New Approach to Privacy-Preserving Clinical Decision Support Systems for HIV Treatment

Background: Clinical decision support systems (CDSS) are a category of health information technologies that can assist clinicians to choose optimal treatments. These support systems are based on clinical trials and expert knowledge; however, the amount of data available to these systems is limited. For this reason, CDSSs could be significantly improved by using the knowledge obtained by treating patients. This knowledge is mainly contained in patient records, whose usage is restricted due to privacy and confidentiality constraints. Methods: A treatment effectiveness measure, containing valuable information for treatment prescription, was defined and a method to extract this measure from patient records was developed. This method uses an advanced cryptographic technology, known as secure Multiparty Computation (henceforth referred to as MPC), to preserve the privacy of the patient records and the confidentiality of the clinicians' decisions. Results: Our solution enables to compute the effectiveness measure of a treatment based on patient records, while preserving privacy. Moreover, clinicians are not burdened with the computational and communication costs introduced by the privacy-preserving techniques that are used. Our system is able to compute the effectiveness of 100 treatments for a specific patient in less than 24 minutes, querying a database containing 20,000 patient records. Conclusion: This paper presents a novel and efficient clinical decision support system, that harnesses the potential and insights acquired from treatment data, while preserving the privacy of patient records and the confidentiality of clinician decisions.

[1]  Kristin E. Lauter,et al.  Private genome analysis through homomorphic encryption , 2015, BMC Medical Informatics and Decision Making.

[2]  P Ping Chen,et al.  Secure multiparty computation for privacy preserving data mining , 2012 .

[3]  Ronald Cramer,et al.  A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations , 2015, IEEE Transactions on Information Forensics and Security.

[4]  Hans Skovgaard Poulsen,et al.  Clinical variables serve as prognostic factors in a model for survival from glioblastoma multiforme: an observational study of a cohort of consecutive non-selected patients from a single institution , 2013, BMC Cancer.

[5]  Peter M. A. Sloot,et al.  A Grid-Based Hiv Expert System , 2005, CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005..

[6]  Yehuda Lindell,et al.  Privacy-Preserving Search of Similar Patients in Genomic Data , 2018, IACR Cryptol. ePrint Arch..

[7]  Ritu Sadana,et al.  The World report on ageing and health: a policy framework for healthy ageing , 2016, The Lancet.

[8]  M A Peter Title HIV decision support : from molecule to man , 2009 .

[9]  Jun Hu,et al.  A secure protocol for protecting the identity of providers when disclosing data for disease surveillance , 2011, J. Am. Medical Informatics Assoc..

[10]  Jihoon Kim,et al.  iDASH: integrating data for analysis, anonymization, and sharing , 2012, J. Am. Medical Informatics Assoc..

[11]  E. Balas,et al.  Improving clinical practice using clinical decision support systems: a systematic review of trials to identify features critical to success , 2005, BMJ : British Medical Journal.

[12]  Koji Chida,et al.  Implementation and evaluation of an efficient secure computation system using 'R' for healthcare statistics. , 2014, Journal of the American Medical Informatics Association : JAMIA.

[13]  Julia Adler-Milstein,et al.  Making IT work - harnessing the power of health information technology ti improve care in England , 2016 .

[14]  Yehuda Lindell,et al.  Introduction to Modern Cryptography, Second Edition , 2014 .

[15]  Ivan Damgård,et al.  Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.

[16]  Adam Wright,et al.  White paper: A Roadmap for National Action on Clinical Decision Support , 2007, J. Am. Medical Informatics Assoc..

[18]  W. A. Beyer,et al.  Some Biological Sequence Metrics , 1976 .

[19]  Marcel Keller,et al.  Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits , 2013, ESORICS.

[20]  S. Asch,et al.  Development of national and multiagency HIV care quality measures. , 2010, Clinical infectious diseases : an official publication of the Infectious Diseases Society of America.

[21]  Silvio Micali,et al.  A Completeness Theorem for Protocols with Honest Majority , 1987, STOC 1987.

[22]  Marian Bubak,et al.  Expanding the Knowledge Economy : Issues , Applications , Case Studies , 2007 .

[23]  Marian Bubak,et al.  ViroLab: A collaborative decision support system in viral disease treatment , 2008 .

[24]  Ivan Damgård,et al.  Confidential Benchmarking Based on Multiparty Computation , 2016, Financial Cryptography.

[25]  Frederik Vercauteren,et al.  Privacy-Preserving Genome-Wide Association Study is Practical , 2017, IACR Cryptol. ePrint Arch..

[26]  Peter M. A. Sloot,et al.  Comparison of HIV-1 Genotypic Resistance Test Interpretation Systems in Predicting Virological Outcomes Over Time , 2010, PloS one.

[27]  H. Mcdonald,et al.  Effects of computerized clinical decision support systems on practitioner performance and patient outcomes: a systematic review. , 2005, JAMA.

[28]  David Chaum,et al.  Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.

[29]  Tommy F. Liu,et al.  The HIVdb System for HIV-1 Genotypic Resistance Interpretation , 2012, Intervirology.

[30]  Yves A. Lussier,et al.  Rethinking the role and impact of health information technology: informatics as an interventional discipline , 2016, BMC Medical Informatics and Decision Making.

[31]  V. Hasselblad,et al.  Effect of Clinical Decision-Support Systems , 2012, Annals of Internal Medicine.

[32]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[33]  Ivan Damgård,et al.  Secure Multiparty Computation and Secret Sharing , 2015 .

[34]  Andrew Chi-Chih Yao,et al.  Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.

[35]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[36]  Ivan Damgård,et al.  Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..

[37]  Marcel Keller,et al.  Overdrive: Making SPDZ Great Again , 2018, IACR Cryptol. ePrint Arch..

[38]  Thomas Lengauer,et al.  Prediction of response to antiretroviral therapy by human experts and by the EuResist data‐driven expert system (the EVE study) , 2010, HIV medicine.

[39]  Avi Wigderson,et al.  Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) , 1988, STOC.

[40]  Ling Li,et al.  Impact of commercial computerized provider order entry (CPOE) and clinical decision support systems (CDSSs) on medication errors, length of stay, and mortality in intensive care units: a systematic review and meta-analysis , 2017, J. Am. Medical Informatics Assoc..

[41]  David E Bloom,et al.  Towards a comprehensive public health response to population ageing , 2015, The Lancet.

[42]  P. Sloot,et al.  Combining Epidemiological and Genetic Networks Signifies the Importance of Early Treatment in HIV-1 Transmission , 2012, PloS one.

[43]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[44]  Stéphane Hué,et al.  Genetic analysis reveals the complex structure of HIV-1 transmission within defined risk groups. , 2005, Proceedings of the National Academy of Sciences of the United States of America.

[45]  Ahmad-Reza Sadeghi,et al.  Secure Evaluation of Private Linear Branching Programs with Medical Applications , 2009, ESORICS.

[46]  R. Shafer Rationale and uses of a public HIV drug-resistance database. , 2006, The Journal of infectious diseases.

[47]  B. J. Betts,et al.  HIV-1 protease and reverse transcriptase mutation patterns responsible for discordances between genotypic drug resistance interpretation algorithms. , 2003, Journal of acquired immune deficiency syndromes.