Reference Hub30
A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes

A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes

Tamas S. Gal, Zhiyuan Chen, Aryya Gangopadhyay
Copyright: © 2008 |Volume: 2 |Issue: 3 |Pages: 17
ISSN: 1930-1650|EISSN: 1930-1669|ISSN: 1930-1650|EISBN13: 9781615203253|EISSN: 1930-1669|DOI: 10.4018/jisp.2008070103
Cite Article Cite Article

MLA

Gal, Tamas S., et al. "A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes." IJISP vol.2, no.3 2008: pp.28-44. http://doi.org/10.4018/jisp.2008070103

APA

Gal, T. S., Chen, Z., & Gangopadhyay, A. (2008). A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes. International Journal of Information Security and Privacy (IJISP), 2(3), 28-44. http://doi.org/10.4018/jisp.2008070103

Chicago

Gal, Tamas S., Zhiyuan Chen, and Aryya Gangopadhyay. "A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes," International Journal of Information Security and Privacy (IJISP) 2, no.3: 28-44. http://doi.org/10.4018/jisp.2008070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The identity of patients must be protected when patient data are shared. The two most commonly used models to protect identity of patients are L-diversity and K-anonymity. However, existing work mainly considers data sets with a single sensitive attribute, while patient data often contain multiple sensitive attributes (e.g., diagnosis and treatment). This article shows that although the K-anonymity model can be trivially extended to multiple sensitive attributes, the L-diversity model cannot. The reason is that achieving L-diversity for each individual sensitive attribute does not guarantee L-diversity over all sensitive attributes. We propose a new model that extends L-diversity and K-anonymity to multiple sensitive attributes and propose a practical method to implement this model. Experimental results demonstrate the effectiveness of our approach.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.