Introduction to Medical Data Privacy

The advancements in medical and information technology have resulted in a tremendous increase in the amount and complexity of medical data that are being collected. These data are a valuable source for analyses that have strong potential to improve both medical research and practice. However, such analyses have also raised considerable concerns over potential violations of privacy and misuse of medical data. To address such concerns, technological and procedural solutions are necessary. These solutions must be applicable to different types of data, ranging from patient demographics to medical images, and be able to meet diverse application requirements, such as data publishing and health information exchange. This chapter provides an introduction to the field of medical data privacy, offers a taxonomy of the different research directions, and presents an overview of the state-of-the-art privacy-preserving solutions.

[1]  Judy H. Cho,et al.  Finding the missing heritability of complex diseases , 2009, Nature.

[2]  Srdjan Marinovic,et al.  Rumpole: An Introspective Break-Glass Access Control Language , 2014, TSEC.

[3]  Fabio Massacci,et al.  Comparing Vulnerability Severity and Exploits Using Case-Control Studies , 2014, TSEC.

[4]  Gregory Makoul,et al.  Research Paper: The Use of Electronic Medical Records: Communication Patterns in Outpatient Encounters , 2001, J. Am. Medical Informatics Assoc..

[5]  B. Dean,et al.  Review: Use of Electronic Medical Records for Health Outcomes Research , 2009, Medical care research and review : MCRR.

[6]  John Liagouris,et al.  Disassociation for electronic health record privacy , 2014, J. Biomed. Informatics.

[7]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[8]  Nikos Mamoulis,et al.  Privacy Preservation by Disassociation , 2012, Proc. VLDB Endow..

[9]  D. J. Allerton,et al.  Book Review: GPS theory and practice. Second Edition, HOFFMANNWELLENHOFF B., LICHTENEGGER H. and COLLINS J., 1993, 326 pp., Springer, £31.00 pb, ISBN 3-211-82477-4 , 1995 .

[10]  Chris Clifton,et al.  Hiding the presence of individuals from shared databases , 2007, SIGMOD '07.

[11]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[12]  Jimeng Sun,et al.  Publishing data from electronic health records while preserving privacy: A survey of algorithms , 2014, J. Biomed. Informatics.

[13]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[14]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[15]  Spiros Skiadopoulos,et al.  Anonymizing Data with Relational and Transaction Attributes , 2013, ECML/PKDD.

[16]  Sean M. Randall,et al.  Data linkage infrastructure for cross-jurisdictional health-related research in Australia , 2012, BMC Health Services Research.

[17]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[18]  Gregory Makoul,et al.  The Use of Electronic Medical Records , 2001 .

[19]  B. Malin,et al.  Anonymization of electronic medical records for validating genome-wide association studies , 2010, Proceedings of the National Academy of Sciences.

[20]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[21]  Hongxia Jin,et al.  An analytical solution for consent management in patient privacy preservation , 2012, IHI '12.