Henriksen-Bulmer, J. and Jeary, S., 2016. Re-Identification Attacks – A Systematic Literature Review. International Journal of Information Management, 36 (6 B), 1184-1192.
This is the latest version of this eprint.
Full text available as:
|
PDF
IJIM_2015_152_Revision 1_V023Mar16.pdf - Accepted Version Available under License Creative Commons Attribution Non-commercial No Derivatives. 443kB | |
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
DOI: 10.1016/j.ijinfomgt.2016.08.002
Abstract
The publication of increasing amounts of anonymised open source data has resulted in a worryingly rising number of successful re-identification attacks. This has a number of privacy and security implications both on an individual and corporate level. This paper uses a Systematic Literature Review to investigate the depth and extent of this problem as reported in peer reviewed literature. Using a detailed protocol ,seven research portals were explored, 10,873 database entries were searched, from which a subset of 220 papers were selected for further review. From this total, 55 papers were selected as being within scope and to be included in the final review. The main review findings are that 72.7% of all successful re-identification attacks have taken place since 2009. Most attacks use multiple datasets. The majority of them have taken place on global datasets such as social networking data, and have been conducted by US based researchers. Furthermore, the number of datasets can be used as an attribute. Because privacy breaches have security, policy and legal implications (e.g. data protection, Safe Harbor etc.), the work highlights the need for new and improved anonymisation techniques or indeed, a fresh approach to open source publishing.
Item Type: | Article |
---|---|
ISSN: | 1873-4707 |
Uncontrolled Keywords: | Re-identification, anonymisation, anonymization, systematic literature review Re-identification attacks: a Systematic Literature Review |
Group: | Faculty of Science & Technology |
ID Code: | 24762 |
Deposited By: | Symplectic RT2 |
Deposited On: | 26 Sep 2016 10:32 |
Last Modified: | 14 Mar 2022 13:59 |
Available Versions of this Item
-
Re-Identification Attacks – A Systematic Literature Review. (deposited 02 Aug 2016 13:52)
- Re-Identification Attacks – A Systematic Literature Review. (deposited 26 Sep 2016 10:32) [Currently Displayed]
Downloads
Downloads per month over past year
Repository Staff Only - |