| Literature DB >> 26811074 |
K Y E Aryanto1, G van Kernebeek2, B Berendsen3, M Oudkerk4, P M A van Ooijen4.
Abstract
To investigate possible de-identification methodologies within the Cross-Enterprise Document Sharing for imaging (XDS-I) environment in order to provide strengthened support for image data exchange as part of clinical research projects. De-identification, using anonymization or pseudonymization, is the most common method to perform information removal within DICOM data. However, it is not a standard part of the XDS-I profiles. Different methodologies were observed to define how and where de-identification should take place within an XDS environment used for scientific research. De-identification service can be placed in three locations within the XDS-I framework: 1) within the Document Source, 2) between the Document Source and Document Consumer, and 3) within the Document Consumer. First method has a potential advantage with respect to the exposure of the images to outside systems but has drawbacks with respect to additional hardware and configuration requirements. Second and third method have big concern in exposing original documents with all identifiable data being intact after leaving the Document Source. De-identification within the Document Source has more advantages compared to the other methods. On the contrary, it is less recommended to perform de-identification within the Document Consumer since it has the highest risk of the exposure of patients identity due to the fact that images are exposed without de-identification during the transfers.Entities:
Keywords: Clinical Research; Cross-enterprise document sharing; De-identification; Patient data privacy; XDS; XDS-I
Mesh:
Year: 2016 PMID: 26811074 PMCID: PMC4728177 DOI: 10.1007/s10916-016-0431-7
Source DB: PubMed Journal: J Med Syst ISSN: 0148-5598 Impact factor: 4.460
Fig. 1Actors and transactions in XDS-I. Document Consumer queries documents from the registrty and retrieve images either from repository or directly from source; Document Source provides the requested documents and transfers them to the consumer or repository; Document Registry indexes all published documents and repositories involved in data sharing; Document Repository handles the documents storage
Fig. 2De-identification is performed within the Document Source (shown as green area), to ensure data are de-identified before leaving the source
Fig. 3De-identification is performed in the Document Consumer (shown as green area). They are de-identified before being stored within the consumer’s domain
Fig. 4De-identification is performed within the Document Repository with additional required service placed between source and consumer (shown as green area), toensure data are de-identified before stored in the repository
Fig. 5De-identification of data is done within the Document Source. De-identified documents are sent from the source
Fig. 6De-identification of data is done within the Document Consumer. Fully exposed original documents are sent through the network without prior de-identification
Fig. 7De-identification of data is done within the Affinity Domain. Images sent from the Document source are not de-identified
Summary of property ratings of all possible de-identification methodologies within the XDS-I environment
| De-identification within XDS Source | De-identification within XDS Consumer | De-identification within Affinity Domain | |
|---|---|---|---|
| The speed of processing | + | + | +− |
| Processing time | +− | + | +− |
| Additional hardware required | − | − | + |
| Protection of identifiable elements during transfers | ++ | −− | − |
−−very poor
−poor
+−fair
+good
++very good