A formalization of re-identification in terms of compatible probabilities

01/21/2013
by   Vicenç Torra, et al.
0

Re-identification algorithms are used in data privacy to measure disclosure risk. They model the situation in which an adversary attacks a published database by means of linking the information of this adversary with the database. In this paper we formalize this type of algorithm in terms of true probabilities and compatible belief functions. The purpose of this work is to leave aside as re-identification algorithms those algorithms that do not satisfy a minimum requirement.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/16/2020

Toward Evaluating Re-identification Risks in the Local Privacy Model

LDP (Local Differential Privacy) has recently attracted much attention a...
research
04/06/2022

Distributed Transition Systems with Tags for Privacy Analysis

We present a logical framework that formally models how a given private ...
research
04/23/2020

Measuring Information Leakage in Non-stochastic Brute-Force Guessing

We propose an operational measure of information leakage in a non-stocha...
research
08/12/2021

CIPM: Common Identification Process Model for Database Forensics Field

Database Forensics (DBF) domain is a branch of digital forensics, concer...
research
03/06/2013

Constructing Lower Probabilities

An elaboration of Dempster's method of constructing belief functions sug...
research
03/31/2022

Assessing the risk of re-identification arising from an attack on anonymised data

Objective: The use of routinely-acquired medical data for research purpo...
research
04/12/2023

Measuring Re-identification Risk

Compact user representations (such as embeddings) form the backbone of p...

Please sign up or login with your details

Forgot password? Click here to reset