Security of healthcare data networks used for epidemiological studies

被引:0
作者
Quantin, C [1 ]
Allaert, FA [1 ]
Bouzelat, H [1 ]
Rodrigues, JM [1 ]
Trombert-Paviot, B [1 ]
Brunet-Lecomte, P [1 ]
Grémy, F [1 ]
Dusserre, L [1 ]
机构
[1] CHU Dijon, Serv Biostat & Informat Med, F-21034 Dijon, France
来源
REVUE D EPIDEMIOLOGIE ET DE SANTE PUBLIQUE | 2000年 / 48卷 / 01期
关键词
security; computerized networks; encryption; linkage; mixture model;
D O I
暂无
中图分类号
R1 [预防医学、卫生学];
学科分类号
1004 ; 120402 ;
摘要
Record linkage, for compiling same-person records from various source files, can improve the feasibility of epidemiological research using population-based studies. The question is comply with the European legislation on data privacy and data security. For example, a computerized record hash coding and linkage procedure is described to link medical information within the framework of epidemiological follow-up, Before their extraction, files are rendered anonymous using a one-way hash coding based on the standard hash algorithm (SHA) function. Once rendered anonymous using using the software ANONYMAT, the linkage of patient information can be accomplished by means of a mixture model, taking into account several identification variables. An application of this anonymous record linkage procedure was carried out in order to link medical files on cancer, from 3 hospitals of the French Rhone-Alpes region, This application stresses how the use of the ANONYMAT software allows compliance with the legislation on data confidentiality without entailing problems oil data availability.
引用
收藏
页码:89 / 99
页数:11
相关论文
共 50 条
  • [21] Achieving data security and privacy across healthcare applications using cyber security mechanisms
    Zhu, Shanying
    Saravanan, Vijayalakshmi
    Muthu, BalaAnand
    ELECTRONIC LIBRARY, 2020, 38 (5-6) : 979 - 995
  • [22] Enhanced Data Security Architecture in Enterprise Networks
    Shree, V. Rashmi
    Antony, Zachariah C. F.
    Jayapandian, N.
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 857 - 864
  • [23] Healthcare Data Encryption Technique Using Hybrid Cellular Automata in IoT Networks
    Ritesh Kumar
    Pritam Khan
    Sudhir Kumar
    Wireless Personal Communications, 2022, 126 : 3021 - 3039
  • [24] Healthcare Data Encryption Technique Using Hybrid Cellular Automata in IoT Networks
    Kumar, Ritesh
    Khan, Pritam
    Kumar, Sudhir
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (04) : 3021 - 3039
  • [25] Enhanced security services for enabling pan-European healthcare networks
    Blobel, B
    Pharow, P
    Engel, K
    MEDINFO 2001: PROCEEDINGS OF THE 10TH WORLD CONGRESS ON MEDICAL INFORMATICS, PTS 1 AND 2, 2001, 84 : 1234 - 1238
  • [26] A Security Framework for Privacy-Preserving Data Aggregation in Wireless Sensor Networks
    Chan, Aldar C-F.
    Castelluccia, Claude
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2011, 7 (04)
  • [27] Access control models most used in medical data security
    Campos-Montero, Brian
    Rodriguez-Sandoval, Cesar
    de los Santos, Alberto Mendoza
    TECNOLOGIA EN MARCHA, 2024, 37 (01):
  • [28] Healthcare data analysis by feature extraction and classification using deep learning with cloud based cyber security
    Qamar, Shamimul
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [29] Healthcare SaaS Based on a Data Model with Built-In Security and Privacy
    Asija, Ruchika
    Nallusamy, Rajarathnam
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2016, 6 (03) : 1 - 14
  • [30] Managing security and privacy concerns over data storage in healthcare research
    Mackenzie, Isla S. u
    Mantay, Brian J.
    McDonnell, Patrick G.
    Wei, Li
    MacDonald, Thomas M.
    PHARMACOEPIDEMIOLOGY AND DRUG SAFETY, 2011, 20 (08) : 885 - 893