In this age characterized by rapid growth in the volume of data,data deidentification technologies have become crucial in facilitating the analysis of sensitive information.For instance,healthcare information must be ...In this age characterized by rapid growth in the volume of data,data deidentification technologies have become crucial in facilitating the analysis of sensitive information.For instance,healthcare information must be processed through deidentification procedures before being passed to data analysis agencies in order to prevent any exposure of personal details that would violate privacy.As such,privacy protection issues associated with the release of data and data mining have become a popular field of study in the domain of big data.As a strict and verifiable definition of privacy,differential privacy has attracted noteworthy attention and widespread research in recent years.In this study,we analyze the advantages of differential privacy protection mechanisms in comparison to traditional deidentification data protection methods.Furthermore,we examine and analyze the basic theories of differential privacy and relevant studies regarding data release and data mining.展开更多
基金supported by the “Ⅲ Innovative and Prospective Technologies Project(1/1)” of the Institute for Information Industry
文摘In this age characterized by rapid growth in the volume of data,data deidentification technologies have become crucial in facilitating the analysis of sensitive information.For instance,healthcare information must be processed through deidentification procedures before being passed to data analysis agencies in order to prevent any exposure of personal details that would violate privacy.As such,privacy protection issues associated with the release of data and data mining have become a popular field of study in the domain of big data.As a strict and verifiable definition of privacy,differential privacy has attracted noteworthy attention and widespread research in recent years.In this study,we analyze the advantages of differential privacy protection mechanisms in comparison to traditional deidentification data protection methods.Furthermore,we examine and analyze the basic theories of differential privacy and relevant studies regarding data release and data mining.