Netinfo Security ›› 2024, Vol. 24 ›› Issue (12): 1855-1870.doi: 10.3969/j.issn.1671-1122.2024.12.005

Previous Articles     Next Articles

Anonymization General Process and Risk Assessment Method for Data Compliance

YUAN Yulin1,2,3, YUAN Shuguang1,3, YU Jing1,2,3, CHEN Chi1,2,3()   

  1. 1. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China
    2. School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
    3. Key Laboratory of Cyberspace Security Defense, Beijing 100085, China
  • Received:2024-08-20 Online:2024-12-10 Published:2025-01-10

Abstract:

The leakage of personal privacy has emerged as a critical challenge in data security. Anonymization can effectively reduce the risk of privacy leakage by deidentification of personal information. However, inappropriate data processing methods can affect the results. Moreover, a residual risk of re-identification remains after data release. As domestic security supervision on data circulation intensifies, it is of great significance for personal information sharing to establish a reasonable anonymization process and assess the residual risks of anonymized data under data compliance. The previous anonymous risk assessment primarily center on evaluating data security through attack models. Additionally, these studies often overlook inherent risks within the anonymous process itself and the compliance of anonymous data. Therefore, this article introduced an anonymization general process. Building upon it, a risk assessment around data security and compliance was devised. The risk assessment method focused on process risk and data re-identification risk. It contained a supporting evaluation method and index system. In compliance evaluation, this article summarized existing standards. It proposed quantifiable compliance requirements to ensure compliance while assessing data risks. Finally, this article conducted a simulation experiment of anonymous process to verify process feasibility. The experimental result verifies that the risk assessment method can effectively detect potential threats in anonymization by simulating different risk scenarios.

Key words: data compliance, anonymization general process, anonymization risk assessment, process risk, re-identification risk

CLC Number: