization in Electronic Health Service: A Survey

  • Conference paper
  • First Online:
Data Science and Big Data Analytics

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 16))

  • 1645 Accesses

Abstract

At today time, the rapid change of technology is changing the day-to-day activity of human being. Healthcare data and practice also made use of these technologies; they change its way to handle the data. The electronic health Service (EHS) is increasingly collecting large amount of sensitive data of the patient that is used by the patient, doctors and others data analysts. When we are using EHS we should concern to security and privacy of the medical data, because of medical data is too sensitive due to their personal nature. Especially privacy is critical for the sensitive data when we give for medical data analysis or medical research purpose, first we should do sanitization or anonymized of the data before releasing it. Data anonymization is the removing or hiding of personal identifier information like name, id, and SSN from the health datasets and to not to be identified by the recipient of the data. To anonymize the data we are using different models and techniques of anonymization. This paper is survey on data anonymization in Electronic Health Service (EHS).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Popeea T, Constantinescu A, Rughinis R (2013) Providing data anonymity for a secure database infrastructure. In: Roedunet international conference (RoEduNet), 11 Feb 2013. IEEE, pp 1–6

    Google Scholar 

  2. Presswala F, Thakkar A, Bhatt N (2015) Survey on anonymization in privacy preserving data mining

    Google Scholar 

  3. Sweeney L (2002) K-anonymity: a model for protecting prvacy. Int J Uncertai Fuzziness Knowl Based Syst 10(5):557–570

    Google Scholar 

  4. Sweeney L (2002) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertai Fuzziness Knowl Based Syst 10(05):571–588

    Article  MathSciNet  Google Scholar 

  5. Fung B, Wang K, Chen R, Yu PS (2010) Privacy-preserving data publishing: a survey of recent developments. ACM Comput Surv (CSUR) 42(4):14

    Article  Google Scholar 

  6. LeFevre K, DeWitt DJ, Ramakrishnan R (2005) Incognito: efficient full-domain k-anonymity. In: Proceedings of the 2005 ACM SIGMOD international conference on management of data. ACM, pp 49–60

    Google Scholar 

  7. Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) L-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data (TKDD) 1(1):3

    Article  Google Scholar 

  8. Li N, Li T, Venkatasubramanian S (2007) t-closeness: privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd international conference on data engineering, ICDE 2007. IEEE, pp 106–115

    Google Scholar 

  9. Rodiya K, Gill P (2015) A review on anonymization techniques for privacy preserving data publishing

    Google Scholar 

  10. Li T, Li N, Zhang J, Molloy I (2012) Slicing: a new approach for privacy preserving data publishing. IEEE Trans Knowl Data Eng 24(3):561–574

    Article  Google Scholar 

  11. Sreevani P, Niranjan P, Shireesha P (2014) A novel data anonymization technique for privacy preservation of data publishing. Int J Eng Sci Res Technol

    Google Scholar 

  12. Patil SA, Banubakod DA (2015) Comparative analysis of privacy preserving techniques in distributed database. Int J Sci Res (IJSR) 4(1)

    Google Scholar 

  13. Dubli D, Yadav DK (2017) Secure techniques of data anonymization for privacy preservation. Int J 8(5)

    Google Scholar 

  14. Nayahi JJV, Kavitha V (2017) Privacy and utility preserving data clustering for data anonymization and distribution on Hadoop. Future Gener Comput Syst 74:393–408

    Article  Google Scholar 

  15. Li J, Baig MM, Sattar AS, Ding X, Liu J, Vincent MW (2016) A hybrid approach to prevent composition attacks for independent data releases. Inf Sci 367:324–336

    Article  Google Scholar 

  16. Balusamy M, Muthusundari S (2014) Data anonymization through generalization using map reduce on cloud. In: 2014 international conference on computer communication and systems. IEEE, pp 039–042

    Google Scholar 

  17. Li J, Liu J, Baig M, Wong RCW (2011) Information based data anonymization for classification utility. Data Knowl Eng 70(12):1030–1045

    Article  Google Scholar 

  18. Soria-Comas J, Domingo-Ferrert J (2013) Differential privacy via t-closeness in data publishing. In: 2013 eleventh annual international conference on privacy, security and trust (PST). IEEE, pp 27–35

    Google Scholar 

  19. Domingo-Ferrer J, Sánchez D, Rufian-Torrell G (2013) Anonymization of nominal data based on semantic marginality. Inf Sci 242:35–48

    Article  Google Scholar 

  20. Rose PS, Visumathi J, Haripriya H (2016) Research paper on privacy preservation by data anonymization in public cloud for hospital management on big data. Int J Adv Comput Technol (IJACT)

    Google Scholar 

  21. Parmar K, Shah V (2016) A review on data anonymization in privacy preserving data mining. Int J Adv Res Computd Commun Eng 5(2)

    Google Scholar 

  22. Li J, Baig MM, Sattar AS, Ding X, Liu J, Vincent MW (2016) A hybrid approach to prevent composition attacks for independent data releases. Inf Sci 367:324–336

    Article  Google Scholar 

  23. Mohamed MA, Nagi MH, Ghanem SM (2016) A clustering approach for anonymizing distributed data streams. In: 2016 11th international conference on computer engineering and systems (ICCES). IEEE, pp. 9–16

    Google Scholar 

  24. Zakerzadeh H, Aggarwal CC, Barker K (2015) Privacy-preserving big data publishing. In: Proceedings of the 27th international conference on scientific and statistical database management. ACM, p 26

    Google Scholar 

  25. Balusamy M, Muthusundari S (2014) Data anonymization through generalization using map reduce on cloud. In: 2014 international conference on computer communication and systems. IEEE, pp 039–042

    Google Scholar 

  26. Li T, Li N, Zhang J, Molloy I (2012) Slicing: a new approach for privacy preserving data publishing. IEEE Trans Knowl Data Eng 24(3):561–574

    Article  Google Scholar 

  27. Xu X, Numao M (2015) An efficient generalized clustering method for achieving k-anonymization. In: 2015 third international symposium on computing and networking (CANDAR). IEEE, pp 499–502

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amanuel Gebrehiwot .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gebrehiwot, A., Pawar, A.V. (2019). Research Issue in Data Anonymization in Electronic Health Service: A Survey. In: Mishra, D., Yang, XS., Unal, A. (eds) Data Science and Big Data Analytics. Lecture Notes on Data Engineering and Communications Technologies, vol 16. Springer, Singapore. https://doi.org/10.1007/978-981-10-7641-1_12

Download citation

Publish with us

Policies and ethics