• 中文核心期刊要目总览
  • 中国科技核心期刊
  • 中国科学引文数据库(CSCD)
  • 中国科技论文与引文数据库(CSTPCD)
  • 中国学术期刊文摘数据库(CSAD)
  • 中国学术期刊(网络版)(CNKI)
  • 中文科技期刊数据库
  • 万方数据知识服务平台
  • 中国超星期刊域出版平台
  • 国家科技学术期刊开放平台
  • 荷兰文摘与引文数据库(SCOPUS)
  • 日本科学技术振兴机构数据库(JST)
Hung-Li Chen, Yao-Tung Tsou, Bo-Chen Tai, Szu-Chuang Li, Yen-Nun Huang, Chia-Mu Yu, Yu-Shian Chiu. Developments and Applications of Data Deidentification Technology under Big Data[J]. 电子科技大学(英文版), 2017, 15(3): 231-239. DOI: 10.11989/JEST.1674-862X.60804064
引用本文: Hung-Li Chen, Yao-Tung Tsou, Bo-Chen Tai, Szu-Chuang Li, Yen-Nun Huang, Chia-Mu Yu, Yu-Shian Chiu. Developments and Applications of Data Deidentification Technology under Big Data[J]. 电子科技大学(英文版), 2017, 15(3): 231-239. DOI: 10.11989/JEST.1674-862X.60804064
Hung-Li Chen, Yao-Tung Tsou, Bo-Chen Tai, Szu-Chuang Li, Yen-Nun Huang, Chia-Mu Yu, Yu-Shian Chiu. Developments and Applications of Data Deidentification Technology under Big Data[J]. Journal of Electronic Science and Technology, 2017, 15(3): 231-239. DOI: 10.11989/JEST.1674-862X.60804064
Citation: Hung-Li Chen, Yao-Tung Tsou, Bo-Chen Tai, Szu-Chuang Li, Yen-Nun Huang, Chia-Mu Yu, Yu-Shian Chiu. Developments and Applications of Data Deidentification Technology under Big Data[J]. Journal of Electronic Science and Technology, 2017, 15(3): 231-239. DOI: 10.11989/JEST.1674-862X.60804064

Developments and Applications of Data Deidentification Technology under Big Data

Developments and Applications of Data Deidentification Technology under Big Data

  • 摘要: In this age characterized by rapid growth in the volume of data, data deidentification technologies have become crucial in facilitating the analysis of sensitive information. For instance, healthcare information must be processed through deidentification procedures before being passed to data analysis agencies in order to prevent any exposure of personal details that would violate privacy. As such, privacy protection issues associated with the release of data and data mining have become a popular field of study in the domain of big data. As a strict and verifiable definition of privacy, differential privacy has attracted noteworthy attention and widespread research in recent years. In this study, we analyze the advantages of differential privacy protection mechanisms in comparison to traditional deidentification data protection methods. Furthermore, we examine and analyze the basic theories of differential privacy and relevant studies regarding data release and data mining.

     

    Abstract: In this age characterized by rapid growth in the volume of data, data deidentification technologies have become crucial in facilitating the analysis of sensitive information. For instance, healthcare information must be processed through deidentification procedures before being passed to data analysis agencies in order to prevent any exposure of personal details that would violate privacy. As such, privacy protection issues associated with the release of data and data mining have become a popular field of study in the domain of big data. As a strict and verifiable definition of privacy, differential privacy has attracted noteworthy attention and widespread research in recent years. In this study, we analyze the advantages of differential privacy protection mechanisms in comparison to traditional deidentification data protection methods. Furthermore, we examine and analyze the basic theories of differential privacy and relevant studies regarding data release and data mining.

     

/

返回文章
返回