volume 23 issue 3 pages 2189-2201

Mastering data privacy: leveraging K-anonymity for robust health data sharing

Stylianos Karagiannis 1, 2
Christoforos Ntantogian 1
Emmanouil Magkos 1
Aggeliki Tsohou 1
Luís Landeiro Ribeiro 2
Publication typeJournal Article
Publication date2024-03-26
scimago Q2
wos Q2
SJR0.753
CiteScore6.3
Impact factor3.2
ISSN16155262, 16155270
Information Systems
Computer Networks and Communications
Software
Safety, Risk, Reliability and Quality
Abstract

In modern healthcare systems, data sources are highly integrated, and the privacy challenges are becoming a paramount concern. Despite the critical importance of privacy preservation in safeguarding sensitive and private information across various domains, there is a notable deficiency of learning and training material for privacy preservation. In this research, we present a k-anonymity algorithm explicitly for educational purposes. The development of the k-anonymity algorithm is complemented by seven validation tests, that have also been used as a basis for constructing five learning scenarios on privacy preservation. The outcomes of this research provide a practical understanding of a well-known privacy preservation technique and extends the familiarity of k-anonymity and the fundamental concepts of privacy protection to a broader audience.

Found 
Found 

Top-30

Journals

1
2
Lecture Notes in Computer Science
2 publications, 15.38%
BMC Medical Informatics and Decision Making
1 publication, 7.69%
Scientific Reports
1 publication, 7.69%
Applied Intelligence
1 publication, 7.69%
Informatics and Health
1 publication, 7.69%
Journal of Information Security and Applications
1 publication, 7.69%
Discover Computing
1 publication, 7.69%
International Journal of Information Security
1 publication, 7.69%
Communications in Computer and Information Science
1 publication, 7.69%
Journal of Medical Internet Research
1 publication, 7.69%
1
2

Publishers

1
2
3
4
5
6
7
8
Springer Nature
8 publications, 61.54%
Elsevier
2 publications, 15.38%
Institute of Electrical and Electronics Engineers (IEEE)
2 publications, 15.38%
JMIR Publications
1 publication, 7.69%
1
2
3
4
5
6
7
8
  • We do not take into account publications without a DOI.
  • Statistics recalculated weekly.

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
13
Share
Cite this
GOST |
Cite this
GOST Copy
Karagiannis S. et al. Mastering data privacy: leveraging K-anonymity for robust health data sharing // International Journal of Information Security. 2024. Vol. 23. No. 3. pp. 2189-2201.
GOST all authors (up to 50) Copy
Karagiannis S., Ntantogian C., Magkos E., Tsohou A., Ribeiro L. L. Mastering data privacy: leveraging K-anonymity for robust health data sharing // International Journal of Information Security. 2024. Vol. 23. No. 3. pp. 2189-2201.
RIS |
Cite this
RIS Copy
TY - JOUR
DO - 10.1007/s10207-024-00838-8
UR - https://doi.org/10.1007/s10207-024-00838-8
TI - Mastering data privacy: leveraging K-anonymity for robust health data sharing
T2 - International Journal of Information Security
AU - Karagiannis, Stylianos
AU - Ntantogian, Christoforos
AU - Magkos, Emmanouil
AU - Tsohou, Aggeliki
AU - Ribeiro, Luís Landeiro
PY - 2024
DA - 2024/03/26
PB - Springer Nature
SP - 2189-2201
IS - 3
VL - 23
SN - 1615-5262
SN - 1615-5270
ER -
BibTex |
Cite this
BibTex (up to 50 authors) Copy
@article{2024_Karagiannis,
author = {Stylianos Karagiannis and Christoforos Ntantogian and Emmanouil Magkos and Aggeliki Tsohou and Luís Landeiro Ribeiro},
title = {Mastering data privacy: leveraging K-anonymity for robust health data sharing},
journal = {International Journal of Information Security},
year = {2024},
volume = {23},
publisher = {Springer Nature},
month = {mar},
url = {https://doi.org/10.1007/s10207-024-00838-8},
number = {3},
pages = {2189--2201},
doi = {10.1007/s10207-024-00838-8}
}
MLA
Cite this
MLA Copy
Karagiannis, Stylianos, et al. “Mastering data privacy: leveraging K-anonymity for robust health data sharing.” International Journal of Information Security, vol. 23, no. 3, Mar. 2024, pp. 2189-2201. https://doi.org/10.1007/s10207-024-00838-8.