In this paper, we first present five state-of-the-art private blocking methods which rely mainly on random strings, clustering, and public reference sets. We emphasize on the drawbacks of these methods, and then, we present our L-fold redundant blocking scheme, that relies on the Locality-Sensitive Hashing technique for identifying similar records. These records have undergone an anonymization transformation using a Bloom filter-based encoding technique. Finally, we perform an experimental evaluation of all these methods and present the results.
CITATION STYLE
Karapiperis, D., Verykios, V. S., Katsiri, E., & Delis, A. (2016). A tutorial on blocking methods for privacy-preserving record linkage. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9511, pp. 3–15). Springer Verlag. https://doi.org/10.1007/978-3-319-29919-8_1
Mendeley helps you to discover research relevant for your work.