risk and utility during the anonymization process,
helping organizations to prepare reports.
5.4 Privacy Analytics Eclipse
According to the website itself (Privacy Analytics,
s.d.), this tool anonymizes data allowing it to maintain
its quality and preserve compliance with many data
privacy regulations, including GDPR. It also allows
to adopt HIPPA’s Expert Determination Method that
classifies data attributes. It works with large volumes
of data and, like the previous ones, offers re-
identification risk assessment. Supports data export in
CSV and ODS formats.
This tool is widely used in the healthcare area. Its
main advantage is that it is a fast and very precise
anonymization tool that guarantees compliance with
legal regulations. Anonymization techniques are
optimized based on measures of risk to patient
privacy.
5.5 Software vs Techniques
Table 2 shows the software listed above and which is
usually used for the application of the studied
techniques.
Table 2: Software vs Techniques.
Software/Tool Techniques
ARX
Generalization
K-Anonymity
L-Diversity
Suppression
µ-Argus
Noise Addition;
Suppression
SDCMicro
Noise Addition
Suppression
Shuffling
Privacy Analytics
Eclipse
Generalization
K-Anonymity
L-Diversity
Noise Addition
Shuffling
6 CONCLUSIONS AND FUTURE
WORK
Anonymization is an important issue that has been
increasingly demanding the attention of the
community. With the large volume of personal data
available for analysis and treatment there is a need to
ensure the privacy of individuals.
If, on the one hand, GDPR harmonises the level
of data protection, on the other hand, the fact that
there are defined rules, allows companies to carry out
more actions with the information, allowing them to
analyse and adopt the information to assist business
decisions.
There are several anonymization techniques, the
main ones being presented in this paper. Each
technique has advantages and weaknesses; however,
it is necessary to choose the appropriate technique for
the dataset to be worked on at the moment. Therefore,
anonymization techniques guarantee data privacy
when properly applied. In some specific situations, it
may be advantageous to apply several combined
techniques. In many cases, after applying
anonymization techniques to the dataset, it may be
possible, in some way, to infer information about an
individual, even if is not very accurate.
The need to implement and comply with the
defined standards, as in the GDPR, means that there
are several tools and software capable of assisting the
anonymization of data, in addition to those presented
in this article. For example, in (Privacy Analytics
Eclipse Alternatives & Competitors, s.d.) is a list of
20 alternative tools to Privacy Analytics Eclipse. In
general, all of them allow to apply more than one
anonymization technique and include features of risk
assessment of re-identification. Note that some of
them are specific to a purpose or to work with a
certain type of data.
As future work, we intend to test each of these
tools with real datasets and evaluate the
anonymization performance of each one.
REFERENCES
ARX. (n.d.). ARX - Data Anonymization Tool. Retrieved
from ARX DEIDENTIFIER:
https://arx.deidentifier.org/
CHEO Research Institute. (n.d.). What is the relashionship
between prosecutor, journalist, and marketer risk?
Retrieved from Electronic Health Information
Laboratory:
http://www.ehealthinformation.ca/faq/relationship-
prosecutor-journalist-marketer-risk/
El Emam, K. &. (2008). Protecting Privacy Using K-
Anonymity. Journal of the American Medical
Informatics Association, pp. 627-637.
General Data Protection Regulation . (n.d.). Retrieved
from Intersoft Consulting: https://gdpr-info.eu/
Google. (n.d.). How Google Anonymises Data. Retrieved
from Google Privacy&Terms: https://policies.google.
com/technologies/anonymization
International Household Survey Network. (n.d.). Statistical
Disclosure Control (sdcMicro). Retrieved from