| Literature DB >> 34660798 |
Dingyi Xiang1,2, Wei Cai3.
Abstract
Health big data has already been the most important big data for its serious privacy disclosure concerns and huge potential value of secondary use. Measurements must be taken to balance and compromise both the two serious challenges. One holistic solution or strategy is regarded as the preferred direction, by which the risk of reidentification from records should be kept as low as possible and data be shared with the principle of minimum necessary. In this article, we present a comprehensive review about privacy protection of health data from four aspects: health data, related regulations, three strategies for data sharing, and three types of methods with progressive levels. Finally, we summarize this review and identify future research directions.Entities:
Mesh:
Year: 2021 PMID: 34660798 PMCID: PMC8516535 DOI: 10.1155/2021/6967166
Source DB: PubMed Journal: Biomed Res Int Impact factor: 3.411
Summarization of clinical data and consumer health data.
| Category 1: clinical data | Category 2: consumer health data | |
|---|---|---|
| Generated/record by | Healthcare system | Wearable device (wristband, watch) |
| Data detail | Name, id, age, address, phone, medical history, family history, conditions, laboratory test, treatments, prescriptions, etc. | Name, id, phone, address, position, age, weight, heart rate, breath, blood pressure, blood glucose, exercise data, diet preference, online health consultation, etc. |
| Data characteristics | Discrete but more professional, more clinical information and more privacy, stored in healthcare system, passive | Continuous but less standardization, more health information, privacy tend to be ignored, stored by different providers, active, vast amounts |
Protected health information defined by HIPAA.
| Category | Description |
|---|---|
| 1 | Names |
| 2 | Locations |
| 3 | Dates |
| 4 | Phone number |
| 5 | Fax numbers |
| 6 | E-mail addresses |
| 7 | Social security numbers |
| 8 | Medical record numbers |
| 9 | Health plan beneficiary numbers |
| 10 | Account numbers |
| 11 | Certificate/license numbers |
| 12 | Vehicle identifiers and serial numbers |
| 13 | Device identifiers and serial numbers |
| 14 | Web Universal Resource Locators (URLs) |
| 15 | Internet Protocol (IP) address numbers |
| 16 | Biometric identifiers, including finger and voice prints |
| 17 | Full face photographic images and any comparable images |
| 18 | Any other unique identifying number, characteristics, or code |
Regulations and corresponding data category.
| Regulations | Category 1: clinical data | Category 2: consumer health data |
|---|---|---|
| HIPAA & HITECH (USA) | ✓ | |
| CDR (Australia) | ✓ | |
| PIPEDA (Canada) | ✓ | ✓ |
| GDPR (EU) | ✓ | ✓ |
| MPAPRC & RMRMMMI (China) | ✓ | |
| CCC & PIPILRC (China) | ✓ | ✓ |
Health data access level categories.
| Privacy level of user | Data available | Trustworthiness of user | Technical security |
|---|---|---|---|
| Obfuscated data user | Users have access to data by client-side application only | Low: only obfuscated aggregate results are available | Low: only client-side application exposed to users |
| Aggregated data user | Users have access to HIPAA deidentified data by client-side application only | Low: users can get exact patient counts against deidentified data | Low: but data manager assumes burden of deidentifying data |
| LDS data user | HIPAA-defined LDS and deidentified structured data | Medium: users can see LDS as defined by HIPAA | Medium: requires user-facing direct access to the database |
| Notes-enabled LDS data user | HIPAA deidentified data and deidentified narrative text | Medium: users see both LDS and narrative text that is mostly deidentified | Medium: requires user-facing direct access to the database |
| PHI-viewable data user | All patient data may be accessed | High: users can see all protected health information on patients | High: requires management of encryption keys |
Figure 1Network architecture of privacy protection for health data including genomic data.
Figure 2Architecture for a federated learning system.