Mahoui, MalikaMorton, Stuart MichaelPalakal, Mathew J.Gibson, P. JosephKharrazi, Hadi2013-08-142013-08-142013-08-14https://hdl.handle.net/1805/3427http://dx.doi.org/10.7912/C2/924Indiana University-Purdue University Indianapolis (IUPUI)As medical data continues to transition to electronic formats, opportunities arise for researchers to use this microdata to discover patterns and increase knowledge that can improve patient care. Now more than ever, it is critical to protect the identities of the patients contained in these databases. Even after removing obvious “identifier” attributes, such as social security numbers or first and last names, that clearly identify a specific person, it is possible to join “quasi-identifier” attributes from two or more publicly available databases to identify individuals. K-anonymity is an approach that has been used to ensure that no one individual can be distinguished within a group of at least k individuals. However, the majority of the proposed approaches implementing k-anonymity have focused on improving the efficiency of algorithms implementing k-anonymity; less emphasis has been put towards ensuring the “utility” of anonymized data from a researchers’ perspective. We propose a new data utility measurement, called the research value (RV), which extends existing utility measurements by employing data constraints rules that are designed to improve the effectiveness of queries against the anonymized data. To anonymize a given raw dataset, two algorithms are proposed that use predefined generalizations provided by the data content expert and their corresponding research values to assess an attribute’s data utility as it is generalizing the data to ensure k-anonymity. In addition, an automated algorithm is presented that uses clustering and the RV to anonymize the dataset. All of the proposed algorithms scale efficiently when the number of attributes in a dataset is large.en-USData PrivacyUtilityK-AnonymityElectronic records -- Access controlPrivacy, Right ofPublic records -- Access controlUtility theory -- Mathematical modelsAttribute focusing (Data mining)Data protection -- ResearchCluster analysis -- Data processingDatabase securityAn Improved Utility Driven Approach Towards K-Anonymity Using Data Constraint RulesThesis