Please use this identifier to cite or link to this item:
https://doi.org/10.21256/zhaw-26691
Publication type: | Article in scientific journal |
Type of review: | Peer review (publication) |
Title: | A systematic overview on methods to protect sensitive data provided for various analyses |
Authors: | Templ, Matthias Sariyar, Murat |
et. al: | No |
DOI: | 10.1007/s10207-022-00607-5 10.21256/zhaw-26691 |
Published in: | International Journal of Information Security |
Volume(Issue): | 21 |
Issue: | 6 |
Page(s): | 1233 |
Pages to: | 1246 |
Issue Date: | 2022 |
Publisher / Ed. Institution: | Springer |
ISSN: | 1615-5262 1615-5270 |
Language: | English |
Subjects: | Anonymization; Privacy-preserving computation; Federated learning; Synthetic data |
Subject (DDC): | 005: Computer programming, programs and data |
Abstract: | In view of the various methodological developments regarding the protection of sensitive data, especially with respect to privacy-preserving computation and federated learning, a conceptual categorization and comparison between various methods stemming from different fields is often desired. More concretely, it is important to provide guidance for the practice, which lacks an overview over suitable approaches for certain scenarios, whether it is differential privacy for interactive queries, k-anonymity methods and synthetic data generation for data publishing, or secure federated analysis for multiparty computation without sharing the data itself. Here, we provide an overview based on central criteria describing a context for privacy-preserving data handling, which allows informed decisions in view of the many alternatives. Besides guiding the practice, this categorization of concepts and methods is destined as a step towards a comprehensive ontology for anonymization. We emphasize throughout the paper that there is no panacea and that context matters. |
Further description: | Erworben im Rahmen der Schweizer Nationallizenzen (http://www.nationallizenzen.ch) |
URI: | https://digitalcollection.zhaw.ch/handle/11475/26691 |
Fulltext version: | Published version |
License (according to publishing contract): | CC BY 4.0: Attribution 4.0 International |
Departement: | School of Engineering |
Organisational Unit: | Institute of Data Analysis and Process Design (IDP) |
Appears in collections: | Publikationen School of Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2022_Templ-Sariyar_Methods-to-protect-sensitive-data-provided-for-various-analyses_IntJInfSecur.pdf | 268.79 kB | Adobe PDF | View/Open |
Show full item record
Templ, M., & Sariyar, M. (2022). A systematic overview on methods to protect sensitive data provided for various analyses. International Journal of Information Security, 21(6), 1233–1246. https://doi.org/10.1007/s10207-022-00607-5
Templ, M. and Sariyar, M. (2022) ‘A systematic overview on methods to protect sensitive data provided for various analyses’, International Journal of Information Security, 21(6), pp. 1233–1246. Available at: https://doi.org/10.1007/s10207-022-00607-5.
M. Templ and M. Sariyar, “A systematic overview on methods to protect sensitive data provided for various analyses,” International Journal of Information Security, vol. 21, no. 6, pp. 1233–1246, 2022, doi: 10.1007/s10207-022-00607-5.
TEMPL, Matthias und Murat SARIYAR, 2022. A systematic overview on methods to protect sensitive data provided for various analyses. International Journal of Information Security. 2022. Bd. 21, Nr. 6, S. 1233–1246. DOI 10.1007/s10207-022-00607-5
Templ, Matthias, and Murat Sariyar. 2022. “A Systematic Overview on Methods to Protect Sensitive Data Provided for Various Analyses.” International Journal of Information Security 21 (6): 1233–46. https://doi.org/10.1007/s10207-022-00607-5.
Templ, Matthias, and Murat Sariyar. “A Systematic Overview on Methods to Protect Sensitive Data Provided for Various Analyses.” International Journal of Information Security, vol. 21, no. 6, 2022, pp. 1233–46, https://doi.org/10.1007/s10207-022-00607-5.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.