•  
  •  
 

Abstract

This article presents a systematic approach to personal data protection through depersonalization in the context of regulatory pressure and growing cyber threats. It proposes a comprehensive conceptual model that formalizes the de-identification process as a manageable sequence of steps, from attribute classification and method selection to mandatory verification of the result. The article also provides a comparative analysis of existing depersonalization methods in terms of their applicability within the proposed model. The model serves as a basis for the development of specific algorithms, as demonstrated by the example of a data shuffling approach.

First Page

90

Last Page

95

References

  1. Schwartz, P.M., Solove, D.J. (2011). The PII Problem: Privacy and a New Concept of Personally Identifiable Information. NYU Law Review. 86. 1814-1890.
  2. Regulation (EU) 2016/679 (GDPR). (2016). General Data Protection Regulation.
  3. Grinyaev, S.N., Dovgyi, A.B. (2021). Current issues in personal data protection in the context of digital transformation. Cybersecurity Issues. 2(44). 12-21.
  4. Ganiev, A.A., Kerimov, K.F., Azizova, Z.I. (2021). Understanding of Data De-identification: Issues of Relevance and Problems. 2021 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 1-4. doi: 10.1109/ICISCT52966.2021.9670054.
  5. Law of the Republic of Uzbekistan. (2019). On Personal Data (№ LRU-547).
  6. El Emam, K., Arbuckle, L. (2013). Anonymizing Health Data: Case Studies and Methods to Get You Started. O’Reilly Media.
  7. ISO/IEC 20889. (2018). Privacy enhancing data de-identification terminology and classification of techniques.
  8. Cavoukian, A., El Emam, K. (2011). Dispelling the Myths Surrounding De-identification: Anonymization Remains a Strong Tool for Protecting Privacy. Information and Privacy Commissioner of Ontario.
  9. Melnikov, A.A., Petrov, K.V. (2020). Principles for building systems for depersonalizing personal data in state information systems. Information and Security. 23(3), 342–349.
  10. Dwork, C., Roth, A. (2014). The Algorithmic Foundations of Differential Privacy. Foundations and Trends® in Theoretical Computer Science. 9(3–4). 211–407.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.