Skip to main content

2017 | OriginalPaper | Buchkapitel

Privacy-Aware Data Analysis Middleware for Data-Driven EHR Systems

verfasst von : Thien-An Nguyen, Nhien-An Le-Khac, M-Tahar Kechadi

Erschienen in: Future Data and Security Engineering

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Privacy preservation is an essential requirement for information systems and also it is regulated by law. However, existing solutions for privacy protection during data analysis have some limitations when applied to data-driven electronic health record (EHR) systems such as data distortion and flexibility. This paper presents a novel approach to deal with this issue that is a privacy-aware protocol for healthcare data analysis. This approach uses special secured views. For the compatibility with data-driven EHR systems, the protocol is proposed together with a high-level middleware architecture. The suggested solution is discussed based on system requirements and specification to demonstrate its advantages.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
HL7 Clinical Document Architecture, a standard for exchanging clinical documents.
 
2
Digital Imaging and Communications in Medicine, a standard for storing and transmitting medical images.
 
3
This table is taken from [20] but the other example tables are re-calculated for this paper by our method.
 
Literatur
1.
Zurück zum Zitat Connected health: The drive to integrated healthcare delivery. Technical report, Accenture (2012) Connected health: The drive to integrated healthcare delivery. Technical report, Accenture (2012)
2.
Zurück zum Zitat Sixth annual benchmark study on privacy & security of healthcare data. Technical report, Ponemon Institute, USA (2016) Sixth annual benchmark study on privacy & security of healthcare data. Technical report, Ponemon Institute, USA (2016)
3.
Zurück zum Zitat Agarwal, R., Khuntia, J.: Personal health information management and the design of consumer health information technology. Technical report, Insight Policy Research, Virginia (2009) Agarwal, R., Khuntia, J.: Personal health information management and the design of consumer health information technology. Technical report, Insight Policy Research, Virginia (2009)
4.
Zurück zum Zitat Aggarwal, C.C.: On k-anonymity and the curse of dimensionality. In: Proceedings of the 31st International Conference on Very Large Data Bases, pp. 901–909. VLDB Endowment (2005) Aggarwal, C.C.: On k-anonymity and the curse of dimensionality. In: Proceedings of the 31st International Conference on Very Large Data Bases, pp. 901–909. VLDB Endowment (2005)
5.
Zurück zum Zitat Agrawal, R., Johnson, C.: Securing electronic health records without impeding the flow of information. Int. J. Med. Inform. 76(5), 471–479 (2007)CrossRef Agrawal, R., Johnson, C.: Securing electronic health records without impeding the flow of information. Int. J. Med. Inform. 76(5), 471–479 (2007)CrossRef
6.
Zurück zum Zitat Aouad, L.M., Le-Khac, N.A., Kechadi, T.: Grid-based approaches for distributed data mining applications. J. Algorithms Comput. Technol. 3(4), 517–534 (2009)CrossRef Aouad, L.M., Le-Khac, N.A., Kechadi, T.: Grid-based approaches for distributed data mining applications. J. Algorithms Comput. Technol. 3(4), 517–534 (2009)CrossRef
7.
Zurück zum Zitat van Banerveld, M., Kechadi, M.-T., Le-Khac, N.-A.: A natural language processing tool for white collar crime investigation. In: Hameurlain, A., Küng, J., Wagner, R., Dang, T.K., Thoai, N. (eds.) Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII. LNCS, vol. 9480, pp. 1–22. Springer, Heidelberg (2016). doi:10.1007/978-3-662-49175-1_1 CrossRef van Banerveld, M., Kechadi, M.-T., Le-Khac, N.-A.: A natural language processing tool for white collar crime investigation. In: Hameurlain, A., Küng, J., Wagner, R., Dang, T.K., Thoai, N. (eds.) Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII. LNCS, vol. 9480, pp. 1–22. Springer, Heidelberg (2016). doi:10.​1007/​978-3-662-49175-1_​1 CrossRef
8.
Zurück zum Zitat Berman, J.J.: Confidentiality issues for medical data miners. Artif. Intell. Med. 26(1–2), 25–36 (2002)CrossRef Berman, J.J.: Confidentiality issues for medical data miners. Artif. Intell. Med. 26(1–2), 25–36 (2002)CrossRef
9.
Zurück zum Zitat Chiang, Y., Hsu, T., Kuo, S., Liau, C., Wang, D.: Preserving confidentiality when sharing medical database with the cellsecu system. Int. J. Med. Inform. 71(1), 17–23 (2003)CrossRef Chiang, Y., Hsu, T., Kuo, S., Liau, C., Wang, D.: Preserving confidentiality when sharing medical database with the cellsecu system. Int. J. Med. Inform. 71(1), 17–23 (2003)CrossRef
10.
Zurück zum Zitat Dunbrack, L.A.: The integrated patient record: empowering patient-centric care. Technical report, IDC Health Insights (2013) Dunbrack, L.A.: The integrated patient record: empowering patient-centric care. Technical report, IDC Health Insights (2013)
11.
Zurück zum Zitat Elger, B.S., Iavindrasana, J., Lo Iacono, L., Müller, H., Roduit, N., Summers, P., Wright, J.: Strategies for health data exchange for secondary, cross-institutional clinical research. Comput. Methods Programs Biomed. 99(3), 230–251 (2010)CrossRef Elger, B.S., Iavindrasana, J., Lo Iacono, L., Müller, H., Roduit, N., Summers, P., Wright, J.: Strategies for health data exchange for secondary, cross-institutional clinical research. Comput. Methods Programs Biomed. 99(3), 230–251 (2010)CrossRef
12.
Zurück zum Zitat Fung, B.C., Wang, K., Fu, A.W., Philip, S.Y.: Introduction to Privacy-preserving Data Publishing: Concepts and Techniques. CRC Press, Boca Raton (2010)CrossRef Fung, B.C., Wang, K., Fu, A.W., Philip, S.Y.: Introduction to Privacy-preserving Data Publishing: Concepts and Techniques. CRC Press, Boca Raton (2010)CrossRef
13.
Zurück zum Zitat Gardner, J., Xiong, L.: An integrated framework for de-identifying heterogeneous data. Data Knowl. Eng. 68(12), 1441–1451 (2009)CrossRef Gardner, J., Xiong, L.: An integrated framework for de-identifying heterogeneous data. Data Knowl. Eng. 68(12), 1441–1451 (2009)CrossRef
14.
Zurück zum Zitat Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers, San Francisco (2005)MATH Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers, San Francisco (2005)MATH
15.
Zurück zum Zitat Heurix, J., Karlinger, M., Neubauer, T.: Perimeter pseudonymization and personal metadata encryption for privacy-preserving searchable documents. Health Syst. 1, 46–57 (2012)CrossRef Heurix, J., Karlinger, M., Neubauer, T.: Perimeter pseudonymization and personal metadata encryption for privacy-preserving searchable documents. Health Syst. 1, 46–57 (2012)CrossRef
16.
Zurück zum Zitat Jones, S.S., Caloyeras, J.P., Mattke, S.: The role of consumer-controlled personal health management systems in the evolution of employer-based health care benefits. Technical report, RAND Corporation (2011) Jones, S.S., Caloyeras, J.P., Mattke, S.: The role of consumer-controlled personal health management systems in the evolution of employer-based health care benefits. Technical report, RAND Corporation (2011)
17.
Zurück zum Zitat Le-Khac, N.-A., Bue, M., Whelan, M., Kechadi, M.-T.: A Clustering-Based Data Reduction for Very Large Spatio-Temporal Datasets. In: Cao, L., Zhong, J., Feng, Y. (eds.) ADMA 2010. LNCS (LNAI), vol. 6441, pp. 43–54. Springer, Heidelberg (2010). doi:10.1007/978-3-642-17313-4_5 CrossRef Le-Khac, N.-A., Bue, M., Whelan, M., Kechadi, M.-T.: A Clustering-Based Data Reduction for Very Large Spatio-Temporal Datasets. In: Cao, L., Zhong, J., Feng, Y. (eds.) ADMA 2010. LNCS (LNAI), vol. 6441, pp. 43–54. Springer, Heidelberg (2010). doi:10.​1007/​978-3-642-17313-4_​5 CrossRef
18.
Zurück zum Zitat Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering, pp. 106–115 (2007) Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering, pp. 106–115 (2007)
19.
Zurück zum Zitat Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1) (2007) Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1) (2007)
20.
Zurück zum Zitat Mohammed, N., Fung, B.C.M., Hung, P.C.K., Lee, C.: Anonymizing healthcare data: a case study on the blood transfusion service. In: Proceedings 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD 2009, USA, pp. 1285–1294 (2009) Mohammed, N., Fung, B.C.M., Hung, P.C.K., Lee, C.: Anonymizing healthcare data: a case study on the blood transfusion service. In: Proceedings 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD 2009, USA, pp. 1285–1294 (2009)
21.
Zurück zum Zitat Nelson, G.S.: Practical implications of sharing data: a primer on data privacy, anonymization, and de-identification. Technical report, ThotWave Technologies, North Carolina (2015) Nelson, G.S.: Practical implications of sharing data: a primer on data privacy, anonymization, and de-identification. Technical report, ThotWave Technologies, North Carolina (2015)
22.
Zurück zum Zitat Prasser, F., Kohlmayer, F., Lautenschlger, R., Kuhn, K.A.: ARX - a comprehensive tool for anonymizing biomedical data. In: AMIA Annual Symposium Proceedings, p. 984. American Medical Informatics Association (2014) Prasser, F., Kohlmayer, F., Lautenschlger, R., Kuhn, K.A.: ARX - a comprehensive tool for anonymizing biomedical data. In: AMIA Annual Symposium Proceedings, p. 984. American Medical Informatics Association (2014)
23.
Zurück zum Zitat Skowron, A., Rauszer, C.: The discernibility matrices and functions in information systems. In: Słowiński, R. (ed.) Intelligent Decision Support. Theory and Decision Library. Theory and Decision Library, vol. 11, pp. 331–362. Springer, Dordrecht (1992). doi:10.1007/978-94-015-7975-9_21 CrossRef Skowron, A., Rauszer, C.: The discernibility matrices and functions in information systems. In: Słowiński, R. (ed.) Intelligent Decision Support. Theory and Decision Library. Theory and Decision Library, vol. 11, pp. 331–362. Springer, Dordrecht (1992). doi:10.​1007/​978-94-015-7975-9_​21 CrossRef
24.
Zurück zum Zitat Sweeney, L.: Datafly: a system for providing anonymity in medical data. In: Lin, T.Y., Qian, S. (eds.) Database Security XI. IFIP Advances in Information and Communication Technology, pp. 356–381. Springer, Boston (1998). doi:10.1007/978-0-387-35285-5_22 CrossRef Sweeney, L.: Datafly: a system for providing anonymity in medical data. In: Lin, T.Y., Qian, S. (eds.) Database Security XI. IFIP Advances in Information and Communication Technology, pp. 356–381. Springer, Boston (1998). doi:10.​1007/​978-0-387-35285-5_​22 CrossRef
25.
Zurück zum Zitat Sweeney, L.: Simple demographics often identify people uniquely. Health 671, 1–34 (2000) Sweeney, L.: Simple demographics often identify people uniquely. Health 671, 1–34 (2000)
26.
Zurück zum Zitat Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)CrossRefMATHMathSciNet Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)CrossRefMATHMathSciNet
27.
Zurück zum Zitat Wang, K., Fung, B.C.M.: Anonymizing sequential releases. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD 2006, pp. 414–423. ACM (2006) Wang, K., Fung, B.C.M.: Anonymizing sequential releases. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD 2006, pp. 414–423. ACM (2006)
28.
Zurück zum Zitat Xiao, X., Tao, Y.: Anatomy: simple and effective privacy preservation. In: Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 139–150. VLDB Endowment (2006) Xiao, X., Tao, Y.: Anatomy: simple and effective privacy preservation. In: Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 139–150. VLDB Endowment (2006)
Metadaten
Titel
Privacy-Aware Data Analysis Middleware for Data-Driven EHR Systems
verfasst von
Thien-An Nguyen
Nhien-An Le-Khac
M-Tahar Kechadi
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-70004-5_24

Premium Partner