Protecting Privacy Using k-Anonymity

Khaled El Emam, Fida Kamal Dankar

Research output: Contribution to journalArticlepeer-review

181 Citations (Scopus)

Abstract

Objective: There is increasing pressure to share health information and even make it publicly available. However, such disclosures of personal health information raise serious privacy concerns. To alleviate such concerns, it is possible to anonymize the data before disclosure. One popular anonymization approach is k-anonymity. There have been no evaluations of the actual re-identification probability of k-anonymized data sets. Design: Through a simulation, we evaluated the re-identification risk of k-anonymization and three different improvements on three large data sets. Measurement: Re-identification probability is measured under two different re-identification scenarios. Information loss is measured by the commonly used discernability metric. Results: For one of the re-identification scenarios, k-Anonymity consistently over-anonymizes data sets, with this over-anonymization being most pronounced with small sampling fractions. Over-anonymization results in excessive distortions to the data (i.e., high information loss), making the data less useful for subsequent analysis. We found that a hypothesis testing approach provided the best control over re-identification risk and reduces the extent of information loss compared to baseline k-anonymity. Conclusion: Guidelines are provided on when to use the hypothesis testing approach instead of baseline k-anonymity.

Original languageEnglish
Pages (from-to)627-637
Number of pages11
JournalJournal of the American Medical Informatics Association : JAMIA
Volume15
Issue number5
DOIs
Publication statusPublished - Sep 2008
Externally publishedYes

ASJC Scopus subject areas

  • Health Informatics

Fingerprint

Dive into the research topics of 'Protecting Privacy Using k-Anonymity'. Together they form a unique fingerprint.

Cite this