Outsourcing Medical Data Analyses: Can Technology Overcome Legal, Privacy, and Confidentiality Issues?

被引:20
作者
Brumen, Bostjan [1 ]
Hericko, Marjan [1 ]
Sevcnikar, Andrej [1 ]
Zavrsnik, Jernej [2 ]
Hoelbl, Marko [1 ]
机构
[1] Univ Maribor, Fac Elect Engn & Comp Sci, Inst Informat, Maribor 2000, Slovenia
[2] Hlth Care Ctr Maribor, Maribor, Slovenia
关键词
confidentiality; patient data privacy; data protection; medical decision making; computer-assisted; data analysis; SECURITY;
D O I
10.2196/jmir.2471
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Background: Medical data are gold mines for deriving the knowledge that could change the course of a single patient's life or even the health of the entire population. A data analyst needs to have full access to relevant data, but full access may be denied by privacy and confidentiality of medical data legal regulations, especially when the data analyst is not affiliated with the data owner. Objective: Our first objective was to analyze the privacy and confidentiality issues and the associated regulations pertaining to medical data, and to identify technologies to properly address these issues. Our second objective was to develop a procedure to protect medical data in such a way that the outsourced analyst would be capable of doing analyses on protected data and the results would be comparable, if not the same, as if they had been done on the original data. Specifically, our hypothesis was there would not be a difference between the outsourced decision trees built on encrypted data and the ones built on original data. Methods: Using formal definitions, we developed an algorithm to protect medical data for outsourced analyses. The algorithm was applied to publicly available datasets (N = 30) from the medical and life sciences fields. The analyses were performed on the original and the protected datasets and the results of the analyses were compared. Bootstrapped paired t tests for 2 dependent samples were used to test whether the mean differences in size, number of leaves, and the accuracy of the original and the encrypted decision trees were significantly different. Results: The decision trees built on encrypted data were virtually the same as those built on original data. Out of 30 datasets, 100% of the trees had identical accuracy. The size of a tree and the number of leaves was different only once (1/30, 3%, P = .19). Conclusions: The proposed algorithm encrypts a file with plain text medical data into an encrypted file with the data protected in such a way that external data analyses are still possible. The results show that the results of analyses on original and on protected data are identical or comparably similar. The approach addresses the privacy and confidentiality issues that arise with medical data and is adherent to strict legal rules in the United States and Europe regarding the processing of the medical data.
引用
收藏
页数:18
相关论文
共 73 条
[31]   The priority of privacy for medical information [J].
DeCew, JW .
SOCIAL PHILOSOPHY & POLICY, 2000, 17 (02) :213-234
[32]  
Department of Health and Human Services, 2003, FED REG
[33]  
Department of Health and Human Services, 2009, FED REGISTER
[34]  
Department of Health and Human Services, 2002, FED REG
[35]  
Dzemyda G, 2011, INFORMATICA-LITHUAN, V22, P1
[36]   How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials? [J].
El Emam, Khaled ;
Moreau, Katherine ;
Jonker, Elizabeth .
JOURNAL OF MEDICAL INTERNET RESEARCH, 2011, 13 (01) :13-22
[37]   PRIVACY AND THE LIMITS OF LAW [J].
GAVISON, R .
YALE LAW JOURNAL, 1980, 89 (03) :421-471
[38]   Computing Arbitrary Functions of Encrypted Data [J].
Gentry, Craig .
COMMUNICATIONS OF THE ACM, 2010, 53 (03) :97-105
[39]   Social media competitive analysis and text mining: A case study in the pizza industry [J].
He, Wu ;
Zha, Shenghua ;
Li, Ling .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2013, 33 (03) :464-472
[40]  
Hirschler B, 2010, REUTERS US EDIT 1201