Security of healthcare data networks used for epidemiological studies

被引:0
|
作者
Quantin, C [1 ]
Allaert, FA [1 ]
Bouzelat, H [1 ]
Rodrigues, JM [1 ]
Trombert-Paviot, B [1 ]
Brunet-Lecomte, P [1 ]
Grémy, F [1 ]
Dusserre, L [1 ]
机构
[1] CHU Dijon, Serv Biostat & Informat Med, F-21034 Dijon, France
来源
REVUE D EPIDEMIOLOGIE ET DE SANTE PUBLIQUE | 2000年 / 48卷 / 01期
关键词
security; computerized networks; encryption; linkage; mixture model;
D O I
暂无
中图分类号
R1 [预防医学、卫生学];
学科分类号
1004 ; 120402 ;
摘要
Record linkage, for compiling same-person records from various source files, can improve the feasibility of epidemiological research using population-based studies. The question is comply with the European legislation on data privacy and data security. For example, a computerized record hash coding and linkage procedure is described to link medical information within the framework of epidemiological follow-up, Before their extraction, files are rendered anonymous using a one-way hash coding based on the standard hash algorithm (SHA) function. Once rendered anonymous using using the software ANONYMAT, the linkage of patient information can be accomplished by means of a mixture model, taking into account several identification variables. An application of this anonymous record linkage procedure was carried out in order to link medical files on cancer, from 3 hospitals of the French Rhone-Alpes region, This application stresses how the use of the ANONYMAT software allows compliance with the legislation on data confidentiality without entailing problems oil data availability.
引用
收藏
页码:89 / 99
页数:11
相关论文
共 50 条
  • [1] Harnessing Healthcare Data Security in Cloud
    Aiswarya, R.
    Divya, R.
    Sangeetha, D.
    Vaidehi, V.
    2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 482 - 488
  • [2] Understanding Data Flow and Security Requirements in Wireless Body Area Networks for Healthcare
    Salehi, Ahmad S.
    Camtepe, Seyit
    Jayalath, Dhammika
    2015 17TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATION & SERVICES (HEALTHCOM), 2015, : 621 - 626
  • [3] Cryptographic Data Security for IoT Healthcare in 5G and Beyond Networks
    Ahmed, Sabrina
    Subah, Zareen
    Ali, Mohammed Zamshed
    2022 IEEE SENSORS, 2022,
  • [4] Data Security Issues Arising from Integration of Wireless Access Into Healthcare Networks
    John C. Frenzel
    Journal of Medical Systems, 2003, 27 (2) : 163 - 175
  • [5] A Survey on Healthcare Data: A Security Perspective
    Singh, A. K.
    Anand, A.
    Lv, Z.
    Ko, H.
    Mohan, A.
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 17 (02)
  • [6] Security and interconnection of medical devices to healthcare networks
    Seymour, DM
    McCall, KR
    DiPaola, L
    CARS 2004: COMPUTER ASSISTED RADIOLOGY AND SURGERY, PROCEEDINGS, 2004, 1268 : 131 - 134
  • [7] Security Evaluation of Cryptosystems used in Cloud Networks
    Sadkhan, Sattar B.
    Abdulraheem, Farqad H.
    2016 AL-SADIQ INTERNATIONAL CONFERENCE ON MULTIDISCIPLINARY IN IT AND COMMUNICATION TECHNIQUES SCIENCE AND APPLICATIONS (AIC-MITCSA), 2016,
  • [8] Big healthcare data: preserving security and privacy
    Abouelmehdi, Karim
    Beni-Hessane, Abderrahim
    Khaloufi, Hayat
    JOURNAL OF BIG DATA, 2018, 5 (01)
  • [9] A Survey of Big Data Security Solutions in Healthcare
    Siddique, Musfira
    Mirza, Muhammad Ayzed
    Ahmad, Mudassar
    Chaudhry, Junaid
    Islam, Rafiqul
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT II, 2018, 255 : 391 - 406
  • [10] IoT Sensor Initiated Healthcare Data Security
    Besher, Kedir Mamo
    Subah, Zareen
    Ali, Mohammed Zamshed
    IEEE SENSORS JOURNAL, 2021, 21 (10) : 11977 - 11982