Fecha de publicación:
04/01/2024
Fuente: Wipo "BigData"
The method delivers a degree of protection (txP3) representative of the risk of re-identification of data in the case of a correspondence search attack including a deterministic search based on an external information source and a correspondence search based on a distance. The method comprises steps of E) consolidating a set of original individuals (EDO) and a set of anonymous individuals (IA); F) identifying, in the set of original individuals, individuals at risk (IOrs) via the deterministic correspondence search; G) evaluating a degree of failure of re-identification (txP1) for the sets of original individuals and of anonymous individuals, on the basis of the correspondence search based on distance; H) computing the degree of protection as a function of a total number of individuals in the original dataset, of a number (RS) of individuals at risk identified in step B) and of the degree of failure of re-identification (txP1).