| Literature DB >> 31484555 |
Florian Kohlmayer1, Ronald Lautenschläger1, Fabian Prasser2.
Abstract
BACKGROUND: The collection of data and biospecimens which characterize patients and probands in-depth is a core element of modern biomedical research. Relevant data must be considered highly sensitive and it needs to be protected from unauthorized use and re-identification. In this context, laws, regulations, guidelines and best-practices often recommend or mandate pseudonymization, which means that directly identifying data of subjects (e.g. names and addresses) is stored separately from data which is primarily needed for scientific analyses. DISCUSSION: When (authorized) re-identification of subjects is not an exceptional but a common procedure, e.g. due to longitudinal data collection, implementing pseudonymization can significantly increase the complexity of software solutions. For example, data stored in distributed databases, need to be dynamically combined with each other, which requires additional interfaces for communicating between the various subsystems. This increased complexity may lead to new attack vectors for intruders. Obviously, this is in contrast to the objective of improving data protection. What is lacking is a standardized process of evaluating and reporting risks, threats and countermeasures, which can be used to test whether integrating pseudonymization methods into data collection systems actually improves upon the degree of protection provided by system designs that simply follow common IT security best practices and implement fine-grained role-based access control models. To demonstrate that the methods used to describe systems employing pseudonymized data management are currently heterogeneous and ad-hoc, we examined the extent to which twelve recent studies address each of the six basic security properties defined by the International Organization for Standardization (ISO) standard 27,000. We show inconsistencies across the studies, with most of them failing to mention one or more security properties.Entities:
Mesh:
Year: 2019 PMID: 31484555 PMCID: PMC6727563 DOI: 10.1186/s12911-019-0905-x
Source DB: PubMed Journal: BMC Med Inform Decis Mak ISSN: 1472-6947 Impact factor: 2.796
Fig. 1Basic attack scenario addressed by pseudonymization
Overview of basic security properties defined by ISO 27000 (Descriptions from [28])
| Property | Description |
|---|---|
| 1. Authenticity | “Property that an entity is what it claims to be” |
| 2. Integrity | “Property of protecting the accuracy and completeness of assets” |
| 3. Accountability | “Responsibility of an entity for its actions and decisions” |
| 4. Confidentiality | “Property that information is not made available or disclosed to unauthorized individuals, entities, or processes” |
| 5. Availability | “Property of being accessible and usable upon demand by an authorized entity” |
| 6. Authorization | “Approval that is granted to a system entity to access a system resource” |
Overview of security properties explicitly addressed by mentioning protection mechanisms in the articles considered
| Property | ||||||||
|---|---|---|---|---|---|---|---|---|
| Ref | Year | Country | Authenticity | Integrity | Accountability | Confidentiality | Availability | Authorization |
| [ | 2011 | Austria | x | x | x | x | x | |
| [ | 2015 | Germany | x | x | x | x | x | x |
| [ | 2000 | Iceland | x | x | ||||
| [ | 2010 | Germany | x | x | x | |||
| [ | 2012 | Germany | x | x | x | x | ||
| [ | 2013 | Germany | x | x | x | x | ||
| [ | 2006 | Germany | x | x | x | x | ||
| [ | 2007 | Germany | x | x | x | x | x | x |
| [ | 2008 | Germany | x | x | x | x | x | x |
| [ | 2009 | Germany | x | x | x | x | ||
| [ | 2011 | Luxemb. | x | x | x | x | ||
| [ | 2011 | Germany | x | x | x | x | x | |