Implementation algorithms for the methods of personal data depersonalization in distributed information systems

Download article in PDF format

Authors: Mischenko E. Yu., Sokolov A. N.

Annotation: The article deals with various methods of personal data protection, based on the use of depersonalization procedures, as well as methods for assessing the efficiency of depersonalization. The relevance of the use of depersonalization is conditioned by the fact that unlike other methods of personal data protection (i.e. the encryption), the cost of depersonalization does not depend on the number of points of the processing of personal data. That can provide certain economic benefits. The authors describe the characteristics of different depersonalization methods that have an important impact on the implementation of those methods and also give an overview of the implemented algorithms in various fields of personal data processing. In addition, the authors present the results of evaluating the effectiveness of depersonalization of personal data in the health sector obtained by the method of identifiers. As a result of the implementation, a sufficient degree of protection of personal data was achieved, and a significant economic effect was obtained.

Keywords: probability of identification, information system, method of introducing identifiers, method of changing the composition or semantics, method of mixing, depersonalization of personal data, degree of depersonalization

Editorial office address

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 701-582

  journal@tusur.ru

 

Viktor N. Maslennikov

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 51-21-21 / 51-43-02

  vnmas@tusur.ru

Subscription for updates