{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:35:08Z","timestamp":1778344508874,"version":"3.51.4"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T00:00:00Z","timestamp":1594166400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T00:00:00Z","timestamp":1594166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:sec>\n<jats:title>Background<\/jats:title>\n<jats:p>Various methods based on <jats:italic>k<\/jats:italic>-anonymity have been proposed for publishing medical data while preserving privacy. However, the <jats:italic>k<\/jats:italic>-anonymity property assumes that adversaries possess fixed background knowledge. Although differential privacy overcomes this limitation, it is specialized for aggregated results. Thus, it is difficult to obtain high-quality microdata. To address this issue, we propose a differentially private medical microdata release method featuring high utility.<\/jats:p>\n<\/jats:sec><jats:sec>\n<jats:title>Methods<\/jats:title>\n<jats:p>We propose a method of anonymizing medical data under differential privacy. To improve data utility, especially by preserving informative attribute values, the proposed method adopts three data perturbation approaches: (1) generalization, (2) suppression, and (3) insertion. The proposed method produces an anonymized dataset that is nearly optimal with regard to utility, while preserving privacy.<\/jats:p>\n<\/jats:sec><jats:sec>\n<jats:title>Results<\/jats:title>\n<jats:p>The proposed method achieves lower information loss than existing methods. Based on a real-world case study, we prove that the results of data analyses using the original dataset and those obtained using a dataset anonymized via the proposed method are considerably similar.<\/jats:p>\n<\/jats:sec><jats:sec>\n<jats:title>Conclusions<\/jats:title>\n<jats:p>We propose a novel differentially private anonymization method that preserves informative values for the release of medical data. Through experiments, we show that the utility of medical data that has been anonymized via the proposed method is significantly better than that of existing methods.<\/jats:p>\n<\/jats:sec>","DOI":"10.1186\/s12911-020-01171-5","type":"journal-article","created":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T13:03:51Z","timestamp":1594213431000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Differentially private release of medical microdata: an efficient and practical approach for preserving informative attribute values"],"prefix":"10.1186","volume":"20","author":[{"given":"Hyukki","family":"Lee","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2070-5123","authenticated-orcid":false,"given":"Yon Dohn","family":"Chung","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,7,8]]},"reference":[{"issue":"1","key":"1171_CR1","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1186\/s12911-019-0818-8","volume":"19","author":"J-J Ren","year":"2019","unstructured":"Ren J-J, Sun T, He Y, Zhang Y. A statistical analysis of vaccine-adverse event data. BMC Med Inform Decis Mak. 2019; 19(1):101.","journal-title":"BMC Med Inform Decis Mak"},{"issue":"1","key":"1171_CR2","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1186\/s12911-019-0750-y","volume":"19","author":"X Jing","year":"2019","unstructured":"Jing X, Emerson M, Masters D, Brooks M, Buskirk J, Abukamail N, Liu C, Cimino JJ, Shubrook J, De Lacalle S, et al. A visual interactive analytic tool for filtering and summarizing large health data sets coded with hierarchical terminologies (VIADS). BMC Med Inform Decis Mak. 2019; 19(1):31.","journal-title":"BMC Med Inform Decis Mak"},{"key":"1171_CR3","doi-asserted-by":"crossref","unstructured":"Sweeney L. Int J Uncertain, Fuzziness Knowl-Based Syst. 2002; 10(05):557\u201370.","DOI":"10.1142\/S0218488502001648"},{"issue":"1","key":"1171_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M. l-diversity: Privacy beyond k-anonymity. ACM Trans Knowl Discov Data (TKDD). 2007; 1(1):3.","journal-title":"ACM Trans Knowl Discov Data (TKDD)"},{"key":"1171_CR5","doi-asserted-by":"crossref","unstructured":"Li N, Li T, Venkatasubramanian S. t-closeness: Privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering. IEEE Computer Society: 2007. p. 106\u201315.","DOI":"10.1109\/ICDE.2007.367856"},{"key":"1171_CR6","doi-asserted-by":"crossref","unstructured":"Truta TM, Vinay B. Privacy protection: p-sensitive k-anonymity property. In: 22nd International Conference on Data Engineering Workshops (ICDEW\u201906). IEEE: 2006. p. 94.","DOI":"10.1109\/ICDEW.2006.116"},{"key":"1171_CR7","doi-asserted-by":"crossref","unstructured":"Dwork C, McSherry F, Nissim K, Smith A. Calibrating noise to sensitivity in private data analysis. In: Theory of Cryptography Conference. Springer: 2006. p. 265\u201384.","DOI":"10.1007\/11681878_14"},{"key":"1171_CR8","doi-asserted-by":"crossref","unstructured":"Ganta SR, Kasiviswanathan SP, Smith A. Composition attacks and auxiliary information in data privacy. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM: 2008. p. 265\u201373.","DOI":"10.1145\/1401890.1401926"},{"key":"1171_CR9","doi-asserted-by":"crossref","unstructured":"Mohammed N, Chen R, Fung B, Yu PS. Differentially private data release for data mining. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM: 2011. p. 493\u2013501.","DOI":"10.1145\/2020408.2020487"},{"key":"1171_CR10","doi-asserted-by":"crossref","unstructured":"Li H, Xiong L, Jiang X, Liu J. Differentially private histogram publication for dynamic datasets: an adaptive sampling approach. In: Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. ACM: 2015. p. 1001\u201310.","DOI":"10.1145\/2806416.2806441"},{"issue":"1","key":"1171_CR11","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1186\/s12911-017-0499-0","volume":"17","author":"H Lee","year":"2017","unstructured":"Lee H, Kim S, Kim JW, Chung YD. Utility-preserving anonymization for health data publishing. BMC Med Inform Decis Mak. 2017; 17(1):104.","journal-title":"BMC Med Inform Decis Mak"},{"issue":"3","key":"1171_CR12","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.12785\/amis\/080321","volume":"8","author":"Y Xu","year":"2014","unstructured":"Xu Y, Ma T, Tang M, Tian W. A survey of privacy preserving data publishing using generalization and suppression. Appl Math Inf Sci. 2014; 8(3):1103.","journal-title":"Appl Math Inf Sci"},{"issue":"12","key":"1171_CR13","doi-asserted-by":"publisher","first-page":"3081","DOI":"10.1109\/TIFS.2017.2737966","volume":"12","author":"C Xu","year":"2017","unstructured":"Xu C, Ren J, Zhang Y, Qin Z, Ren K. DPPro: Differentially private high-dimensional data release via random projection. IEEE Trans Inf Forensics Secur. 2017; 12(12):3081\u201393.","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"1171_CR14","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1007\/s10115-017-1132-3","volume":"56","author":"K Al-Hussaeni","year":"2018","unstructured":"Al-Hussaeni K, Fung BC, Iqbal F, Liu J, Hung PC. Differentially private multidimensional data publishing. Knowl Inf Syst. 2018; 56(3):717\u201352.","journal-title":"Knowl Inf Syst"},{"key":"1171_CR15","doi-asserted-by":"crossref","unstructured":"McSherry F, Talwar K. Mechanism design via differential privacy. In: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS\u201907). IEEE: 2007. p. 94\u2013103.","DOI":"10.1109\/FOCS.2007.4389483"},{"key":"1171_CR16","doi-asserted-by":"crossref","unstructured":"McSherry F. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data. ACM: 2009. p. 19\u201330.","DOI":"10.1145\/1559845.1559850"},{"key":"1171_CR17","doi-asserted-by":"crossref","unstructured":"LeFevre K, DeWitt DJ, Ramakrishnan R. Incognito: Efficient full-domain k-anonymity. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data. ACM: 2005. p. 49\u201360.","DOI":"10.1145\/1066157.1066164"},{"key":"1171_CR18","doi-asserted-by":"crossref","unstructured":"Xu J, Wang W, Pei J, Wang X, Shi B, Fu AW-C. Utility-based anonymization using local recoding. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM: 2006. p. 785\u201390.","DOI":"10.1145\/1150402.1150504"},{"key":"1171_CR19","unstructured":"Informative Attribute Preserving Anonymization Method. 2020. Available at https:\/\/github.com\/hyukki-db\/IPA. Accessed 30 Apr 2019."},{"key":"1171_CR20","unstructured":"Health Insurance Review and Assessment Service in Korea. 2012. Available at http:\/\/opendata.hira.or.kr. Accessed 1 Dec 2019."},{"issue":"3","key":"1171_CR21","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1136\/amiajnl-2012-001027","volume":"20","author":"N Mohammed","year":"2013","unstructured":"Mohammed N, Jiang X, Chen R, Fung BC, Ohno-Machado L. Privacy-preserving heterogeneous health data sharing. J Am Med Inform Assoc. 2013; 20(3):462\u20139.","journal-title":"J Am Med Inform Assoc"},{"issue":"1","key":"1171_CR22","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1515\/popets-2018-0004","volume":"2018","author":"R Bild","year":"2018","unstructured":"Bild R, Kuhn KA, Prasser F. Safepub: A truthful data anonymization algorithm with strong privacy guarantees. Proc Priv Enhancing Technol. 2018; 2018(1):67\u201387.","journal-title":"Proc Priv Enhancing Technol"},{"key":"1171_CR23","first-page":"55","volume":"49","author":"N Li","year":"2011","unstructured":"Li N, Qardaji WH, Su D. Provably private data anonymization: Or, k-anonymity meets differential privacy. CoRR, abs\/1101.2604. 2011; 49:55.","journal-title":"CoRR, abs\/1101.2604"},{"key":"1171_CR24","unstructured":"Korea National Institute for Bioethics Policy. Available at http:\/\/irb.or.kr\/menu02\/commonDeliberation.aspx. Accessed 23 June 2019."}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s12911-020-01171-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s12911-020-01171-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s12911-020-01171-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T23:38:44Z","timestamp":1625701124000},"score":1,"resource":{"primary":{"URL":"https:\/\/bmcmedinformdecismak.biomedcentral.com\/articles\/10.1186\/s12911-020-01171-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,8]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["1171"],"URL":"https:\/\/doi.org\/10.1186\/s12911-020-01171-5","relation":{},"ISSN":["1472-6947"],"issn-type":[{"value":"1472-6947","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,8]]},"assertion":[{"value":"24 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This study used open data from HIRA, which exempted the study from ethical approval according to the Korea National Institute for Bioethics Policy []. The Korean bioethics and safety act exempts ethical approval when exploiting existing data. Therefore, this study did not require ethical approval and consent from patients.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"155"}}