Skip to main content

Linking Sensitive Data

Methods and Techniques for Practical Privacy-Preserving Information Sharing

  • Book
  • © 2020

Overview

  • Provides modern technical answers to the legal requirements of pseudonymisation as recommended by privacy legislation

  • Covers topics such as modern regulatory frameworks, concepts and algorithms for privacy-preserving record linkage, and evaluates existing techniques

  • Includes pointers to freely available software tools, benchmark data sets, and tools to generate synthetic test data

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (14 chapters)

  1. Introduction

  2. Methods and Techniques

  3. Practical Aspects, Evaluation, and Applications

  4. Outlook

Keywords

About this book

This book provides modern technical answers to the legal requirements of pseudonymisation as recommended by privacy legislation. It covers topics such as modern regulatory frameworks for sharing and linking sensitive information, concepts and algorithms for privacy-preserving record linkage and their computational aspects, practical considerations such as dealing with dirty and missing data, as well as privacy, risk, and performance assessment measures. Existing techniques for privacy-preserving record linkage are evaluated empirically and real-world application examples that scale to population sizes are described. The book also includes pointers to freely available software tools, benchmark data sets, and tools to generate synthetic data that can be used to test and evaluate linkage techniques.

This book consists of fourteen chapters grouped into four parts, and two appendices. The first part introduces the reader to the topic of linking sensitive data, the second part covers methods and techniques to link such data, the third part discusses aspects of practical importance, and the fourth part provides an outlook of future challenges and open research problems relevant to linking sensitive databases. The appendices provide pointers and describe freely available, open-source software systems that allow the linkage of sensitive data, and provide further details about the evaluations presented. A companion Web site at https://dmm.anu.edu.au/lsdbook2020 provides additional material and Python programs used in the book.

This book is mainly written for applied scientists, researchers, and advanced practitioners in governments, industry, and universities who are concerned with developing, implementing, and deploying systems and tools to share sensitive information in administrative, commercial, or medical databases.


The Book describes how linkage methods work and how to evaluate their performance. It covers all the major concepts and methods and also discusses practical matters such as computational efficiency, which are critical if the methods are to be used in practice - and it does all this in a highly accessible way!
David J. Hand, Imperial College, London













Reviews

The Book describes how linkage methods work and how to evaluate their performance. It covers all the major concepts and methods and also discusses practical matters such as computational efficiency, which are critical if the methods are to be used in practice - and it does all this in a highly accessible way!

David J Hand, Imperial College, London


Authors and Affiliations

  • Research School of Computer Science, The Australian National University, Canberra, Australia

    Peter Christen, Thilina Ranbaduge

  • Institut für Soziologie, Universität Duisburg-Essen, Duisburg, Germany

    Rainer Schnell

About the authors

Peter Christen is Professor at the Australian National University (ANU) Research School of Computer Science (RSCS). His research interests are in record linkage and data mining, with a focus on privacy and machine learning aspects of record linkage. He has published nearly 200 articles in these areas, including the monograph "Data Matching" published by Springer in 2012.

Thilina Ranbaduge is a research fellow at the Australian National University (ANU) Research School of Computer Science (RSCS). His research interests are in privacy-preserving record linkage, multi-database linkage, and data mining. He has published more than 30 papers related to record linkage and privacy-preserving record linkage.

Rainer Schnell is Professor at the University of Duisburg-Essen and holds the Chair in Research Methodology in the Social Sciences. He had been Director of the Centre of Comparative Social Surveys at the University of London, City from 2015 to 2017. He is a survey methodologist with a research focus on non-sampling errors, applied sampling, census operations, and privacy-preserving record linkage. He has published four books on research methodology and more than 60 papers on record linkage.


Bibliographic Information

  • Book Title: Linking Sensitive Data

  • Book Subtitle: Methods and Techniques for Practical Privacy-Preserving Information Sharing

  • Authors: Peter Christen, Thilina Ranbaduge, Rainer Schnell

  • DOI: https://doi.org/10.1007/978-3-030-59706-1

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer Nature Switzerland AG 2020

  • Hardcover ISBN: 978-3-030-59705-4Published: 18 October 2020

  • Softcover ISBN: 978-3-030-59708-5Published: 19 October 2021

  • eBook ISBN: 978-3-030-59706-1Published: 17 October 2020

  • Edition Number: 1

  • Number of Pages: XXII, 468

  • Number of Illustrations: 8 b/w illustrations, 51 illustrations in colour

  • Topics: Knowledge based Systems, Information Storage and Retrieval, Privacy, Principles and Models of Security

Publish with us