skip to main content
opinion
Free Access

The anonymization debate should be about risk, not perfection

Published:24 April 2017Publication History
Skip Abstract Section

Abstract

Focusing on the process of anonymity rather than pursuing the unattainable goal of guaranteed safety.

References

  1. Cavoukian, A. and El Emam, K. Dispelling the Myths Surrounding Deidentification: Anonymization Remains a Strong Tool for Protecting Privacy. Information and Privacy Commissioner of Ontario, 2011; http://bit.ly/2nJEcNnGoogle ScholarGoogle Scholar
  2. Garfinkel, S.L. De-Identification of Personal Information. National Institute of Standards and Technology, 2015; http://bit.ly/2cz28geGoogle ScholarGoogle Scholar
  3. Gellman, R. The deidentification dilemma: A legislative and contractual proposal. 21 Fordham Intell. Prop. Media & Ent. L.J. 33, 2010.Google ScholarGoogle Scholar
  4. Hartzog, W. and Solove, D.J. The scope and potential of FTC data protection. 83 Geo. Washington Law Review 2230, 2015.Google ScholarGoogle Scholar
  5. Kinney, S.K. et al. Data confidentiality: The next five years summary and guide to papers. J. Privacy and Confidentiality 125 (2009).Google ScholarGoogle Scholar
  6. Narayanan, A. and Felten, E.W. No silver bullet: De-identification still doesn't work, 2014; http://bit.ly/1kEPwxVGoogle ScholarGoogle Scholar
  7. Narayanan, A. and Shmatikov, V. Robust de-anonymization of large sparse datasets. In Proceedings of the 2008 29th IEEE Symposium on Security and Privacy 111. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The anonymization debate should be about risk, not perfection

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Communications of the ACM
      Communications of the ACM  Volume 60, Issue 5
      May 2017
      101 pages
      ISSN:0001-0782
      EISSN:1557-7317
      DOI:10.1145/3084186
      • Editor:
      • Moshe Y. Vardi
      Issue’s Table of Contents

      Copyright © 2017 Copyright is held by the owner/author(s)

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 24 April 2017

      Check for updates

      Qualifiers

      • opinion
      • Popular
      • Un-reviewed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format