{"created":"2023-05-15T08:44:59.422077+00:00","id":10328,"links":{},"metadata":{"_buckets":{"deposit":"a3c4c598-273a-4518-b49d-39773efe5115"},"_deposit":{"created_by":13,"id":"10328","owners":[13],"pid":{"revision_id":0,"type":"depid","value":"10328"},"status":"published"},"_oai":{"id":"oai:uec.repo.nii.ac.jp:00010328","sets":["6"]},"author_link":["27416","27414","27415"],"item_10001_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2022-05-20","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"72","bibliographicPageStart":"62","bibliographicVolumeNumber":"3","bibliographic_titles":[{},{"bibliographic_title":"IEEE Open Journal of the Computer Society","bibliographic_titleLang":"en"}]}]},"item_10001_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Efforts to counter COVID-19 reaffirmed the importance of rich medical, behavioral, and sociological data. To make data available to many researchers who can conduct statistical analyses and machine learning, personally identifiable information must be excluded to protect individual privacy. It is essential to remove explicit identifiers, sample population data, and apply differential privacy, the de facto standard privacy metric. Despite the general belief that the risk of re-identification is insignificant when these techniques are applied, this study shows that even after applying these techniques, the risk of being re-identified is highly significant for some data. This study proposes in detail an algorithm for estimating the number of people in a population who have certain attribute values based on incomplete, differentially private databases. If the estimated number is one, the probability that only one person with that attribute value is present in the population is high, which means that there is a high probability of re-identification. Therefore, this study concludes that the re-identification risk must be evaluated even after applying state-of-the-art techniques to protect privacy.","subitem_description_type":"Abstract"}]},"item_10001_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"IEEE"}]},"item_10001_relation_14":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"10.1109/OJCS.2022.3175999","subitem_relation_type_select":"DOI"}}]},"item_10001_relation_17":{"attribute_name":"関連サイト","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"https://doi.org/10.1109/OJCS.2022.3175999","subitem_relation_type_select":"DOI"}}]},"item_10001_rights_15":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"(c) 2022 Author(s).This article is distributed under a Creative Commons Attribution (CC BY 4.0) License."}]},"item_10001_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"26441268","subitem_source_identifier_type":"ISSN"}]},"item_10001_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Sei, Yuichi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Okumura, Hiroshi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ohsuga, Akihiko","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2023-03-13"}],"displaytype":"detail","filename":"OJCS.2022.3175999.pdf","filesize":[{"value":"2.8 MB"}],"format":"application/pdf","license_note":"CC BY 4.0\n","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"OJCS.2022.3175999.pdf","url":"https://uec.repo.nii.ac.jp/record/10328/files/OJCS.2022.3175999.pdf"},"version_id":"36bd558d-e735-422f-9b10-9cee27108d59"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Differential privacy","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"ethical and privacy framework","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"re-identification","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Re-Identification in Differentially Private Incomplete Datasets","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Re-Identification in Differentially Private Incomplete Datasets","subitem_title_language":"en"}]},"item_type_id":"10001","owner":"13","path":["6"],"pubdate":{"attribute_name":"公開日","attribute_value":"2023-03-13"},"publish_date":"2023-03-13","publish_status":"0","recid":"10328","relation_version_is_last":true,"title":["Re-Identification in Differentially Private Incomplete Datasets"],"weko_creator_id":"13","weko_shared_id":-1},"updated":"2023-05-15T09:25:25.628952+00:00"}