Author List: Garfinkel, Robert; Gopal, Ram D.; Thompson, Steven;
Information Systems Research, 2007, Volume 18, Issue 1, Page 23-41.
The ability to collect and disseminate individually identifiable microdata is becoming increasingly important in a number of arenas. This is especially true in health care and national security, where this data is considered vital for a number of public health and safety initiatives. In some cases legislation has been used to establish some standards for limiting the collection of and access to such data. However, all such legislative efforts contain many provisions that allow for access to individually identifiable microdata without the consent of the data subject. Furthermore, although legislation is useful in that penalties are levied for violating the law, these penalties occur after an individual's privacy has been compromised. Such deterrent measures can only serve as disincentives and offer no true protection. This paper considers security issues involved in releasing microdata, including individual identifiers. The threats to the confidentiality of the data subjects come from the users possessing statistical information that relates the revealed microdata to suppressed confidential information. The general strategy is to recode the initial data, in which some subjects are "safe" and some are at risk, into a data set in which no subjects are at risk. We develop a technique that enables the release of individually identifiable microdata in a manner that maximizes the utility of the released data while providing preventive protection of confidential data. Extensive computational results show that the proposed method is practical and viable and that useful data can be released even when the level of risk in the data is high.
Keywords: data security; health information; optimization; privacy
Algorithm:

List of Topics

#126 0.341 data database administration important dictionary organizations activities record increasingly method collection records considered perturbation requirements special level efforts administrators analyzed
#73 0.142 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures benefit costs threats ability rate
#239 0.140 privacy information concerns individuals personal disclosure protection concern consumers practices control data private calculus regulation risk individual legislation government sensitive
#260 0.074 policy movie demand features region effort second threshold release paid number regions analyze period respect availability released lower effect results
#97 0.071 set approach algorithm optimal used develop results use simulation experiments algorithms demonstrate proposed optimization present analytical distribution selection number existing
#196 0.055 health healthcare medical care patient patients hospital hospitals hit health-care telemedicine systems records clinical practices physician electronic physicians longitudinal outcomes