This report, building on the basic pseudonymisation techniques, examines advanced solutions for more complex scenarios that can be based on asymmetric encryption, ring signatures and group pseudonyms, chaining mode, pseudonyms based on multiple identifiers, pseudonyms with proof of knowledge and secure multi-party computation. It then applies some of these techniques in the area of healthcare to discuss possible pseudonymisation options in different example cases. Lastly, it examines the application of basic pseudonymisation techniques in common cybersecurity use cases, such as the use of telemetry and reputation systems.
The Curse of Dimensionality: De-identification Challenges in the Sharing of Highly Dimensional Datasets
De-identifying search query data under GDPR is fraught with risk as high-dimensional behavioural datasets remain vulnerable to re-identification despite technical […]