Abstract
Over the past nearly two decades researchers from different domains, including statistics, the social and health sciences, and computer science, have developed a variety of techniques to link sensitive databases in a privacy-preserving way. Many of these techniques have so far not been used in practical applications for a variety of reasons that range from security weaknesses or limitations in linkage capabilities to prohibitive computational requirements. We begin this chapter with a taxonomy that has been developed to categorise techniques for encoding and comparing sensitive databases based on different dimensions ranging from privacy and technical to practical aspects, and we provide a general discussion of the different generations of techniques that have been developed. We then give brief overviews of specific techniques, including those based on phonetic encoding, hashing, public reference values, embedding into multidimensional spaces, and secure multiparty computation. We end the chapter with a discussion on the suitability of these types of techniques for different linkage scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Christen, P., Ranbaduge, T., Schnell, R. (2020). Encoding and Comparing Sensitive Values. In: Linking Sensitive Data. Springer, Cham. https://doi.org/10.1007/978-3-030-59706-1_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-59706-1_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-59705-4
Online ISBN: 978-3-030-59706-1
eBook Packages: Computer ScienceComputer Science (R0)