{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:19:51Z","timestamp":1775744391480,"version":"3.50.1"},"reference-count":82,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,7,1]]},"DOI":"10.1587\/transinf.2019ici0002","type":"journal-article","created":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T22:14:22Z","timestamp":1593555262000},"page":"1448-1461","source":"Crossref","is-referenced-by-count":14,"title":["An Overview of De-Identification Techniques and Their Standardization Directions"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Heung Youl","family":"YOUM","sequence":"first","affiliation":[{"name":"Department of Information Security Engineering, Soonchunhyang University"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] L. Sweeney, \u201cSimple demographics often identify people uniquely,\u201d Data Privacy Working, p.3, 2000."},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] Y.-A. de Montjoye, C.A. Hidalgo, M. Verleysen, and V.D. Blondel, \u201cUnique in the crowd: The privacy bounds of human mobility,\u201d Scientific Reports, vol.3, Aricle number 1376, 2013. 10.1038\/srep01376","DOI":"10.1038\/srep01376"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] Y.-A. de Montjoye, L. Radaelli, V.K. Singh, and A.S. Pentland, \u201cUnique in the shopping mall: On the reidentifiability of credit card metadata,\u201d Science, vol.347, no.6221, pp.536-539, Jan. 2015. 10.1126\/science.1256297","DOI":"10.1126\/science.1256297"},{"key":"4","unstructured":"[4] A. Narayanan, \u201cHow to break anonymity of the Netflix prize dataset,\u201d Cornel University, 2006, https:\/\/arxiv.org\/abs\/cs\/0610105, accessed 14 Nov. 2019."},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] K. El Emam, E. Jonker, L. Arbuckle, B. Malin, and R.W. Scherer, \u201cA systematic review of re-identification attacks on health data,\u201d PLOS ONE. vol.10, no.4, e28071, 2011. 10.1371\/journal.pone.0028071","DOI":"10.1371\/journal.pone.0028071"},{"key":"6","unstructured":"[6] ISO\/IEC 20889:2018, Privacy enhancing data de-identification terminology and classification of techniques. 10.3403\/30331888u"},{"key":"7","unstructured":"[7] ISO\/IEC 29100:2011, Information technology \u2014 Security techniques \u2014 Privacy framework."},{"key":"8","unstructured":"[8] ISO\/IEC 27701:2019, Security techniques \u2014 Extension to ISO\/IEC 27001 and ISO\/IEC 27002 for privacy information management \u2014 Requirements and guidelines. 10.3403\/30351736u"},{"key":"9","unstructured":"[9] Information and Privacy Commissioner of Ontario, De-identification Guidelines for Structured Data, June 2016."},{"key":"10","unstructured":"[10] ISO 25237:2017, Health informatics \u2014 Pseudonymization. 10.3403\/30285709u"},{"key":"11","unstructured":"[11] ISO\/IEC 19944, Information technology \u2014 Cloud computing \u2014 Cloud services and devices: Data flow, data categories and data use. 10.3403\/30313039"},{"key":"12","unstructured":"[12] ITU-T X.1058 | ISO\/IEC 29151:2017, Information technology \u2014 Security techniques \u2014 Code of practice for personally identifiable information protection, 2017. 10.3403\/30286827u"},{"key":"13","unstructured":"[13] ISO\/IEC 27000, Information technology \u2014 Security techniques \u2014 Information security management systems \u2014 Overview and vocabulary."},{"key":"14","unstructured":"[14] ITU-T X.fdip, Framework of de-identification process for telecommunication service providers (under development)."},{"key":"15","unstructured":"[15] ITU-T X.rdda, Requirements for data de-identification assurance (under development)."},{"key":"16","unstructured":"[16] ISO\/IEC 9797-2, Information technology \u2014 Security techniques \u2014 Message Authentication Codes (MACs) \u2014 Part 2: Mechanisms using a dedicated hash-function. 10.3403\/02593338u"},{"key":"17","unstructured":"[17] ISO\/IEC 10118 (all parts), Information technology \u2014 Security techniques \u2014 Hash-functions."},{"key":"18","unstructured":"[18] ISO\/IEC 11770 (all parts), Information technology \u2014 Security techniques \u2014 Key management."},{"key":"19","unstructured":"[19] ISO\/IEC 18033 (all parts), Information technology \u2014 Security techniques \u2014 Encryption algorithms."},{"key":"20","unstructured":"[20] ISO\/IEC 19592 (all parts), Information technology \u2014 Security techniques \u2014 Secret sharing."},{"key":"21","unstructured":"[21] ISO\/IEC 27038, Information technology \u2014 Security techniques \u2014 Specification for digital redaction. 10.3403\/30227610u"},{"key":"22","unstructured":"[22] ISO\/IEC 29101, Information technology \u2014 Security techniques \u2014 Privacy architecture framework. 10.3403\/30168691u"},{"key":"23","unstructured":"[23] ISO\/IEC 29134, Information technology \u2014 Security techniques \u2014 Guidelines for privacy impact assessment."},{"key":"24","unstructured":"[24] ISO 31000, Risk management \u2014 Principles and guidelines."},{"key":"25","unstructured":"[25] NIST, NISTIR 8053: De-identification of personal information, Oct. 15, 2015."},{"key":"26","unstructured":"[26] NIST, NIST Special Publication 800-38G, Recommendation for block cipher modes of operation: Methods for format-preserving encryption, March 2016."},{"key":"27","unstructured":"[27] GDPR, General Data Protection Regulation, EU, 2016."},{"key":"28","unstructured":"[28] Article 29 Data Protection Working Party, Opinion 05\/2014 on Anonymisation Techniques, April 2014."},{"key":"29","unstructured":"[29] Information Commissioner Office (ICO), Anonymisation: Managing data protection risk code of practice, July 2014."},{"key":"30","doi-asserted-by":"publisher","unstructured":"[30] B.C.M. Fung, K. Wang, R. Chen, and P.S. Yu, \u201cPrivacy-preserving data publishing: A survey on recent developments,\u201d ACM Computing Surveys, vol.42, no.4, Aricle No.14, June 2010. 10.1145\/1749603.1749605","DOI":"10.1145\/1749603.1749605"},{"key":"31","doi-asserted-by":"crossref","unstructured":"[31] A. Blum, K. Ligett, and A. Roth, \u201cA learning theory approach to non-interactive database privacy,\u201d Proc. 40th ACM Symposium on Theory of Computing (STOC 08), pp.609-618, ACM, 2008. 10.1145\/1374376.1374464","DOI":"10.1145\/1374376.1374464"},{"key":"32","doi-asserted-by":"crossref","unstructured":"[32] M. Bun and T. Steinke, \u201cConcentrated differential privacy: Simplifications, extensions and lower bounds,\u201d 14th International Conference, Theory of Cryptography Conference, TCC 2016-B, Beijing, China, Oct. 31-Nov. 3, 2016, Lecture Notes in Computer Science, vol.9985, pp.635-658, Springer-Verlag, 2016, 10.1007\/978-3-662-53641-4_24","DOI":"10.1007\/978-3-662-53641-4_24"},{"key":"33","doi-asserted-by":"crossref","unstructured":"[33] S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee, \u201cToward privacy in public,\u201d Proc. 2nd International Conference on Theory of Cryptography (TCC 05), Lecture Notes in Computer Science, vol.3378, pp.363-385, Springer, Berlin, Heidelberg, 2005. 10.1007\/978-3-540-30576-7_20","DOI":"10.1007\/978-3-540-30576-7_20"},{"key":"34","unstructured":"[34] T. Dalenius, \u201cTowards a methodology for statistical disclosure control,\u201d Statistik Tidskrift, vol.15, pp.429-222, 1977."},{"key":"35","doi-asserted-by":"crossref","unstructured":"[35] F.K. Dankar and K. El Emam, \u201cA method for evaluating marketer re-identification risk,\u201d Proc. 2010 EDBT\/ICDT Workshops, article no.28, 10 pages, New York, ACM, 2010. 10.1145\/1754239.1754271","DOI":"10.1145\/1754239.1754271"},{"key":"36","doi-asserted-by":"publisher","unstructured":"[36] J. Domingo-Ferrer and J. Soria-Comas, \u201cFrom t-closeness to differential privacy and vice versa in data anonymization,\u201d Knowledge-Based Systems, vol.74, pp.151-158, 2015. 10.1016\/j.knosys.2014.11.011","DOI":"10.1016\/j.knosys.2014.11.011"},{"key":"37","doi-asserted-by":"crossref","unstructured":"[37] R. Dondi, G. Mauri, and I. Zoppis, \u201cOn the complexity of the l-diversity problem,\u201d Proc. 36th International Conference on Mathematical Foundations of Computer Science, Aug. 22-26, Warsaw, Poland, Lecture Notes in Computer Science, vol.6907, pp.266-277, Springer-Verlag, 2011. 10.1007\/978-3-642-22993-0_26","DOI":"10.1007\/978-3-642-22993-0_26"},{"key":"38","doi-asserted-by":"crossref","unstructured":"[38] C. Dwork, \u201cDifferential privacy,\u201d Proc. 33rd International Conference on Automata, Languages and Programming, pp.1-12, ACM, 2006.","DOI":"10.1007\/11787006_1"},{"key":"39","doi-asserted-by":"crossref","unstructured":"[39] C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, \u201cOur data, ourselves: Privacy via distributed noise generation,\u201d Proc. Eurocrypt 2006, Lecture Notes in Computer Science, vol.4004, pp.486-503, Springer-Verlag, 2006. 10.1007\/11761679_29","DOI":"10.1007\/11761679_29"},{"key":"40","doi-asserted-by":"publisher","unstructured":"[40] C. Dwork and A. Roth, \u201cThe algorithmic foundations of differential privacy,\u201d Foundations and Trends in Theoretical Computer Science, vol.9, no.3-4, pp.211-407, 2014. 10.1561\/0400000042","DOI":"10.1561\/0400000042"},{"key":"41","unstructured":"[41] C. Dwork and G.N. Rothblum, \u201cConcentrated differential privacy,\u201d arXiv: 1603.01887, 2016."},{"key":"42","doi-asserted-by":"publisher","unstructured":"[42] K. El Emam and F.K. Dankar, \u201cProtecting privacy using k-anonymity,\u201d J. Amer. Med. Info. Assoc., vol.15, no.5, pp.627-637, 2008. 10.1197\/jamia.m2716","DOI":"10.1197\/jamia.M2716"},{"key":"43","unstructured":"[43] K. El Emam and B. Malin, \u201cAppendix B: Concepts and methods for de-identifying clinical trial data,\u201d Sharing Clinical Trial Data: Maximizing Benefits, Minimizing Risk, Institute of Medicine of the National Academies, The National Academies Press, Washington, DC, 2015."},{"key":"44","doi-asserted-by":"crossref","unstructured":"[44] U. Erlingsson, V. Pihur, and A. Korolova, \u201cRAPPOR: Randomized aggregatable privacy-preserving ordinal response,\u201d ACM Conference on Computer and Communications Security, pp.1054-1067, Nov. 3-7, 2014, Scottsdale, Arizona, USA, ACM, 2014. 10.1145\/2660267.2660348","DOI":"10.1145\/2660267.2660348"},{"key":"45","doi-asserted-by":"crossref","unstructured":"[45] S. Ganta, S. Kasiviswanathan, and A. Smith, \u201cComposition attacks and auxiliary information in data privacy,\u201d March 2008 ( https:\/\/arxiv.org\/pdf\/0803.0032.pdf ).","DOI":"10.1145\/1401890.1401926"},{"key":"46","doi-asserted-by":"crossref","unstructured":"[46] A. Gupta, K. Ligett, F. McSherry, A. Roth, and K. Talwar, \u201cDifferentially private combinatorial optimization,\u201d ACM Symposium On Discrete Algorithms, ACM, 2010. 10.1137\/1.9781611973075.90","DOI":"10.1137\/1.9781611973075.90"},{"key":"47","doi-asserted-by":"publisher","unstructured":"[47] R. Hall, L. Wasserman, and A. Rinaldo, \u201cRandom differential privacy,\u201d Journal of Privacy and Confidentiality, vol.4, no.2, article 3, 2013. 10.29012\/jpc.v4i2.621","DOI":"10.29012\/jpc.v4i2.621"},{"key":"48","unstructured":"[48] P. Kairouz, S. Oh, and P. Viswanath, \u201cSecure multi-party differential privacy,\u201d Proc. Advances in Neural Information Processing Systems 28, 2015."},{"key":"49","doi-asserted-by":"crossref","unstructured":"[49] C.-W. Lan, Y.-H. Chen, T. Grandison, A.F.M. Huang, J.-Y. Chung, and L.-F. Tseng, \u201cA privacy reinforcement approach against de-identified dataset,\u201d 2011 IEEE 8th International Conference on e-Business Engineering, pp.370-375, Oct. 2011. 10.1109\/icebe.2011.25","DOI":"10.1109\/ICEBE.2011.25"},{"key":"50","doi-asserted-by":"crossref","unstructured":"[50] N. Li, T. Li, and S. Venkatasubramanian, \u201ct-closeness: Privacy beyond k-anonymity and l-diversity,\u201d Proc. IEEE 23rd Intl. Conf. on Data Engineering, pp.106-115, New York, IEEE Computer Society, 2007. 10.1109\/icde.2007.367856","DOI":"10.1109\/ICDE.2007.367856"},{"key":"51","doi-asserted-by":"crossref","unstructured":"[51] A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, \u201cl-diversity: Privacy beyond k-anonymity,\u201d Proc. 22nd International Conference on Data Engineering (ICDE&apos;06), pp.24-24, IEEE, 2006. 10.1109\/icde.2006.1","DOI":"10.1109\/ICDE.2006.1"},{"key":"52","doi-asserted-by":"crossref","unstructured":"[52] A. Machanavajjhala, D. Kifer, J. Abowd, J. Gehrke, and L. Vilhuber, \u201cPrivacy: Theory meets practice on the map,\u201d Proc. 2008 IEEE 24th International Conference on Data Engineering, pp.277-286, IEEE, 2008. 10.1109\/icde.2008.4497436","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"53","unstructured":"[53] V. Yogarajana, M. Mayo, and B. Pfahringera \u201cA survey of automatic de-identification of longitudinal clinical narratives,\u201d https:\/\/arxiv.org\/abs\/1810.06765. Nov. 2018."},{"key":"54","doi-asserted-by":"crossref","unstructured":"[54] F. McSherry and I. Mironov, \u201cDifferentially private recommender systems: Building Privacy into the Netflix prize contenders,\u201d Knowledge Discovery and Data Mining Conference (KDD), pp.627-636, Paris, France, 2009. 10.1145\/1557019.1557090","DOI":"10.1145\/1557019.1557090"},{"key":"55","doi-asserted-by":"crossref","unstructured":"[55] I. Mironov, O. Pandey, O. Reingold, and S. Vadhan, \u201cComputational differential privacy,\u201d 29th Annual International Cryptology Conference, Advances in Cryptology, CRYPTO 2009, Santa Barbara, CA, USA, Aug. 16-20, 2009, Lecture Notes in Computer Science, vol.5677, pp.126-142, Springer-Verlag, 2009. 10.1007\/978-3-642-03356-8_8","DOI":"10.1007\/978-3-642-03356-8_8"},{"key":"56","doi-asserted-by":"crossref","unstructured":"[56] I. Mironov, \u201cOn the significance of the least significant bits for differential privacy,\u201d Microsoft Research, 2012.","DOI":"10.1145\/2382196.2382264"},{"key":"57","doi-asserted-by":"crossref","unstructured":"[57] M.E. Nergiz, M. Atzori, and C. Clifton, \u201cHiding the presence of individuals from shared databases,\u201d Proc. 2007 ACM SIGMOD International Conference on Management of Data (SIGMOD 07), pp.665-676, ACM, 2007. 10.1145\/1247480.1247554","DOI":"10.1145\/1247480.1247554"},{"key":"58","doi-asserted-by":"publisher","unstructured":"[58] M.E. Nergiz, C. Clifton, and A.E. Nergiz, \u201cMultirelational k-anonymity,\u201d IEEE Trans. Knowl. Data Eng., vol.21, no.8, pp.1104-1117, 2009. 10.1109\/tkde.2008.210","DOI":"10.1109\/TKDE.2008.210"},{"key":"59","unstructured":"[59] M. Pathak, S. Rane, and B. Raj, \u201cMultiparty differential privacy via aggregation of locally trained classifiers&apos;classifiers,\u201d Proc. Advances in Neural Information Processing Systems 23, 2010."},{"key":"60","unstructured":"[60] V. Rastogi, D. Suciu, and S. Hong, \u201cThe boundary between privacy and utility in data publishing,\u201d Proc. 33rd International Conference on Very Large Databases (VLDB 07), pp.531-542, 2007."},{"key":"61","unstructured":"[61] P. Samarati and L. Sweeney, \u201cProtecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression,\u201d Technical Report SRI-CSL-98-04, SRI International, 1998."},{"key":"62","unstructured":"[62] L. Sweeney, \u201cReplacing personally-identifying information in medical records, the scrub system,\u201d Proc. American Medical Informatics Association, pp.333-337, 1996."},{"key":"63","doi-asserted-by":"crossref","unstructured":"[63] L. Sweeney, \u201ck-anonymity: A model for protecting privacy,\u201d International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, no.5, pp.557-570, 2002. 10.1142\/s0218488502001648","DOI":"10.1142\/S0218488502001648"},{"key":"64","doi-asserted-by":"crossref","unstructured":"[64] K. Wang and B.C.M. Fung, \u201cAnonymizing sequential releases,\u201d Proc. 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 06), Philadelphia, pp.414-423, ACM, 2006. 10.1145\/1150402.1150449","DOI":"10.1145\/1150402.1150449"},{"key":"65","doi-asserted-by":"publisher","unstructured":"[65] K. Wang, B.C.M. Fung, and P.S. Yu, \u201cHandicapping attacker&apos;s confidence: An alternative to k-anonymization,\u201d Knowledge and Information Systems, vol.11, no.3, pp.345-368, 2007. 10.1007\/s10115-006-0035-5","DOI":"10.1007\/s10115-006-0035-5"},{"key":"66","doi-asserted-by":"crossref","unstructured":"[66] K. Wang, Y. Xu, A.W.C. Fu, and R.C.W. Wong, \u201cFF-anonymity: When quasi-identifiers are missing,\u201d Proc. 25th IEEE International Conference on Data Engineering, 29 March-2 April 2009, pp.1136-1139, IEEE, 2019. 10.1109\/icde.2009.184","DOI":"10.1109\/ICDE.2009.184"},{"key":"67","doi-asserted-by":"publisher","unstructured":"[67] M. Wjst, \u201cCaught you: Threats to confidentiality due to the public release of large-scale genetic datasets,\u201d BMC Med. Ethics, vol.11, Article number 21, 2010. 10.1186\/1472-6939-11-21","DOI":"10.1186\/1472-6939-11-21"},{"key":"68","doi-asserted-by":"crossref","unstructured":"[68] R.C.-W. Wong, J. Li, A.W.-C. Fu, and K. Wang, \u201c(a,k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing,\u201d Proc. 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 06), pp.754-759, ACM, 2006. 10.1145\/1150402.1150499","DOI":"10.1145\/1150402.1150499"},{"key":"69","doi-asserted-by":"crossref","unstructured":"[69] X. Xiao and Y. Tao, \u201cPersonalized privacy preservation,\u201d Proc. 2006 ACM SIGMOD International Conference on Management of Data (SIGMOD 06), pp.229-240, ACM, 2006. 10.1145\/1142473.1142500","DOI":"10.1145\/1142473.1142500"},{"key":"70","doi-asserted-by":"crossref","unstructured":"[70] X. Xiao and Y. Tao, \u201cM-invariance: Towards privacy preserving re-publication of dynamic datasets,\u201d Proc. 2007 ACM SIGMOD International Conference on Management of Data (SIGMOD 07), pp.689-700, ACM, 2007. 10.1145\/1247480.1247556","DOI":"10.1145\/1247480.1247556"},{"key":"71","doi-asserted-by":"crossref","unstructured":"[71] Q. Zhang, N. Koudas, D. Srivastava, and T. Yu, \u201cAggregate query answering on anonymized tables,\u201d Proc. 23rd IEEE International Conference on Data Engineering, 15-20 April 2007, pp.116-125, IEEE, 2007. 10.1109\/icde.2007.367857","DOI":"10.1109\/ICDE.2007.367857"},{"key":"72","unstructured":"[72] Korean Ministry of the Interior, Guidelines on De-identification Measures, June 2016."},{"key":"73","unstructured":"[73] ITU-T SG17, Security."},{"key":"74","unstructured":"[74] ISO\/IEC JTC 1\/SC 27, Information security, cybersecurity, privacy protection."},{"key":"75","unstructured":"[75] ISO\/TC 215, Health informatics."},{"key":"76","unstructured":"[76] ISO\/IEC JTC 1\/SC 38, Cloud Computing and Distributed Platforms."},{"key":"77","unstructured":"[77] ISO\/IEC 18033-6:2019, IT Security techniques \u2014 Encryption algorithms \u2014 Part 6: Homomorphic encryption. 10.3403\/30354752"},{"key":"78","unstructured":"[78] ITU-T A.1, Working methods for study groups of the ITU Telecommunication Standardization Sector."},{"key":"79","unstructured":"[79] ITU-T A.23, Collaboration with the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) on information technology."},{"key":"80","unstructured":"[80] Japan, Act on Protection of Personal Information, Sept. 2015."},{"key":"81","unstructured":"[81] Recommendation ITU-T A.23 Annex A, Guide for ITU-T and ISO\/IEC JTC 1 cooperation, June 2014."},{"key":"82","unstructured":"[82] New work item proposal, Privacy-enhancing data de-identification framework, SC 27\/WG 5, Oct. 2019."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/7\/E103.D_2019ICI0002\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T07:03:30Z","timestamp":1696316610000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/7\/E103.D_2019ICI0002\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,1]]},"references-count":82,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019ici0002","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,1]]}}}