Skip to main content
Top

2017 | OriginalPaper | Chapter

Privacy-Aware Data Analysis Middleware for Data-Driven EHR Systems

Authors : Thien-An Nguyen, Nhien-An Le-Khac, M-Tahar Kechadi

Published in: Future Data and Security Engineering

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Privacy preservation is an essential requirement for information systems and also it is regulated by law. However, existing solutions for privacy protection during data analysis have some limitations when applied to data-driven electronic health record (EHR) systems such as data distortion and flexibility. This paper presents a novel approach to deal with this issue that is a privacy-aware protocol for healthcare data analysis. This approach uses special secured views. For the compatibility with data-driven EHR systems, the protocol is proposed together with a high-level middleware architecture. The suggested solution is discussed based on system requirements and specification to demonstrate its advantages.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
HL7 Clinical Document Architecture, a standard for exchanging clinical documents.
 
2
Digital Imaging and Communications in Medicine, a standard for storing and transmitting medical images.
 
3
This table is taken from [20] but the other example tables are re-calculated for this paper by our method.
 
Literature
1.
go back to reference Connected health: The drive to integrated healthcare delivery. Technical report, Accenture (2012) Connected health: The drive to integrated healthcare delivery. Technical report, Accenture (2012)
2.
go back to reference Sixth annual benchmark study on privacy & security of healthcare data. Technical report, Ponemon Institute, USA (2016) Sixth annual benchmark study on privacy & security of healthcare data. Technical report, Ponemon Institute, USA (2016)
3.
go back to reference Agarwal, R., Khuntia, J.: Personal health information management and the design of consumer health information technology. Technical report, Insight Policy Research, Virginia (2009) Agarwal, R., Khuntia, J.: Personal health information management and the design of consumer health information technology. Technical report, Insight Policy Research, Virginia (2009)
4.
go back to reference Aggarwal, C.C.: On k-anonymity and the curse of dimensionality. In: Proceedings of the 31st International Conference on Very Large Data Bases, pp. 901–909. VLDB Endowment (2005) Aggarwal, C.C.: On k-anonymity and the curse of dimensionality. In: Proceedings of the 31st International Conference on Very Large Data Bases, pp. 901–909. VLDB Endowment (2005)
5.
go back to reference Agrawal, R., Johnson, C.: Securing electronic health records without impeding the flow of information. Int. J. Med. Inform. 76(5), 471–479 (2007)CrossRef Agrawal, R., Johnson, C.: Securing electronic health records without impeding the flow of information. Int. J. Med. Inform. 76(5), 471–479 (2007)CrossRef
6.
go back to reference Aouad, L.M., Le-Khac, N.A., Kechadi, T.: Grid-based approaches for distributed data mining applications. J. Algorithms Comput. Technol. 3(4), 517–534 (2009)CrossRef Aouad, L.M., Le-Khac, N.A., Kechadi, T.: Grid-based approaches for distributed data mining applications. J. Algorithms Comput. Technol. 3(4), 517–534 (2009)CrossRef
7.
go back to reference van Banerveld, M., Kechadi, M.-T., Le-Khac, N.-A.: A natural language processing tool for white collar crime investigation. In: Hameurlain, A., Küng, J., Wagner, R., Dang, T.K., Thoai, N. (eds.) Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII. LNCS, vol. 9480, pp. 1–22. Springer, Heidelberg (2016). doi:10.1007/978-3-662-49175-1_1 CrossRef van Banerveld, M., Kechadi, M.-T., Le-Khac, N.-A.: A natural language processing tool for white collar crime investigation. In: Hameurlain, A., Küng, J., Wagner, R., Dang, T.K., Thoai, N. (eds.) Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII. LNCS, vol. 9480, pp. 1–22. Springer, Heidelberg (2016). doi:10.​1007/​978-3-662-49175-1_​1 CrossRef
8.
go back to reference Berman, J.J.: Confidentiality issues for medical data miners. Artif. Intell. Med. 26(1–2), 25–36 (2002)CrossRef Berman, J.J.: Confidentiality issues for medical data miners. Artif. Intell. Med. 26(1–2), 25–36 (2002)CrossRef
9.
go back to reference Chiang, Y., Hsu, T., Kuo, S., Liau, C., Wang, D.: Preserving confidentiality when sharing medical database with the cellsecu system. Int. J. Med. Inform. 71(1), 17–23 (2003)CrossRef Chiang, Y., Hsu, T., Kuo, S., Liau, C., Wang, D.: Preserving confidentiality when sharing medical database with the cellsecu system. Int. J. Med. Inform. 71(1), 17–23 (2003)CrossRef
10.
go back to reference Dunbrack, L.A.: The integrated patient record: empowering patient-centric care. Technical report, IDC Health Insights (2013) Dunbrack, L.A.: The integrated patient record: empowering patient-centric care. Technical report, IDC Health Insights (2013)
11.
go back to reference Elger, B.S., Iavindrasana, J., Lo Iacono, L., Müller, H., Roduit, N., Summers, P., Wright, J.: Strategies for health data exchange for secondary, cross-institutional clinical research. Comput. Methods Programs Biomed. 99(3), 230–251 (2010)CrossRef Elger, B.S., Iavindrasana, J., Lo Iacono, L., Müller, H., Roduit, N., Summers, P., Wright, J.: Strategies for health data exchange for secondary, cross-institutional clinical research. Comput. Methods Programs Biomed. 99(3), 230–251 (2010)CrossRef
12.
go back to reference Fung, B.C., Wang, K., Fu, A.W., Philip, S.Y.: Introduction to Privacy-preserving Data Publishing: Concepts and Techniques. CRC Press, Boca Raton (2010)CrossRef Fung, B.C., Wang, K., Fu, A.W., Philip, S.Y.: Introduction to Privacy-preserving Data Publishing: Concepts and Techniques. CRC Press, Boca Raton (2010)CrossRef
13.
go back to reference Gardner, J., Xiong, L.: An integrated framework for de-identifying heterogeneous data. Data Knowl. Eng. 68(12), 1441–1451 (2009)CrossRef Gardner, J., Xiong, L.: An integrated framework for de-identifying heterogeneous data. Data Knowl. Eng. 68(12), 1441–1451 (2009)CrossRef
14.
go back to reference Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers, San Francisco (2005)MATH Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers, San Francisco (2005)MATH
15.
go back to reference Heurix, J., Karlinger, M., Neubauer, T.: Perimeter pseudonymization and personal metadata encryption for privacy-preserving searchable documents. Health Syst. 1, 46–57 (2012)CrossRef Heurix, J., Karlinger, M., Neubauer, T.: Perimeter pseudonymization and personal metadata encryption for privacy-preserving searchable documents. Health Syst. 1, 46–57 (2012)CrossRef
16.
go back to reference Jones, S.S., Caloyeras, J.P., Mattke, S.: The role of consumer-controlled personal health management systems in the evolution of employer-based health care benefits. Technical report, RAND Corporation (2011) Jones, S.S., Caloyeras, J.P., Mattke, S.: The role of consumer-controlled personal health management systems in the evolution of employer-based health care benefits. Technical report, RAND Corporation (2011)
17.
go back to reference Le-Khac, N.-A., Bue, M., Whelan, M., Kechadi, M.-T.: A Clustering-Based Data Reduction for Very Large Spatio-Temporal Datasets. In: Cao, L., Zhong, J., Feng, Y. (eds.) ADMA 2010. LNCS (LNAI), vol. 6441, pp. 43–54. Springer, Heidelberg (2010). doi:10.1007/978-3-642-17313-4_5 CrossRef Le-Khac, N.-A., Bue, M., Whelan, M., Kechadi, M.-T.: A Clustering-Based Data Reduction for Very Large Spatio-Temporal Datasets. In: Cao, L., Zhong, J., Feng, Y. (eds.) ADMA 2010. LNCS (LNAI), vol. 6441, pp. 43–54. Springer, Heidelberg (2010). doi:10.​1007/​978-3-642-17313-4_​5 CrossRef
18.
go back to reference Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering, pp. 106–115 (2007) Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering, pp. 106–115 (2007)
19.
go back to reference Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1) (2007) Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1) (2007)
20.
go back to reference Mohammed, N., Fung, B.C.M., Hung, P.C.K., Lee, C.: Anonymizing healthcare data: a case study on the blood transfusion service. In: Proceedings 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD 2009, USA, pp. 1285–1294 (2009) Mohammed, N., Fung, B.C.M., Hung, P.C.K., Lee, C.: Anonymizing healthcare data: a case study on the blood transfusion service. In: Proceedings 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD 2009, USA, pp. 1285–1294 (2009)
21.
go back to reference Nelson, G.S.: Practical implications of sharing data: a primer on data privacy, anonymization, and de-identification. Technical report, ThotWave Technologies, North Carolina (2015) Nelson, G.S.: Practical implications of sharing data: a primer on data privacy, anonymization, and de-identification. Technical report, ThotWave Technologies, North Carolina (2015)
22.
go back to reference Prasser, F., Kohlmayer, F., Lautenschlger, R., Kuhn, K.A.: ARX - a comprehensive tool for anonymizing biomedical data. In: AMIA Annual Symposium Proceedings, p. 984. American Medical Informatics Association (2014) Prasser, F., Kohlmayer, F., Lautenschlger, R., Kuhn, K.A.: ARX - a comprehensive tool for anonymizing biomedical data. In: AMIA Annual Symposium Proceedings, p. 984. American Medical Informatics Association (2014)
23.
go back to reference Skowron, A., Rauszer, C.: The discernibility matrices and functions in information systems. In: Słowiński, R. (ed.) Intelligent Decision Support. Theory and Decision Library. Theory and Decision Library, vol. 11, pp. 331–362. Springer, Dordrecht (1992). doi:10.1007/978-94-015-7975-9_21 CrossRef Skowron, A., Rauszer, C.: The discernibility matrices and functions in information systems. In: Słowiński, R. (ed.) Intelligent Decision Support. Theory and Decision Library. Theory and Decision Library, vol. 11, pp. 331–362. Springer, Dordrecht (1992). doi:10.​1007/​978-94-015-7975-9_​21 CrossRef
24.
go back to reference Sweeney, L.: Datafly: a system for providing anonymity in medical data. In: Lin, T.Y., Qian, S. (eds.) Database Security XI. IFIP Advances in Information and Communication Technology, pp. 356–381. Springer, Boston (1998). doi:10.1007/978-0-387-35285-5_22 CrossRef Sweeney, L.: Datafly: a system for providing anonymity in medical data. In: Lin, T.Y., Qian, S. (eds.) Database Security XI. IFIP Advances in Information and Communication Technology, pp. 356–381. Springer, Boston (1998). doi:10.​1007/​978-0-387-35285-5_​22 CrossRef
25.
go back to reference Sweeney, L.: Simple demographics often identify people uniquely. Health 671, 1–34 (2000) Sweeney, L.: Simple demographics often identify people uniquely. Health 671, 1–34 (2000)
26.
27.
go back to reference Wang, K., Fung, B.C.M.: Anonymizing sequential releases. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD 2006, pp. 414–423. ACM (2006) Wang, K., Fung, B.C.M.: Anonymizing sequential releases. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD 2006, pp. 414–423. ACM (2006)
28.
go back to reference Xiao, X., Tao, Y.: Anatomy: simple and effective privacy preservation. In: Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 139–150. VLDB Endowment (2006) Xiao, X., Tao, Y.: Anatomy: simple and effective privacy preservation. In: Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 139–150. VLDB Endowment (2006)
Metadata
Title
Privacy-Aware Data Analysis Middleware for Data-Driven EHR Systems
Authors
Thien-An Nguyen
Nhien-An Le-Khac
M-Tahar Kechadi
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-70004-5_24

Premium Partner