Challenges and open problems of legal document anonymization

GM Csányi, D Nagy, R Vági, JP Vadász, T Orosz - Symmetry, 2021 - mdpi.com
Data sharing is a central aspect of judicial systems. The openly accessible documents can
make the judiciary system more transparent. On the other hand, the published legal …

Re-identification attacks—A systematic literature review

J Henriksen-Bulmer, S Jeary - International Journal of Information …, 2016 - Elsevier
The publication of increasing amounts of anonymised open source data has resulted in a
worryingly rising number of successful re-identification attacks. This has a number of privacy …

SoK: Managing risks of linkage attacks on data privacy

J Powar, AR Beresford - Proceedings on Privacy Enhancing …, 2023 - petsymposium.org
Novel attacks on dataset privacy are usually met with the same range of responses: surprise
that a route to information gain exists from information previously thought to be safe; …

Fast database joins and PSI for secret shared data

P Mohassel, P Rindal, M Rosulek - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
We present a scalable protocol for database joins on secret shared data in the honest-
majority three-party setting. The key features of our protocol are a rich set of SQL-like …

Database matching under column deletions

S Bakırtaş, E Erkip - 2021 IEEE International Symposium on …, 2021 - ieeexplore.ieee.org
De-anonymizing user identities by matching various forms of user data available on the
internet raises privacy concerns. A fundamental understanding of the privacy leakage in …

A concentration of measure approach to database de-anonymization

F Shirani, S Garg, E Erkip - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
In this paper, matching of correlated high-dimensional databases is investigated. A
stochastic database model is considered where the correlation among the database entries …

[PDF][PDF] Robust de-anonymization of large sparse datasets: a decade later

A Narayanan, V Shmatikov - May, 2019 - randomwalker.info
If our paper has stood the test of time, it is because the core technical insight goes back at
least 60 years: a small number of data points about an individual, none of which are …

Seeded database matching under noisy column repetitions

S Bakirtas, E Erkip - 2022 IEEE Information Theory Workshop …, 2022 - ieeexplore.ieee.org
The re-identification or de-anonymization of users from anonymized data through matching
with publicly-available correlated user data has raised privacy concerns, leading to the …

Toward an anonymous process mining

A Burattin, M Conti, D Turato - … on future Internet of Things and …, 2015 - ieeexplore.ieee.org
Process mining is a modern family of techniques applied to datasets generated from
business processes run in organizations, in order to improve and obtain useful insights and …

On the feasibility of user de-anonymization from shared mobile sensor data

ND Lane, J Xie, T Moscibroda, F Zhao - Proceedings of the Third …, 2012 - dl.acm.org
Underpinning many recent advances in sensing applications (eg, mHealth) is the ability to
safely collect and share mobile sensor data. Research has shown that even from seemingly …