De-anonymization: Difference between revisions

Jerry468 (talk | contribs)
While this is my first time contributing, while it may be irrelevant, or maybe in some mistakes I may have did, it still fits the article about De-anonymization and how anonymized data is processed. My apologies for the mistake I may have did.
Wojiee (talk | contribs)
How it works: changed the definition to one that is more precise.
 
Line 1: Line 1:
{{StubNotice}}
{{StubNotice}}


De-anonymization is a practice used to relate pieces of previously-anonymized user data in order to assemble a complete user profile.
De-anonymization is the process or final state of revealing the true identity of an anonymous or pseudonymous person. All data linked to the anonymous or pseudonymous entity can then be connected to the true identity.


==How it works==
==How it works==
The core of de-anonymization involves making inferences to connect different types of obfuscated data, sometimes even across platforms.
The core of de-anonymization involves making inferences to connect different types of obfuscated data, sometimes even across platforms.


== How data is anonymized ==
==How data is anonymized==
{{Notice|Note from Collaborator: While maybe irrelevant, it is important to understand how data is collected when it comes to it being anonymized.}}
{{Notice|Note from Collaborator: While maybe irrelevant, it is important to understand how data is collected when it comes to it being anonymized.}}
Anonymization, in practice, also involves around collecting user data that is said to be "aggregated/de-identified basis" which involves the usage of [[wikipedia:K-anonymity|k-anonymity]]. There are also forms of data collection that also used in different methods such as [[wikipedia:T-closeness|''t''-closeness]], [[wikipedia:L-diversity|''l''-diversity]], and [[wikipedia:Differential_privacy|differential privacy]], however there are other forms of data collection that is also used, which have yet to be disclosed to the customers.
Anonymization, in practice, also involves around collecting user data that is said to be "aggregated/de-identified basis" which involves the usage of [[wikipedia:K-anonymity|k-anonymity]]. There are also forms of data collection that also used in different methods such as [[wikipedia:T-closeness|''t''-closeness]], [[wikipedia:L-diversity|''l''-diversity]], and [[wikipedia:Differential_privacy|differential privacy]], however there are other forms of data collection that is also used, which have yet to be disclosed to the customers.
Line 16: Line 16:
{{reflist}}<ref>{{Cite book |last=Narayanan & Shmatikov |first=Arvind & Vitaly |title=How To Break Anonymity of the Netflix Prize Dataset |date=November 11, 2006 |publisher=The University of Texas at Austin |location=United States, Taxes, Austin.}}</ref>
{{reflist}}<ref>{{Cite book |last=Narayanan & Shmatikov |first=Arvind & Vitaly |title=How To Break Anonymity of the Netflix Prize Dataset |date=November 11, 2006 |publisher=The University of Texas at Austin |location=United States, Taxes, Austin.}}</ref>
[[Category:Common terms]]
[[Category:Common terms]]
<references />