Data anonymization

"Anonymization" redirects here. For anonymity on the Internet, see Anonymity § Anonymity on the Internet.
Not to be confused with Data cleansing.

Data anonymization is a type of information sanitization whose intent is privacy protection. It is the process of either encrypting or removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous. The Privacy Technology Focus Group defines it as "technology that converts clear text data into a nonhuman readable and irreversible form, including but not limited to preimage resistant hashes (e.g., one-way hashes) and encryption techniques in which the decryption key has been discarded."[1] Data anonymization enables the transfer of information across a boundary, such as between two departments within an agency or between two agencies, while reducing the risk of unintended disclosure, and in certain environments in a manner that enables evaluation and analytics post-anonymization. In the context of medical data, anonymized data refers to data from which the patient cannot be identified by the recipient of the information. The name, address, and full post code must be removed together with any other information which, in conjunction with other data held by or disclosed to the recipient, could identify the patient.[2] De-anonymization is the reverse process in which anonymous data is cross-referenced with other data sources to re-identify the anonymous data source.[3] Generalization and perturbation are the two popular anonymization approaches for relational data.[4]

See also

References

  1. Privacy Technology Focus Group Report (PDF). United States Department of Justice. 2006. p. 52.
  2. "Data anonymization". The Free Medical Dictionary. Retrieved 17 January 2014.
  3. "De-anonymization". Whatis.com. Retrieved 17 January 2014.
  4. Bin Zhou; Jian Pei; WoShun Luk (December 2008). "A brief survey on anonymization techniques for privacy preserving publishing of social network data". Newsletter ACM SIGKDD Explorations Newsletter 10 (2): 12–22.

External links

Further reading