Redfield developed a number of nodes to help the community with comply with GDPR. The nodes along with reference workflows help achieve the following objectives:
- Basic anonymization and pseudonymization
- Advanced hierarchical anonymization
- Assessment of the anonymization (reduce re-identification risks)
-
Anonymization - these nodes utilizes SHA-1 hashing with several types of salting techniques.
-
Assessment - estimates the distinction and separation for quasi-identifying attributes and three attacker models: journalist, marketer and prosecutor.
-
Hierarchical Anonymization - Different hierarchical types can be applied:
- order-based;
- date-based;
- interval-based;
- masking-base.
Once hierarchical type is selected it is possible to tweak anonymization strategy.
-
Create hierarchy - This node is used for building the hierarchies that are used in Anonymization node.
-
Hierarchy Reader - This node has two main functions:
- read the binary file of hierarchy;
- update the hierarchy to fit the input data set.
-
Hierarchy writer - Created or updated hierarchies can be stored on the disk as binary files with the help of this node.
Copyright (c) 2019 Redfield AB. This project is licensed under the GNU GENERAL PUBLIC LICENSE Version 3, see the LICENSE for details.