Security of healthcare data networks used for epidemiological studies

被引:0
作者
Quantin, C [1 ]
Allaert, FA [1 ]
Bouzelat, H [1 ]
Rodrigues, JM [1 ]
Trombert-Paviot, B [1 ]
Brunet-Lecomte, P [1 ]
Grémy, F [1 ]
Dusserre, L [1 ]
机构
[1] CHU Dijon, Serv Biostat & Informat Med, F-21034 Dijon, France
来源
REVUE D EPIDEMIOLOGIE ET DE SANTE PUBLIQUE | 2000年 / 48卷 / 01期
关键词
security; computerized networks; encryption; linkage; mixture model;
D O I
暂无
中图分类号
R1 [预防医学、卫生学];
学科分类号
1004 ; 120402 ;
摘要
Record linkage, for compiling same-person records from various source files, can improve the feasibility of epidemiological research using population-based studies. The question is comply with the European legislation on data privacy and data security. For example, a computerized record hash coding and linkage procedure is described to link medical information within the framework of epidemiological follow-up, Before their extraction, files are rendered anonymous using a one-way hash coding based on the standard hash algorithm (SHA) function. Once rendered anonymous using using the software ANONYMAT, the linkage of patient information can be accomplished by means of a mixture model, taking into account several identification variables. An application of this anonymous record linkage procedure was carried out in order to link medical files on cancer, from 3 hospitals of the French Rhone-Alpes region, This application stresses how the use of the ANONYMAT software allows compliance with the legislation on data confidentiality without entailing problems oil data availability.
引用
收藏
页码:89 / 99
页数:11
相关论文
共 50 条
  • [31] An Intelligent Quantum Cyber-Security Framework for Healthcare Data Management
    Gupta, Kishu
    Saxena, Deepika
    Rani, Pooja
    Kumar, Jitendra
    Makkar, Aaisha
    Singh, Ashutosh Kumar
    Lee, Chung-Nan
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2025, 22 : 6884 - 6895
  • [32] Security-enhanced data delivery in sensor networks
    Kuo, CF
    Lu, YF
    Pang, AC
    Kuo, TW
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 256 - 259
  • [33] Security evaluation of data exchange path in infrastructure networks
    Fooladi, R.
    Ahmadian, M.
    Hajiannejad, B.
    2007 CONFERENCE PROCEEDINGS IPEC, VOLS 1-3, 2007, : 461 - 464
  • [34] Smart photonic networks and computer security for image data
    Campello, J
    Gill, JT
    Morf, M
    Flynn, MJ
    MULITMEDIA NETWORKS: SECURITY, DISPLAYS, TERMINALS, AND GATEWAYS, 1998, 3228 : 272 - 279
  • [35] Optimizing resource and data security in shared sensor networks
    Huygens, Christophe
    Matthys, Nelson
    Joosen, Wouter
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (02) : 149 - 165
  • [36] An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks
    Yin, Xiao Chun
    Liu, Zeng Guang
    Ndibanje, Bruce
    Nkenyereye, Lewis
    Islam, S. M. Riazul
    SENSORS, 2019, 19 (14)
  • [37] Enhanced Data Security Framework for Storage Area Networks
    Mahalingam, P.
    Jayaprakash, N.
    Karthikeyan, S.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON ENVIRONMENTAL AND COMPUTER SCIENCE, 2009, : 105 - +
  • [38] Security in Data Communication and Privacy in Converstions for Underwater Wireless Networks using Scrambled Speech Scheme
    Peyvandi, H.
    Park, S. J.
    OCEANS 2011, 2011,
  • [39] Secure Healthcare Data Dissemination Using Vehicle Relay Networks
    Singh, Prabhjot
    Bali, Rasmeet Singh
    Kumar, Neeraj
    Das, Ashok Kumar
    Vinel, Alexey
    Yang, Laurence T.
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (05): : 3733 - 3746
  • [40] BlockMedCare: A healthcare system based on IoT, Blockchain and IPFS for data management security
    Azbeg, Kebira
    Ouchetto, Ouail
    Andaloussi, Said Jai
    EGYPTIAN INFORMATICS JOURNAL, 2022, 23 (02) : 329 - 343