Constraint graphs as security filters for privacy assurance in medical transactions

We model transactions as exchange of graphs and propose constraint graphs as transaction filters for attribute-based transformations in clinical settings. An informal representation and working of constraint graphs is presented. A workbench was developed using a real world EMR system to demonstrate the concept. Results of our experiments using constraint graphs are consistent with published benchmark results.

[1]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[2]  Charu C. Aggarwal,et al.  Managing and Mining Graph Data , 2010, Managing and Mining Graph Data.

[3]  Zoran Obradovic,et al.  A privacy-preserving framework for distributed clinical decision support , 2011, 2011 IEEE 1st International Conference on Computational Advances in Bio and Medical Sciences (ICCABS).

[4]  Frank McSherry,et al.  Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.

[5]  Ambuj K. Singh,et al.  Graphs-at-a-time: query language and access methods for graph databases , 2008, SIGMOD Conference.