ANONYMIZATION TECHNIQUES TO PROTECT DATA
First Claim
1. A computer implemented method to anonymize data, the method comprising:
- receiving a set of data for a data analysis, wherein the set of data includes personal identifiable information;
correspondingly determining one or more risk rates and one or more utility rates for one or more combinations of anonymization techniques defined for data fields from the set of data;
based on an evaluation of the one or more risk rates and the one or more utility rates, determining a combination of anonymization techniques from the one or more anonymization techniques to be applied over the set of data; and
anonymizing the set of data according to the determined combination of anonymization techniques.
1 Assignment
0 Petitions
Accused Products
Abstract
A set of data is received for a data analysis. The set of data includes personal identifiable information. The set of data is anonymized to protect the privacy information. Risk rates and utility rates are determined for a number of combinations of anonymization techniques defined correspondingly for data fields from the set of data. A risk rate is related to a privacy protection failure when defining first anonymized data through applying a combination of anonymization techniques for the data fields. A utility rate is related to accuracy of the data analysis when applied over the anonymized data. Based on evaluation of the risk rates and the utility rates, one or more anonymization techniques from the number of anonymization techniques are determined. The set of data is anonymized according to a determined anonymization techniques and/or a combination thereof.
-
Citations
20 Claims
-
1. A computer implemented method to anonymize data, the method comprising:
-
receiving a set of data for a data analysis, wherein the set of data includes personal identifiable information; correspondingly determining one or more risk rates and one or more utility rates for one or more combinations of anonymization techniques defined for data fields from the set of data; based on an evaluation of the one or more risk rates and the one or more utility rates, determining a combination of anonymization techniques from the one or more anonymization techniques to be applied over the set of data; and anonymizing the set of data according to the determined combination of anonymization techniques. - View Dependent Claims (2, 3, 4)
-
-
5. A computer system to provide remote rendering of electronic documents comprising:
-
a processor; a memory in association with the processor storing instructions related to; receiving a data set for a data analysis, wherein the data set includes personal identifiable information; correspondingly determining risk rate values and utility rate values for anonymization techniques defined for data fields from the data set; based on an evaluation of the risk rate values and the utility rate values, determining at least one anonymization technique from the anonymization techniques to be applied over the set of data; and anonymizing the data set according to the determined at least one anonymization technique. - View Dependent Claims (6, 7, 8, 9, 10, 11)
-
-
12. A non-transitory computer-readable medium storing instructions, which when executed cause a computer system to:
-
determine one or more analysis queries related to a data analysis definition associated with a data set; determine privacy parameter threshold values for anonymization techniques based on evaluation of a plurality of attributes and pre-defined anonymization determination rules; determine a set of risk rates associated with levels of privacy presentation of anonymized data versions for a set of anonymization techniques from the anonymization techniques, wherein generated anonymized data is corresponding to an anonymization technique being applied the received set of data; determine a set of utility rates for the set of anonymization techniques, wherein a utility rate is associated with accuracy of query results generated based on execution of a query from the one or more analysis queries over generated anonymized data according to an associated anonymization technique and query results received from executing the query over the data set; based on determined risk rates and utility rates, generate utility quantifiers for the anonymization techniques as interpretation of determined risk rates for the corresponding anonymization techniques; and based on the generated utility quantifiers, determine at least one of the anonymization techniques to be applied over the set of data. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification