{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:39:18Z","timestamp":1775666358804,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T00:00:00Z","timestamp":1711411200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T00:00:00Z","timestamp":1711411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Ionian University"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In modern healthcare systems, data sources are highly integrated, and the privacy challenges are becoming a paramount concern. Despite the critical importance of privacy preservation in safeguarding sensitive and private information across various domains, there is a notable deficiency of learning and training material for privacy preservation. In this research, we present a k-anonymity algorithm explicitly for educational purposes. The development of the k-anonymity algorithm is complemented by seven validation tests, that have also been used as a basis for constructing five learning scenarios on privacy preservation. The outcomes of this research provide a practical understanding of a well-known privacy preservation technique and extends the familiarity of k-anonymity and the fundamental concepts of privacy protection to a broader audience.<\/jats:p>","DOI":"10.1007\/s10207-024-00838-8","type":"journal-article","created":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T13:02:42Z","timestamp":1711458162000},"page":"2189-2201","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Mastering data privacy: leveraging K-anonymity for robust health data sharing"],"prefix":"10.1007","volume":"23","author":[{"given":"Stylianos","family":"Karagiannis","sequence":"first","affiliation":[]},{"given":"Christoforos","family":"Ntantogian","sequence":"additional","affiliation":[]},{"given":"Emmanouil","family":"Magkos","sequence":"additional","affiliation":[]},{"given":"Aggeliki","family":"Tsohou","sequence":"additional","affiliation":[]},{"given":"Lu\u00eds Landeiro","family":"Ribeiro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,26]]},"reference":[{"key":"838_CR1","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.bpobgyn.2016.12.006","volume":"43","author":"R Artal","year":"2017","unstructured":"Artal, R., Rubenfeld, S.: Ethical issues in research. Best Pract. Res. Clin. Obstet. Gynaecol. 43, 107\u2013114 (2017)","journal-title":"Best Pract. Res. Clin. Obstet. Gynaecol."},{"issue":"3","key":"838_CR2","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.jsmc.2020.06.004","volume":"15","author":"BG Fields","year":"2020","unstructured":"Fields, B.G.: Regulatory, legal, and ethical considerations of telemedicine. Sleep Med. Clin. 15(3), 409\u2013416 (2020)","journal-title":"Sleep Med. Clin."},{"issue":"1","key":"838_CR3","doi-asserted-by":"publisher","first-page":"8","DOI":"10.4274\/balkanmedj.2017.0966","volume":"35","author":"M Kayaalp","year":"2018","unstructured":"Kayaalp, M.: Patient privacy in the era of big data. Balkan Med. J. 35(1), 8\u201317 (2018)","journal-title":"Balkan Med. J."},{"key":"838_CR4","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/s11948-013-9511-y","volume":"20","author":"I B\u00fcschel","year":"2014","unstructured":"B\u00fcschel, I., Mehdi, R., Cammilleri, A., Marzouki, Y., Elger, B.: Protecting human health and security in digital Europe: how to deal with the \u201cprivacy paradox\"\u202f? Sci. Eng. Ethics 20, 639\u2013658 (2014)","journal-title":"Sci. Eng. Ethics"},{"issue":"05","key":"838_CR5","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 571\u2013588 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"838_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102488","volume":"111","author":"D Slijep\u010devi\u0107","year":"2021","unstructured":"Slijep\u010devi\u0107, D., Henzl, M., Klausner, L.D., Dam, T., Kieseberg, P., Zeppelzauer, M.: k-anonymity in practice: How generalisation and suppression affect machine learning classifiers. Comput. Secur. 111, 102488 (2021)","journal-title":"Comput. Secur."},{"key":"838_CR7","doi-asserted-by":"crossref","unstructured":"Ren, W., Ghazinour, K., Lian, X.: $$ kt $$-safety: graph release via $$ k $$-anonymity and $$ t $$-closeness. IEEE Trans. Knowl. Data Eng. (2022)","DOI":"10.1109\/TKDE.2022.3221333"},{"issue":"05","key":"838_CR8","doi-asserted-by":"publisher","first-page":"2250083","DOI":"10.1142\/S0218126622500839","volume":"31","author":"T Wang","year":"2022","unstructured":"Wang, T., Xu, L., Zhang, M., Zhang, H., Zhang, G.: A new privacy protection approach based on k-anonymity for location-based cloud services. J. Circuits Syst. Comput. 31(05), 2250083 (2022)","journal-title":"J. Circuits Syst. Comput."},{"key":"838_CR9","unstructured":"K-Anonymity-Unveiled: K-Anonymity Demystified: Dive into k-Anonymity\u2019s core with code and visuals. Learn how to safeguard privacy while preserving data, github.com. https:\/\/github.com\/ionianCTF\/K-Anonymity-Unveiled. Accessed 12 Aug 2023"},{"key":"838_CR10","doi-asserted-by":"crossref","unstructured":"Ren, W.,Tong, X.,Du, J.,Wang, N., Li, S., Min, G., Zhao, Z.: Privacy enhancing techniques in the internet of things using data anonymisation. Inf. Syst. Front., pp.\u00a01\u201312 (2021)","DOI":"10.1007\/s10796-021-10116-w"},{"key":"838_CR11","doi-asserted-by":"crossref","unstructured":"Dimopoulou, S., Symvoulidis, C., Koutsoukos, K., Kiourtis, A., Mavrogiorgou, A., Kyriazis, D.: Mobile anonymization and pseudonymization of structured health data for research. In: 2022 Seventh International Conference On Mobile and Secure Services (MobiSecServ), pp.\u00a01\u20136, IEEE (2022)","DOI":"10.1109\/MobiSecServ50855.2022.9727206"},{"key":"838_CR12","doi-asserted-by":"crossref","unstructured":"Louassef, B.R., Chikouche, N.: Privacy preservation in healthcare systems. In: 2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP), pp.\u00a01\u20136, IEEE (2021)","DOI":"10.1109\/AI-CSP52968.2021.9671083"},{"issue":"3","key":"838_CR13","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1080\/03081079.2023.2173749","volume":"52","author":"O Vovk","year":"2023","unstructured":"Vovk, O., Piho, G., Ross, P.: Methods and tools for healthcare data anonymization: a literature review. Int. J. Gen. Syst. 52(3), 326\u2013342 (2023)","journal-title":"Int. J. Gen. Syst."},{"key":"838_CR14","doi-asserted-by":"crossref","unstructured":"Jain, P.,Gyanchandani, M., Khare, N.: Improved k-anonymity privacy-preserving algorithm using Madhya Pradesh state election commission big data. In: Integrated Intelligent Computing, Communication and Security, pp.\u00a01\u201310 (2019)","DOI":"10.1007\/978-981-10-8797-4_1"},{"key":"838_CR15","doi-asserted-by":"crossref","unstructured":"\u0160ar\u010devi\u0107, T., Molnar, D., Mayer, R.: An analysis of different notions of effectiveness in k-anonymity. In: Privacy in Statistical Databases: UNESCO Chair in Data Privacy, International Conference, PSD 2020, Tarragona, Spain, September 23\u201325, 2020, Proceedings, pp.\u00a0121\u2013135, Springer (2020)","DOI":"10.1007\/978-3-030-57521-2_9"},{"issue":"1","key":"838_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-019-0193-4","volume":"6","author":"P Jain","year":"2019","unstructured":"Jain, P., Gyanchandani, M., Khare, N.: Enhanced secured map reduce layer for big data privacy and security. J. Big Data 6(1), 1\u201317 (2019)","journal-title":"J. Big Data"},{"issue":"12","key":"838_CR17","first-page":"172","volume":"17","author":"K Rajendran","year":"2017","unstructured":"Rajendran, K., Jayabalan, M., Rana, M.E.: A study on k-anonymity, l-diversity, and t-closeness techniques. IJCSNS 17(12), 172 (2017)","journal-title":"IJCSNS"},{"key":"838_CR18","doi-asserted-by":"crossref","unstructured":"Abubakar, I.B., Yagnik, T., Mohammed, K.: Robustness of k-anonymization model in compliance with general data protection regulation. In: 2022 5th International Conference on Computing and Big Data (ICCBD), pp.\u00a067\u201372, IEEE (2022)","DOI":"10.1109\/ICCBD56965.2022.10080616"},{"issue":"11","key":"838_CR19","doi-asserted-by":"publisher","first-page":"338","DOI":"10.3390\/fi14110338","volume":"14","author":"M Asad","year":"2022","unstructured":"Asad, M., Aslam, M., Jilani, S.F., Shaukat, S., Tsukada, M.: Shfl: K-anonymity-based secure hierarchical federated learning framework for smart healthcare systems. Future Internet 14(11), 338 (2022)","journal-title":"Future Internet"},{"key":"838_CR20","doi-asserted-by":"crossref","unstructured":"Sangaiah, A.K., Javadpour, A., Ja\u2019fari, F., Pinto, P., Chuang, H.-M.: Privacy-aware and ai techniques for healthcare based on k-anonymity model in internet of things. IEEE Trans. Eng. Manag. (2023)","DOI":"10.1109\/TEM.2023.3271591"},{"key":"838_CR21","doi-asserted-by":"crossref","unstructured":"Mahesh, R., Meyyappan, T.: Anonymization technique through record elimination to preserve privacy of published data. In: 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, pp.\u00a0328\u2013332, IEEE (2013)","DOI":"10.1109\/ICPRIME.2013.6496495"},{"issue":"1","key":"838_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-017-0110-7","volume":"5","author":"K Abouelmehdi","year":"2018","unstructured":"Abouelmehdi, K., Beni-Hessane, A., Khaloufi, H.: Big healthcare data: preserving security and privacy. J. Big Data 5(1), 1\u201318 (2018)","journal-title":"J. Big Data"},{"issue":"4","key":"838_CR23","doi-asserted-by":"publisher","first-page":"2425","DOI":"10.1007\/s13369-019-03999-0","volume":"45","author":"K Arava","year":"2020","unstructured":"Arava, K., Lingamgunta, S.: Adaptive k-anonymity approach for privacy preserving in cloud. Arab. J. Sci. Eng. 45(4), 2425\u20132432 (2020)","journal-title":"Arab. J. Sci. Eng."},{"key":"838_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2023.102193","volume":"115","author":"D De Pascale","year":"2023","unstructured":"De Pascale, D., Cascavilla, G., Tamburri, D.A., Van Den Heuvel, W.-J.: Real-world k-anonymity applications: the kgen approach and its evaluation in fraudulent transactions. Inf. Syst. 115, 102193 (2023)","journal-title":"Inf. Syst."},{"key":"838_CR25","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1109\/ACCESS.2017.2767561","volume":"6","author":"MA Sahi","year":"2017","unstructured":"Sahi, M.A., Abbas, H., Saleem, K., Yang, X., Derhab, A., Orgun, M.A., Iqbal, W., Rashid, I., Yaseen, A.: Privacy preservation in e-healthcare environments: state of the art and future directions. IEEE Access 6, 464\u2013478 (2017)","journal-title":"IEEE Access"},{"key":"838_CR26","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s10586-020-03106-1","volume":"24","author":"T Kanwal","year":"2021","unstructured":"Kanwal, T., Anjum, A., Khan, A.: Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities. Clust. Comput. 24, 293\u2013317 (2021)","journal-title":"Clust. Comput."},{"key":"838_CR27","doi-asserted-by":"crossref","unstructured":"Gao, D., Liu, Y., Huang, A., Ju, C., Yu, H., Yang, Q.: Privacy-preserving heterogeneous federated transfer learning. In: 2019 IEEE International Conference on Big Data (Big Data), pp.\u00a02552\u20132559, IEEE (2019)","DOI":"10.1109\/BigData47090.2019.9005992"},{"key":"838_CR28","doi-asserted-by":"crossref","unstructured":"Simon, G.E., Shortreed, S.M., Coley, R.Y., Penfold, R.B., Rossom, R.C., Waitzfelder, B.E., Sanchez, K., Lynch, F.L.: Assessing and minimizing re-identification risk in research data derived from health care records. eGEMs, 7(1) (2019)","DOI":"10.5334\/egems.270"},{"key":"838_CR29","unstructured":"Github - nsubhaan\/heart, github.com. https:\/\/github.com\/nsubhaan\/Heart. Accessed 18 June 2023"},{"key":"838_CR30","doi-asserted-by":"crossref","unstructured":"Velakanti, G., Jarathi, S., Harshini, M., Ankam, P., Vuppu, S.: Heart disease prediction using deep learning algorithm. In: International Conference on Soft Computing and Signal Processing, pp.\u00a083\u201396 Springer (2021)","DOI":"10.1007\/978-981-16-7088-6_7"},{"key":"838_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105995","volume":"87","author":"C-Y Lin","year":"2020","unstructured":"Lin, C.-Y.: A reversible privacy-preserving clustering technique based on k-means algorithm. Appl. Soft Comput. 87, 105995 (2020)","journal-title":"Appl. Soft Comput."},{"key":"838_CR32","doi-asserted-by":"crossref","unstructured":"Gowda, V.T., Bagai, R.: Generating t-closed partitions of datasets with multiple sensitive attributes. In: 2023 7th International Conference on Cryptography, Security and Privacy (CSP), pp.\u00a0107\u2013111, IEEE (2023)","DOI":"10.1109\/CSP58884.2023.00024"},{"key":"838_CR33","doi-asserted-by":"publisher","first-page":"79264","DOI":"10.1109\/ACCESS.2022.3194159","volume":"10","author":"YS Bae","year":"2022","unstructured":"Bae, Y.S., Park, Y., Lee, S.M., Seo, H.H., Lee, H., Ko, T., Lee, E., Park, S.M., Yoon, H.-J.: Development of blockchain-based health information exchange platform using hl7 fhir standards: usability test. IEEE Access 10, 79264\u201379271 (2022)","journal-title":"IEEE Access"},{"key":"838_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-019-1183-y","volume":"43","author":"A Kiourtis","year":"2019","unstructured":"Kiourtis, A., Mavrogiorgou, A., Menychtas, A., Maglogiannis, I., Kyriazis, D.: Structurally mapping healthcare data to hl7 fhir through ontology alignment. J. Med. Syst. 43, 1\u201313 (2019)","journal-title":"J. Med. Syst."},{"issue":"9","key":"838_CR35","doi-asserted-by":"publisher","first-page":"1642","DOI":"10.1093\/jamia\/ocac105","volume":"29","author":"SN Duda","year":"2022","unstructured":"Duda, S.N., Kennedy, N., Conway, D., Cheng, A.C., Nguyen, V., Zayas-Cab\u00e1n, T., Harris, P.A.: Hl7 fhir-based tools and initiatives to support clinical research: a scoping review. J. Am. Med. Inform. Assoc. 29(9), 1642\u20131653 (2022)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"838_CR36","unstructured":"GitHub - scikit-learn\/scikit-learn: scikit-learn: machine learning in Python, github.com. https:\/\/github.com\/scikit-learn\/scikit-learn. Accessed 25 June 2023"},{"key":"838_CR37","unstructured":"GitHub - numpy\/numpy: The fundamental package for scientific computing with Python, github.com. https:\/\/github.com\/numpy\/numpy. Accessed 25 June 2023"},{"key":"838_CR38","unstructured":"GitHub - scipy\/scipy: SciPy library main repository, github.com. https:\/\/github.com\/scipy\/scipy. Accessed 25 June 2023"},{"key":"838_CR39","unstructured":"GitHub - pandas-dev\/pandas: Flexible and powerful data analysis\/manipulation library for python, providing labeled data structures similar to R data.frame objects, statistical functions, and much more, github.com. https:\/\/github.com\/pandas-dev\/pandas. Accessed 25 June 2023"},{"key":"838_CR40","unstructured":"GitHub - jupyter\/notebook: Jupyter Interactive Notebook, github.com. https:\/\/github.com\/jupyter\/notebook. Accessed 25 June 2023"},{"key":"838_CR41","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J.,Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD), 1(1), pp.\u00a03\u2013es (2007)","DOI":"10.1145\/1217299.1217302"},{"key":"838_CR42","doi-asserted-by":"crossref","unstructured":"Shah, A., Abbas, H., Iqbal, W., Latif, R.: Enhancing e-healthcare privacy preservation framework through l-diversity. In: 2018 14th International Wireless Communications and Mobile Computing Conference (IWCMC), pp.\u00a0394\u2013399, IEEE (2018)","DOI":"10.1109\/IWCMC.2018.8450306"},{"key":"838_CR43","doi-asserted-by":"crossref","unstructured":"Parra-Arnau, J., Rebollo-Monedero, D., Forn\u00e9, J.: Privacy-enhancing technologies and metrics in personalized information systems. In: Advanced Research in Data Privacy, pp.\u00a0423\u2013442, Springer (2014)","DOI":"10.1007\/978-3-319-09885-2_23"},{"key":"838_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2022.09.004","volume":"613","author":"L Caruccio","year":"2022","unstructured":"Caruccio, L., Desiato, D., Polese, G., Tortora, G., Zannone, N.: A decision-support framework for data anonymization with application to machine learning processes. Inf. Sci. 613, 1\u201332 (2022)","journal-title":"Inf. Sci."},{"key":"838_CR45","doi-asserted-by":"publisher","first-page":"51071","DOI":"10.1109\/ACCESS.2020.2980235","volume":"8","author":"A Zigomitros","year":"2020","unstructured":"Zigomitros, A., Casino, F., Solanas, A., Patsakis, C.: A survey on privacy properties for data publishing of relational data. IEEE Access 8, 51071\u201351099 (2020)","journal-title":"IEEE Access"},{"key":"838_CR46","unstructured":"GitHub - ionianCTF\/privacy-permission-analysis: privacy: Permission analysis for Android Applications\u2014github.com. https:\/\/github.com\/ionianCTF\/privacy-permission-analysis. Accessed 01 Oct 2023"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00838-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00838-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00838-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T02:13:39Z","timestamp":1716776019000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00838-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,26]]},"references-count":46,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["838"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00838-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,26]]},"assertion":[{"value":"26 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors participated in project funded by the European Commission AI4HEALTHSEC-A Dynamic and SelfOrganised Artificial Swarm Intelligence Solution for Security and Privacy Threats in Healthcare ICT Infrastructures (grant number 883273) and EU ECSEL project DAIS (grant number 101007273)","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants and\/or animals performed by any of the authors","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical standards"}}]}}