Patient Identity Management for Secondary Use of Biomedical Research Data in a Distributed Computing Environment

被引:19
作者
Nitzlnader, Michael [1 ]
Schreier, Guenter [1 ]
机构
[1] Austrian Inst Technol, Seibersdorf, Austria
来源
EHEALTH2014 - HEALTH INFORMATICS MEETS EHEALTH: OUTCOMES RESEARCH: THE BENEFIT OF HEALTH-IT | 2014年 / 198卷
关键词
data protection; pseudonymisation; biomedical research; secondary use; cloud computing;
D O I
10.3233/978-1-61499-397-1-211
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Dealing with data from different source domains is of increasing importance in today's large scale biomedical research endeavours. Within the European Network for Cancer research in Children and Adolescents (ENCCA) a solution to share such data for secondary use will be established. In this paper the solution arising from the aims of the ENCCA project and regulatory requirements concerning data protection and privacy is presented. Since the details of secondary biomedical dataset utilisation are often not known in advance, data protection regulations are met with an identity management concept that facilitates context-specific pseudonymisation and a way of data aggregation using a hidden reference table later on. Phonetic hashing is proposed to prevent duplicated patient registration and re-identification of patients is possible via a trusted third party only. Finally, the solution architecture allows for implementation in a distributed computing environment, including cloud-based elements.
引用
收藏
页码:211 / 218
页数:8
相关论文
共 12 条
[1]   Pseudonymization of patient identifiers for translational research [J].
Aamot, Harald ;
Kohl, Christian Dominik ;
Richter, Daniela ;
Knaup-Gregori, Petra .
BMC MEDICAL INFORMATICS AND DECISION MAKING, 2013, 13
[2]  
[Anonymous], GMS MED INFORMATIK
[3]  
[Anonymous], 2013, TR031161 TECHN ARB B, P39
[4]  
Becker R, 2006, GENERISCHES DATENSCH
[5]  
Beutelspacher A., 2010, MODERNE VERFAHREN KR
[6]   Strategies for health data exchange for secondary, cross-institutional clinical research [J].
Elger, Bernice S. ;
Iavindrasana, Jimison ;
Lo Iacono, Luigi ;
Mueller, Henning ;
Roduit, Nicolas ;
Summers, Paul ;
Wright, Jessica .
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2010, 99 (03) :230-251
[7]  
Gall W, 2008, STUD HEALTH TECHNOL, V136, P425
[8]   Utilizing IHE-based Electronic Health Record Systems for Secondary Use [J].
Holzer, K. ;
Gall, W. .
METHODS OF INFORMATION IN MEDICINE, 2011, 50 (04) :319-325
[9]   Privacy Preserving Record Linkage Using Phonetic Codes [J].
Karakasidis, Alexandros ;
Verykios, Vassilios S. .
PROCEEDINGS OF THE 2009 FOURTH BALKAN CONFERENCE IN INFORMATICS, 2009, :101-106
[10]  
National Institute of Standards and Technology, 2008, KEYED HASH MESS AURT, P13