Pseudonymization for the Protection of Personal Data Necessary to Conduct Corporate Transactions Using Encryption and Tokenization Methods

Authors

  • Nontawatt Saraman Cyber Innovation Promotion Association of Technology
  • Surasak Mungsing Faculty of Information Technology, Sripatum University

Keywords:

Personal data, Anonymization, Encryption, Tokenization, Pseudonymisation

Abstract

Personal data is any information that can be directly or indirectly linked to an individual. It is the information that is necessary to carry out the transaction. The best way to protect personal information is to make that information become anonymous without the identity of the person anymore and cannot be reversed regardless of any additional information. This article objective is to present presents methods for creating pseudonymisation for protecting personal information by means of encryption and tokenization. 

 

References

  1. C. Van Tilborg and S. Jajodia, Encyclopedia of cryptography and security, Springer Science & Business Media, 2014.

Athena, Prokopios Drogkaris, Ioannis Agrafiotis. PSEUDONYMISATION TECHNIQUES AND BEST PRACTICES NOVEMBER 2019. European Union Agency for Cybersecurity (ENISA).

TrustySign Co. Ltd., Trusty Sign – your only digital identity. https://www.trustysign.net, 25 September 2021.

Hercules Dalianis, Pseudonymisation of Swedish Electronic Patient Records Using a Rule-based Approach, Proceeding of the Workshop on NLP and Pseudonymisation, pages 16-23, Turku, Finland, 30 September 2019.

Johannes Heurix, Michael Karlinger, Michael Schrefl and Thomas Neubauer, A HYBRID APPROACH INTEGRATING ENCRYPTION AND PSEUDONYMIZATION FOR PROTECTING ELECTRONIC HEALTH REC April 2011

Log management, SRAN Log ที่มีคุณภาพนั้นเป็นอย่างไร https://bit.ly/3kYVySY, 18 April 2018.

Pseudonymization according to the GDPR [definitions and examples] https://dataprivacymanager.net/ pseudonymization-according-to-the-gdpr/, download: 28 Sep 2021.

พระราชบัญญัติคุ้มครองข้อมูลส่วนบุคคล พ.ศ.2562 http:// www.ratchakitcha.soc.go.th/DATA/PDF/2562/A/069/ T_0052.PDF, download: 28 Sep 2021.

Downloads

Published

2022-10-22

How to Cite

Saraman, N. ., & Mungsing, S. . (2022). Pseudonymization for the Protection of Personal Data Necessary to Conduct Corporate Transactions Using Encryption and Tokenization Methods. Journal of the Thai Medical Informatics Association, 8(2), 55–60. Retrieved from https://he03.tci-thaijo.org/index.php/jtmi/article/view/478