{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:00:26Z","timestamp":1774630826111,"version":"3.50.1"},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["356065-2008"],"award-info":[{"award-number":["356065-2008"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Knowl. Discov. Data"],"published-print":{"date-parts":[[2010,10]]},"abstract":"<jats:p>\n            Sharing healthcare data has become a vital requirement in healthcare system management; however, inappropriate sharing and usage of healthcare data could threaten patients\u2019 privacy. In this article, we study the privacy concerns of sharing patient information between the Hong Kong Red Cross Blood Transfusion Service (BTS) and the public hospitals. We generalize their information and privacy requirements to the problems of\n            <jats:italic>centralized anonymization<\/jats:italic>\n            and\n            <jats:italic>distributed anonymization<\/jats:italic>\n            , and identify the major challenges that make traditional data anonymization methods not applicable. Furthermore, we propose a new privacy model called\n            <jats:italic>LKC-privacy<\/jats:italic>\n            to overcome the challenges and present two anonymization algorithms to achieve LKC-privacy in both the centralized and the distributed scenarios. Experiments on real-life data demonstrate that our anonymization algorithms can effectively retain the essential information in anonymous data for data analysis and is scalable for anonymizing large datasets.\n          <\/jats:p>","DOI":"10.1145\/1857947.1857950","type":"journal-article","created":{"date-parts":[[2010,11,1]],"date-time":"2010-11-01T13:32:33Z","timestamp":1288618353000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":83,"title":["Centralized and Distributed Anonymization for High-Dimensional Healthcare Data"],"prefix":"10.1145","volume":"4","author":[{"given":"Noman","family":"Mohammed","sequence":"first","affiliation":[{"name":"Concordia University"}]},{"given":"Benjamin C. M.","family":"Fung","sequence":"additional","affiliation":[{"name":"Concordia University"}]},{"given":"Patrick C. K.","family":"Hung","sequence":"additional","affiliation":[{"name":"University of Ontario Institute of Technology"}]},{"given":"Cheuk-Kwong","family":"Lee","sequence":"additional","affiliation":[{"name":"Hong Kong Red Cross Blood Transfusion Service"}]}],"member":"320","published-online":{"date-parts":[[2010,10]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/76894.76895"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the International Conference on Very Large Databases.","author":"Aggarwal C. C.","year":"2005","unstructured":"Aggarwal , C. C. 2005 . On k-anonymity and the curse of dimensionality . In Proceedings of the International Conference on Very Large Databases. Aggarwal, C. C. 2005. On k-anonymity and the curse of dimensionality. In Proceedings of the International Conference on Very Large Databases."},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Aggarwal C. C. and Yu P. S. 2008. Privacy Preserving Data Mining: Models and Algorithms. Springer. Aggarwal C. C. and Yu P. S. 2008. Privacy Preserving Data Mining: Models and Algorithms . Springer.","DOI":"10.1007\/978-0-387-70992-5"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.42"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065184"},{"key":"e_1_2_1_7_1","unstructured":"Carlisle D. M. Rodrian M. L. and Diamond C. L. 2007. California inpatient data reporting manual medical information reporting for California 5th edition. Tech. rep. Office of Statewide Health Planning and Development. Carlisle D. M. Rodrian M. L. and Diamond C. L. 2007. California inpatient data reporting manual medical information reporting for California 5th edition. Tech. rep. Office of Statewide Health Planning and Development."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772867"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773173"},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the SIAM International Conference on Data Mining.","author":"Du W.","unstructured":"Du , W. , Han , Y. S. , and Chen , S . 2004. Privacy-preserving multivariate statistical analysis: Linear regression and classification . In Proceedings of the SIAM International Conference on Data Mining. Du, W., Han, Y. S., and Chen, S. 2004. Privacy-preserving multivariate statistical analysis: Linear regression and classification. In Proceedings of the SIAM International Conference on Data Mining."},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the IEEE ICDM Workshop on Privacy, Security, and Data Mining.","author":"Du W.","unstructured":"Du , W. and Zhan , Z . 2002. Building decision tree classifier on private data . In Proceedings of the IEEE ICDM Workshop on Privacy, Security, and Data Mining. Du, W. and Zhan, Z. 2002. Building decision tree classifier on private data. In Proceedings of the IEEE ICDM Workshop on Privacy, Security, and Data Mining."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_2_1_15_1","unstructured":"Fuller W. A. 1993. Masking procedures for microdata disclosure limitation. Official Statistics. Fuller W. A. 1993. Masking procedures for microdata disclosure limitation. Official Statistics ."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1015"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2009.07.006"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497480"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775089"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535706_13"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0008-z"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458550.1458562"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03007-9_13"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the ASA Section on Survey Research Methods.","author":"Kim J.","unstructured":"Kim , J. and Winkler , W . 1995. Masking microdata files . In Proceedings of the ASA Section on Survey Research Methods. Kim, J. and Winkler, W. 1995. Masking microdata files. In Proceedings of the ASA Section on Survey Research Methods."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.101"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1386118.1386123"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557157"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1516360.1516388"},{"key":"e_1_2_1_31_1","unstructured":"Newman D. J. Hettich S. Blake C. L. and Merz C. J. 1998. UCI Repository of Machine Learning Databases. Newman D. J. Hettich S. Blake C. L. and Merz C. J. 1998. UCI Repository of Machine Learning Databases."},{"key":"e_1_2_1_32_1","unstructured":"Quinlan J. R. 1993. C4.5: Programs for Machine Learning. Morgan Kaufmann. Quinlan J. R. 1993. C4.5: Programs for Machine Learning . Morgan Kaufmann."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_2_1_34_1","volume-title":"Applied Cryptography","author":"Schneier B.","unstructured":"Schneier , B. 1995. Applied Cryptography . 2 nd Ed. John Wiley & amp; Sons. Schneier, B. 1995. Applied Cryptography. 2nd Ed. John Wiley &amp; Sons.","edition":"2"},{"key":"e_1_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Skowron A. and Rauszer C. 1992. The discernibility matrices and functions in information systems. In Intelligent Decision Support: Handbook of Applications and Advances of the Rough Set Theory. Skowron A. and Rauszer C. 1992. The discernibility matrices and functions in information systems. In Intelligent Decision Support: Handbook of Applications and Advances of the Rough Set Theory .","DOI":"10.1007\/978-94-015-7975-9_21"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the International Conference on Very Large Databases.","author":"Terrovitis M.","unstructured":"Terrovitis , M. , Mamoulis , N. , and Kalnis , P . 2008. Privacy-preserving anonymization of set-valued data . In Proceedings of the International Conference on Very Large Databases. Terrovitis, M., Mamoulis, N., and Kalnis, P. 2008. Privacy-preserving anonymization of set-valued data. In Proceedings of the International Conference on Very Large Databases."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775142"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956776"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-006-0035-5"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150499"},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of the International Conference on Very Large Databases.","author":"Xiao X.","unstructured":"Xiao , X. and Tao , Y . 2006a. Anatomy: Simple and effective privacy preservation . In Proceedings of the International Conference on Very Large Databases. Xiao, X. and Tao, Y. 2006a. Anatomy: Simple and effective privacy preservation. In Proceedings of the International Conference on Very Large Databases."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142500"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401982"},{"key":"e_1_2_1_45_1","volume-title":"Proceedings of the SIAM International Conference on Data Mining.","author":"Yang Z.","unstructured":"Yang , Z. , Zhong , S. , and Wright , R. N . 2005. Privacy-preserving classification of customer data without loss of accuracy . In Proceedings of the SIAM International Conference on Data Mining. Yang, Z., Zhong, S., and Wright, R. N. 2005. Privacy-preserving classification of customer data without loss of accuracy. In Proceedings of the SIAM International Conference on Data Mining."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.16"}],"container-title":["ACM Transactions on Knowledge Discovery from Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1857947.1857950","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1857947.1857950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:51Z","timestamp":1750244391000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1857947.1857950"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,10]]}},"alternative-id":["10.1145\/1857947.1857950"],"URL":"https:\/\/doi.org\/10.1145\/1857947.1857950","relation":{},"ISSN":["1556-4681","1556-472X"],"issn-type":[{"value":"1556-4681","type":"print"},{"value":"1556-472X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,10]]},"assertion":[{"value":"2010-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}