{"id":"https://openalex.org/W3094388486","doi":"https://doi.org/10.1145/3340531.3412105","title":"Securing Bloom Filters for Privacy-preserving Record Linkage","display_name":"Securing Bloom Filters for Privacy-preserving Record Linkage","publication_year":2020,"publication_date":"2020-10-19","ids":{"openalex":"https://openalex.org/W3094388486","doi":"https://doi.org/10.1145/3340531.3412105","mag":"3094388486"},"language":"en","primary_location":{"id":"doi:10.1145/3340531.3412105","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3340531.3412105","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038468449","display_name":"Thilina Ranbaduge","orcid":"https://orcid.org/0000-0001-5405-3704"},"institutions":[{"id":"https://openalex.org/I118347636","display_name":"Australian National University","ror":"https://ror.org/019wvm592","country_code":"AU","type":"education","lineage":["https://openalex.org/I118347636"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Thilina Ranbaduge","raw_affiliation_strings":["The Australian National University, Canberra, Australia"],"affiliations":[{"raw_affiliation_string":"The Australian National University, Canberra, Australia","institution_ids":["https://openalex.org/I118347636"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022560140","display_name":"Rainer Schnell","orcid":"https://orcid.org/0000-0001-7843-4974"},"institutions":[{"id":"https://openalex.org/I62318514","display_name":"University of Duisburg-Essen","ror":"https://ror.org/04mz5ra38","country_code":"DE","type":"education","lineage":["https://openalex.org/I62318514"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Rainer Schnell","raw_affiliation_strings":["University Duisburg-Essen, Duisburg, Germany"],"affiliations":[{"raw_affiliation_string":"University Duisburg-Essen, Duisburg, Germany","institution_ids":["https://openalex.org/I62318514"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5038468449"],"corresponding_institution_ids":["https://openalex.org/I118347636"],"apc_list":null,"apc_paid":null,"fwci":1.7233,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.87843188,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2185","last_page":"2188"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.9409668445587158},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8185368776321411},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.6730011105537415},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.655903160572052},{"id":"https://openalex.org/keywords/encode","display_name":"ENCODE","score":0.6367870569229126},{"id":"https://openalex.org/keywords/record-linkage","display_name":"Record linkage","score":0.6201441287994385},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5980644226074219},{"id":"https://openalex.org/keywords/linkage","display_name":"Linkage (software)","score":0.5247623920440674},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.49674707651138306},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.49575909972190857},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.48723354935646057},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4576903283596039},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.4425739347934723},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24681493639945984},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.18422383069992065},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1683003306388855},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1323108673095703},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09306082129478455},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.09143254160881042}],"concepts":[{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.9409668445587158},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8185368776321411},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.6730011105537415},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.655903160572052},{"id":"https://openalex.org/C66746571","wikidata":"https://www.wikidata.org/wiki/Q1134833","display_name":"ENCODE","level":3,"score":0.6367870569229126},{"id":"https://openalex.org/C142210648","wikidata":"https://www.wikidata.org/wiki/Q1266546","display_name":"Record linkage","level":3,"score":0.6201441287994385},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5980644226074219},{"id":"https://openalex.org/C31266012","wikidata":"https://www.wikidata.org/wiki/Q6554340","display_name":"Linkage (software)","level":3,"score":0.5247623920440674},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.49674707651138306},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.49575909972190857},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.48723354935646057},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4576903283596039},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.4425739347934723},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24681493639945984},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.18422383069992065},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1683003306388855},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1323108673095703},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09306082129478455},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.09143254160881042},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3340531.3412105","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3340531.3412105","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.75}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W49600654","https://openalex.org/W1547612978","https://openalex.org/W1916258859","https://openalex.org/W2153037537","https://openalex.org/W2482683773","https://openalex.org/W2584260284","https://openalex.org/W2589250137","https://openalex.org/W2911978475","https://openalex.org/W2912293513","https://openalex.org/W2949646143","https://openalex.org/W3092768173"],"related_works":["https://openalex.org/W2086572746","https://openalex.org/W2604468458","https://openalex.org/W2157216338","https://openalex.org/W121740227","https://openalex.org/W1662107788","https://openalex.org/W3082379938","https://openalex.org/W3022689928","https://openalex.org/W4206009022","https://openalex.org/W4200578079","https://openalex.org/W3009820126"],"abstract_inverted_index":{"Privacy-preserving":[0],"record":[1],"linkage":[2,140],"(PPRL)":[3],"facilitates":[4],"the":[5,12,21,24,77],"matching":[6],"of":[7,23],"records":[8,56],"that":[9,40,79,91,124,147],"correspond":[10],"to":[11,51,71,98,111,143],"same":[13],"real-world":[14],"entities":[15],"across":[16],"different":[17],"databases":[18,122],"while":[19,57],"preserving":[20],"privacy":[22,49,72,100,131,145],"individuals":[25],"in":[26,44,55,108],"these":[27],"databases.":[28],"A":[29],"Bloom":[30],"filter":[31],"(BF)":[32],"is":[33,41,69],"a":[34,109],"space":[35],"efficient":[36,48],"probabilistic":[37],"data":[38],"structure":[39],"becoming":[42],"popular":[43],"PPRL":[45],"as":[46],"an":[47],"technique":[50],"encode":[52],"sensitive":[53],"information":[54],"still":[58],"enabling":[59],"approximate":[60],"similarity":[61,136],"computations":[62],"between":[63],"attribute":[64],"values.":[65,115],"However,":[66],"BF":[67,96,110,152],"encoding":[68,97],"susceptible":[70],"attacks":[73],"which":[74],"can":[75,92,148],"re-identify":[76],"values":[78],"are":[80],"being":[81],"encoded.":[82],"In":[83],"this":[84],"paper":[85],"we":[86],"propose":[87],"two":[88],"novel":[89],"techniques":[90,104,126],"be":[93,149],"applied":[94,150],"on":[95,119,151],"improve":[99],"against":[101,130],"attacks.":[102],"Our":[103],"use":[105],"neighbouring":[106],"bits":[107],"generate":[112],"new":[113],"bit":[114],"An":[116],"empirical":[117],"study":[118],"large":[120],"real":[121],"shows":[123],"our":[125],"provide":[127],"high":[128],"security":[129],"attacks,":[132],"and":[133,139],"achieve":[134],"better":[135],"computation":[137],"accuracy":[138],"quality":[141],"compared":[142],"other":[144],"improvements":[146],"encoding.":[153]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
