Skip to main content

Identification of Sensitive Content in Data Repositories to Support Personal Information Protection

  • Conference paper
  • First Online:
Recent Trends and Future Technology in Applied Intelligence (IEA/AIE 2018)

Abstract

This article presents a two-step approach focusing on the identification of sensitive data within documents. The proposed pipeline first detects the domain of a document, then identifies the sensitive information it contains. Detection of domains allows to better understand the context of a documents, hence supports the disambiguation of potentially sensitive information. The prototype considers three domains: health, business and “other”. The system developed for the domain detection step is built and evaluated on a corpus composed of clinical notes, and articles about business or art from Forbes, Reuters, and The New York Times. The identification of sensitive information relies on a Conditional Random Fields (CRF) model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://laws-lois.justice.gc.ca/eng/acts/P-8.6/.

  2. 2.

    https://www.nytimes.com/2016/12/14/technology/yahoo-hack.html.

  3. 3.

    https://uk.businessinsider.com/yahoo-hack-by-state-sponsored-actor-biggest-of-all-time-2016-9.

  4. 4.

    https://www.bbc.co.uk/news/amp/technology-42075306.

  5. 5.

    https://www.consumer.ftc.gov/blog/2017/09/equifax-data-breach-what-do.

  6. 6.

    https://siliconangle.com/blog/2017/11/19/defense-department-contractor-leaves-spying-program-data-exposed-aws-instances/.

  7. 7.

    https://gdpr-info.eu/.

  8. 8.

    https://cloud.google.com/dlp/.

  9. 9.

    https://cloud.google.com/dlp/docs/infotypes-reference.

  10. 10.

    http://scikit-learn.org/.

  11. 11.

    http://brat.nlplab.org/standoff.html.

References

  1. Bodnari, A., Deleger, L., Lavergne, T., Neveol, A., Zweigenbaum, P.: A Supervised named-entity extraction system for medical text. In: CLEF (Working Notes) (2013)

    Google Scholar 

  2. Centers for Medicare & Medicaid Services and others: The Health Insurance Portability and Accountability Act of 1996 (HIPAA) (1996). http://www.cms.hhs.gov/hipaa

  3. Finkel, J.R., Grenager, T., Manning, C.: Incorporating non-local information into information extraction systems by gibbs sampling. In: Proceedings of the 43rd annual meeting on association for computational linguistics, Association for Computational Linguistics, pp. 363–370 (2005)

    Google Scholar 

  4. Landis, J.R., Koch, G.G.: The measurement of observer agreement for categorical data. Biometrics 33, 159–174 (1977)

    Article  Google Scholar 

  5. Manning, C., Surdeanu, M., Bauer, J., Finkel, J., Bethard, S., McClosky, D.: The stanford CoreNLP natural language processing toolkit. In: Proceedings of 52nd Annual Meeting of the Association for Computational Linguistics: System Demonstrations, pp. 55–60 (2014)

    Google Scholar 

  6. Nadeau, D., Sekine, S.: A survey of named entity recognition and classification. Lingvisticae Investigationes 30(1), 3–26 (2007)

    Article  Google Scholar 

  7. Saeed, M., Villarroel, M., Reisner, A.T., Clifford, G., Lehman, L.W., Moody, G., Heldt, T., Kyaw, T.H., Moody, B., Mark, R.G.: Multiparameter intelligent monitoring in intensive care II (MIMIC-II): a public-access intensive care unit database. Crit. Care Med. 39(5), 952 (2011)

    Article  Google Scholar 

  8. Stenetorp, P., Pyysalo, S., Topić, G., Ohta, T., Ananiadou, S., Tsujii, J.: BRAT: a web-based tool for NLP-assisted text annotation. In: Proceedings of the Demonstrations at the 13th Conference of the European Chapter of the Association for Computational Linguistics, Association for Computational Linguistics, pp. 102–107 (2012)

    Google Scholar 

  9. Stubbs, A., Kotfila, C., Uzuner, Ö.: Automated systems for the de-identification of longitudinal clinical narratives: overview of 2014 i2b2/UTHealth shared task track 1. J. Biomed. Inf. 58, S11–S19 (2015)

    Article  Google Scholar 

  10. Tarantino, A.: Governance, Risk, and Compliance Handbook: Technology, Finance, Environmental, and International Guidance and Best Practices. Wiley, New York (2008)

    Book  Google Scholar 

  11. Yang, H., Garibaldi, J.M.: Automatic detection of protected health information from clinic narratives. J. Biomed. Inf. 58, S30–S38 (2015)

    Article  Google Scholar 

Download references

Acknowledgment

As part of this work, the Deidentified Clinical Records used were provided by the i2b2 National Center for Biomedical Computing funded by U54LM008748 and were originally prepared for the Shared Tasks for Challenges in NLP for Clinical Data organized by Dr. Ozlem Uzuner, i2b2 and SUNY.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marie-Jean Meurs .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Briand, A., Zacharie, S., Jean-Louis, L., Meurs, MJ. (2018). Identification of Sensitive Content in Data Repositories to Support Personal Information Protection. In: Mouhoub, M., Sadaoui, S., Ait Mohamed, O., Ali, M. (eds) Recent Trends and Future Technology in Applied Intelligence. IEA/AIE 2018. Lecture Notes in Computer Science(), vol 10868. Springer, Cham. https://doi.org/10.1007/978-3-319-92058-0_86

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-92058-0_86

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-92057-3

  • Online ISBN: 978-3-319-92058-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics