438
Views
6
CrossRef citations to date
0
Altmetric
Articles

Methods and tools for healthcare data anonymization: a literature review

ORCID Icon, ORCID Icon & ORCID Icon
Pages 326-342 | Received 05 Jan 2022, Accepted 23 Dec 2022, Published online: 19 Feb 2023

References

  • Abouelmehdi, Karim, Abderrahim Beni-Hessane, and Hayat Khaloufi. 2018. “Big Healthcare Data: Preserving Security and Privacy.” Journal of Big Data 5 (1): 1–18. doi:10.1186/s40537-017-0110-7.
  • Aminifar, Amin, Yngve Lamo, Ka I. Pun, and Fazle Rabbi. 2019. “A Practical Methodology for Anonymization of Structured Health Data.”
  • Anjum, Adeel, Kim-Kwang Raymond Choo, Abid Khan, Asma Haroon, Sangeen Khan, Samee U. Khan, Naveed Ahmad, and Basit Raza. 2018. “An Efficient Privacy Mechanism for Electronic Health Records.” Computers & Security 72: 196–211. doi:10.1016/j.cose.2017.09.014.
  • Anjum, Adeel, Guillaume Raschia, Marc Gelgon, Abid Khan, Naveed Ahmad, Mansoor Ahmed, Sabah Suhail, and M. Masoom Alam. 2017. “τ-safety: A Privacy Model for Sequential Publication with Arbitrary Updates.” Computers & Security 66: 20–39. doi:10.1016/j.cose.2016.12.014.
  • Attaullah, Hasina, Adeel Anjum, Tehsin Kanwal, Saif Ur Rehman Malik, Alia Asheralieva, Hassan Malik, Ahmed Zoha, Kamran Arshad, and Muhammad Ali Imran. 2021. “F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes.” Sensors 21 (14): 4933. doi:10.3390/s21144933.
  • Dwork, Cynthia. 2008, April 25-29. “Differential Privacy: A Survey of Results.” In Theory and Applications of Models of Computation: 5th International Conference, TAMC 2008, 1–19. Berlin, Heidelberg: Springer.
  • El Emam, Khaled, and Luk Arbuckle. 2013. Anonymizing Health Data: Case Studies and Methods to Get You Started. O'Reilly Media, Inc.
  • European Commission. 2014. Article 29 Working Party Opinion 05/2014 on Anonymisation Techniques.
  • Gkoulalas-Divanis, Aris, Grigorios Loukides, and Jimeng Sun. 2014. “Publishing Data from Electronic Health Records While Preserving Privacy: A Survey of Algorithms.” Journal of Biomedical Informatics 50: 4–19. doi:10.1016/j.jbi.2014.06.002.
  • Hsiao, Mei-Hui, Wen-Yang Lin, Kuang-Yung Hsu, and Zih-Xun Shen. 2019. “On Anonymizing Medical Microdata with Large-scale Missing Values-a Case Study with the Faers Dataset.” In 2019 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 6505–6508. IEEE.
  • Iwendi, Celestine, Syed Atif Moqurrab, Adeel Anjum, Sangeen Khan, Senthilkumar Mohan, and Gautam Srivastava. 2020. “N-sanitization: A Semantic Privacy-Preserving Framework for Unstructured Medical Datasets.” Computer Communications 161: 160–171. doi:10.1016/j.comcom.2020.07.032.
  • Jayabalan, Manoj, and Muhammad Ehsan Rana. 2018. “Anonymizing Healthcare Records: A Study of Privacy Preserving Data Publishing Techniques.” Advanced Science Letters 24 (3): 1694–1697. doi:10.1166/asl.2018.11139.
  • Jayapradha, J., and M. Prakash. 2021. “f-Slip: An Efficient Privacy-Preserving Data Publishing Framework for 1: M Microdata with Multiple Sensitive Attributes.” Soft Computing, 1–18. doi:10.21203/rs.3.rs-660451/v1.
  • Kanwal, Tehsin, Adeel Anjum, and Abid Khan. 2021. “Privacy Preservation in e-Health Cloud: Taxonomy, Privacy Requirements, Feasibility Analysis, and Opportunities.” Cluster Computing 24 (1): 293–317. doi:10.1007/s10586-020-03106-1.
  • Khan, Razaullah, Xiaofeng Tao, Adeel Anjum, Tehsin Kanwal, Abid Khan, and Carsten Maple. 2020. “θ-sensitive k-Anonymity: An Anonymization Model for IoT Based Electronic Health Records.” Electronics 9 (5): 716. doi:10.3390/electronics9050716.
  • Kitchenham, Barbara, and Stuart Charters. 2007. “Guidelines for Performing Systematic Literature Reviews in Software Engineering.”
  • Kumar, Anil, and Ravinder Kumar. 2020. “Privacy Preservation of Electronic Health Record: Current Status and Future Direction.” In Handbook of Computer Networks and Cyber Security: Principles and Paradigms, 715–739. Cham: Springer.
  • Lee, Hyukki, and Yon Dohn Chung. 2020. “Differentially Private Release of Medical Microdata: An Efficient and Practical Approach for Preserving Informative Attribute Values.” BMC Medical Informatics and Decision Making 20 (1): 1–15. doi:10.1186/s12911-019-1002-x.
  • Lee, Hyukki, Soohyung Kim, Jong Wook Kim, and Yon Dohn Chung. 2017. “Utility-Preserving Anonymization for Health Data Publishing.” BMC Medical Informatics and Decision Making 17 (1): 1–12. doi:10.1186/s12911-016-0389-x.
  • Li, Hongtao, Feng Guo, Wenyin Zhang, Jie Wang, and Jinsheng Xing. 2018. “(a, k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-Based Healthcare Services Systems.” Journal of Medical Systems 42 (3): 1–9. doi:10.1007/s10916-018-0896-7.
  • Li, Ninghui, Tiancheng Li, and Suresh Venkatasubramanian. 2007. “t-closeness: Privacy Beyond k-Anonymity and l-Diversity.” In 2007 IEEE 23rd International Conference on Data Engineering, 106–115. IEEE.
  • Li, Xiao-Bai, and Jialun Qin. 2017. “Anonymizing and Sharing Medical Text Records.” Information Systems Research 28 (2): 332–352. doi:10.1287/isre.2016.0676.
  • Lu, Yang, Richard O. Sinnott, Kain Verspoor, and Udaya Parampalli. 2018. “Privacy-preserving Access Control in Electronic Health Record Linkage.” In 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), 1079–1090. IEEE.
  • Machanavajjhala, Ashwin, Daniel Kifer, Johannes Gehrke, and Muthuramakrishnan Venkitasubramaniam. 2007. “l-diversity: Privacy Beyond k-anonymity.” ACM Transactions on Knowledge Discovery from Data (TKDD) 1 (1): 3–es. doi:10.1145/1217299.1217302.
  • Majeed, Abdul. 2019. “Attribute-centric Anonymization Scheme for Improving User Privacy and Utility of Publishing e-Health Data.” Journal of King Saud University – Computer and Information Sciences 31 (4): 426–435. doi:10.1016/j.jksuci.2018.03.014.
  • Neumann, Geoffrey K., Paul Grace, Daniel Burns, and Mike Surridge. 2019. “Pseudonymization Risk Analysis in Distributed Systems.” Journal of Internet Services and Applications 10 (1): 1–16. doi:10.1186/s13174-018-0098-z.
  • Pawar, Ambika, Swati Ahirrao, and Prathamesh P. Churi. 2018. “Anonymization Techniques for Protecting Privacy: A Survey.” In 2018 IEEE Punecon, 1–6. IEEE.
  • Poulis, Giorgos, Grigorios Loukides, Spiros Skiadopoulos, and Aris Gkoulalas-Divanis. 2017. “Anonymizing Datasets with Demographics and Diagnosis Codes in the Presence of Utility Constraints.” Journal of Biomedical Informatics 65: 76–96. doi:10.1016/j.jbi.2016.11.001.
  • Prasser, Fabian, Johanna Eicher, Raffael Bild, Helmut Spengler, and Klaus A. Kuhn. 2017. “A Tool for Optimizing de-Identified Health Data for use in Statistical Classification.” In 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS), 169–174. IEEE.
  • Prasser, Fabian, Florian Kohlmayer, Helmut Spengler, and Klaus A. Kuhn. 2018. “A Scalable and Pragmatic Method for the Safe Sharing of High-Quality Health Data.” IEEE Journal of Biomedical and Health Informatics 22 (2): 611–622. doi:10.1109/JBHI.2017.2676880.
  • Rajendran, Keerthana, Manoj Jayabalan, and Muhammad Ehsan Rana. 2017. “A Study on k-Anonymity, l-Diversity, and t-Closeness Techniques.” IJCSNS 17 (12): 172.
  • Ribeiro, Sérgio Luís, and Emilio Tissato Nakamura. 2019. “Privacy Protection with Pseudonymization and Anonymization in a Health IoT System: Results from Ocariot.” In 2019 IEEE 19th International Conference on Bioinformatics and Bioengineering (BIBE), 904–908. IEEE.
  • Rohilla, Shivani, and Manish Bhardwaj. 2017. “Efficient Anonymization Algorithms to Prevent Generalized Losses and Membership Disclosure in Microdata.” American Journal of Data Mining and Knowledge Discovery 2 (2): 54–61. doi:10.11648/j.ajdmkd.20170202.13.
  • Saeed, Rashad, and Azhar Rauf. 2018. “Anatomization Through Generalization (AG): A Hybrid Privacy-Preserving Approach to Prevent Membership, Identity and Semantic Similarity Disclosure Attacks.” In 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), 1–7. IEEE.
  • Sweeney, Latanya. 2002. “k-anonymity: A Model for Protecting Privacy.” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10 (05): 557–570. doi:10.1142/S0218488502001648.
  • Tsai, Yu-Chuan, Shyue-Liang Wang, I-Hsien Ting, and Tzung-Pei Hong. 2020. “Flexible Sensitive K-Anonymization on Transactions.” World Wide Web 23 (4): 2391–2406. doi:10.1007/s11280-020-00798-8.
  • Tsou, Yao-Tung, Mansour Naser Alraja, Li-Sheng Chen, Yu-Hsiang Chang, Yung-Li Hu, Yennun Huang, Chia-Mu Yu, and Pei-Yuan Tsai. 2021. “($$ k, $$ k, ϵ, δ)-Anonymization: Privacy-preserving Data Release Based on k-anonymity and Differential Privacy.” Service Oriented Computing and Applications 15 (3): 175–185. doi:10.1007/s11761-021-00324-2.
  • Vardalachakis, Marios, Haridimos Kondylakis, Lefteris Koumakis, Angelina Kouroubali, and Dimitrios G. Katehakis. 2019. “ShinyAnonymizer: A Tool for Anonymizing Health Data.” In ICT4AWE, 325–332.
  • Vovk, Olga, Gunnar Piho, and Peeter Ross. 2021a, June 21-23. “Anonymization Methods of Structured Health Care Data: A Literature Review.” In Model and Data Engineering: 10th International Conference, MEDI 2021, 175–189. Cham: Springer International Publishing.
  • Vovk, Olga, Gunnar Piho, and Peeter Ross. 2021b. “Evaluation of Anonymization Tools for Health Data.” In International Conference on Model and Data Engineering, 302–313. Cham: Springer.
  • Wang, Xuerui, and Andrew McCallum. 2006. “Topics Over Time: A non-Markov Continuous-Time Model of Topical Trends.” In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 424–433.
  • Wong, Raymond Chi-Wing, Ada Wai-Chee Fu, Ke Wang, and Jian Pei. 2007. “Minimality Attack in Privacy Preserving Data Publishing.” In Proceedings of the 33rd International Conference on Very Large Data Bases, 543–554.
  • Yan, Yan, Eyeleko Anselme Herman, Adnan Mahmood, Tao Feng, and Pengshou Xie. 2021. “A Weighted K-Member Clustering Algorithm for K-Anonymization.” Computing, 1–23. doi:10.1007/s00607-021-00922-0.
  • Yao, Lin, Zhenyu Chen, Haibo Hu, Guowei Wu, and Bin Wu. 2021. “Sensitive Attribute Privacy Preservation of Trajectory Data Publishing Based on l-Diversity.” Distributed and Parallel Databases 39 (3): 785–811. doi:10.1007/s10619-020-07318-7.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.