Literature DB >> 21075676

A methodology for the pseudonymization of medical data.

Thomas Neubauer1, Johannes Heurix.   

Abstract

PURPOSE: E-health enables the sharing of patient-related data whenever and wherever necessary. Electronic health records (EHRs) promise to improve communication between health care providers, thus leading to better quality of patients' treatment and reduced costs. However, as highly sensitive patient information provides a promising goal for attackers and is also frequently demanded by insurance companies and employers, there is increasing social and political pressure regarding the prevention of health data misuse. This work addresses this problem and introduces a methodology that protects health records from unauthorized access and lets the patient as data owner decide who the authorized persons are, i.e., who the patient discloses her health information to. Therefore, the methodology prevents data disclosure that negatively influences the patient's life (e.g., by being denied health insurance or employment).
METHODS: This research uses a combination of conceptual-analytical, artifact-building and artifact-evaluating research approaches. The article starts with a detailed exploration of existing privacy protection mechanisms, such as encryption, anonymization and pseudonymization, by comparing and analyzing related work (conceptual-analytical approach). Based on these results and the identified shortcomings, a pseudonymization methodology is defined and evaluated by means of a threat analysis. Finally, the research results are validated with the design and implementation of a prototype (artifact building and artifact evaluation).
RESULTS: This paper presents a new methodology for the pseudonymization of medical data that stores health data decoupled from the corresponding patient-identifying information, allowing privacy-preserving secondary use of the health records in clinical studies without additional anonymization steps. In contrast to clinical studies, where it is not necessary to identify the individual participants, insurance companies and employers are interested in the health status of individuals such as potential insurance or job applicants. In this case, pseudonymized records are practically useless for these parties as the patient controls who is able to reestablish the link between health records and patient for primary use - usually only trusted health care providers.
CONCLUSIONS: The framework provides health care providers with a unique solution that guarantees data privacy (e.g., according to HIPAA) and allows primary and secondary use of the data at the same time. The security analysis showed that the methodology is secure and protected against common intruder scenarios.
Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

Entities:  

Mesh:

Year:  2010        PMID: 21075676     DOI: 10.1016/j.ijmedinf.2010.10.016

Source DB:  PubMed          Journal:  Int J Med Inform        ISSN: 1386-5056            Impact factor:   4.046


  12 in total

1.  Advances and current state of the security and privacy in electronic health records: survey from a social perspective.

Authors:  Antonio Tejero; Isabel de la Torre
Journal:  J Med Syst       Date:  2011-09-21       Impact factor: 4.460

2.  Assessing the quality of clinical and administrative data extracted from hospitals: the General Medicine Inpatient Initiative (GEMINI) experience.

Authors:  Amol A Verma; Sachin V Pasricha; Hae Young Jung; Vladyslav Kushnir; Denise Y F Mak; Radha Koppula; Yishan Guo; Janice L Kwan; Lauren Lapointe-Shaw; Shail Rawal; Terence Tang; Adina Weinerman; Fahad Razak
Journal:  J Am Med Inform Assoc       Date:  2021-03-01       Impact factor: 4.497

3.  Accuracy of an Electronic Health Record Patient Linkage Module Evaluated between Neighboring Academic Health Care Centers.

Authors:  Mindy K Ross; Javier Sanz; Brian Tep; Rob Follett; Spencer L Soohoo; Douglas S Bell
Journal:  Appl Clin Inform       Date:  2020-11-04       Impact factor: 2.342

4.  Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System.

Authors:  Jieun Eom; Dong Hoon Lee; Kwangsu Lee
Journal:  J Med Syst       Date:  2016-10-06       Impact factor: 4.460

5.  Implementation of an anonymisation tool for clinical trials using a clinical trial processor integrated with an existing trial patient data information system.

Authors:  Kadek Y E Aryanto; André Broekema; Matthijs Oudkerk; Peter M A van Ooijen
Journal:  Eur Radiol       Date:  2011-08-14       Impact factor: 5.315

6.  Pseudonymization of patient identifiers for translational research.

Authors:  Harald Aamot; Christian Dominik Kohl; Daniela Richter; Petra Knaup-Gregori
Journal:  BMC Med Inform Decis Mak       Date:  2013-07-24       Impact factor: 2.796

7.  A generic solution for web-based management of pseudonymized data.

Authors:  Ronald Lautenschläger; Florian Kohlmayer; Fabian Prasser; Klaus A Kuhn
Journal:  BMC Med Inform Decis Mak       Date:  2015-11-30       Impact factor: 2.796

8.  Free DICOM de-identification tools in clinical research: functioning and safety of patient privacy.

Authors:  K Y E Aryanto; M Oudkerk; P M A van Ooijen
Journal:  Eur Radiol       Date:  2015-06-03       Impact factor: 5.315

9.  PAX: Using Pseudonymization and Anonymization to Protect Patients' Identities and Data in the Healthcare System.

Authors:  Mishall Al-Zubaidie; Zhongwei Zhang; Ji Zhang
Journal:  Int J Environ Res Public Health       Date:  2019-04-27       Impact factor: 3.390

10.  Pseudonymization for research data collection: is the juice worth the squeeze?

Authors:  Florian Kohlmayer; Ronald Lautenschläger; Fabian Prasser
Journal:  BMC Med Inform Decis Mak       Date:  2019-09-04       Impact factor: 2.796

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.