PRIVACY-PRESERVING STATISTICAL ANALYSIS ON HEALTH DATA

被引:0
作者
Samet, Saeed [1 ]
机构
[1] Mem Univ, Fac Med, eHlth Res Unit, St John, NF, Canada
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCES ON E-HEALTH 2015 E-COMMERCE AND DIGITAL MARKETING 2015 AND INFORMATION SYSTEMS POST-IMPLEMENTATION AND CHANGE MANAGEMENT 2015 | 2015年
基金
加拿大自然科学与工程研究理事会;
关键词
Privacy-Preserving; Secure Multiparty Computation; Health Informatics; Homomorphic Encryption; Health Statistics; PUBLIC-KEY CRYPTOSYSTEMS;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Electronic Health Information (EHI) is a very high demanding resource for every researcher in different health related areas. However, privacy acts prevent direct access to this information without patient's consent. Therefore, different solutions have been proposed such as de-identification, on-site analysis, and limited remote access, to preserve the data owner's privacy. Each of those approaches has different drawbacks and/or limitations. For instance, de-identification will reduce data utility because of low precision of the final released data, and also it has a risk of data re-identification. On-site analysis has some physical limitations and time consuming procedures like background checks. Remote access increases security risks, and when data has to be pulled from multiple data resources, it requires patient consent for data disclosure. In this paper, we have proposed a set of privacy-preserving methods for popular health statistical analysis. Using this set of secure protocols, health researchers, as data users, are able to receive the results of their queries from the data owners, while each data custodian can keep their sensitive data private. Proposed methods have been tested using sample data to illustrate the performance of the results in terms of computational and communication complexities.
引用
收藏
页码:3 / 9
页数:7
相关论文
共 17 条
[1]  
Aggarwal C. C., 2008, PRIVACY PRESERVING D, V513
[2]  
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[3]  
[Anonymous], LECT NOTES COMPUTER
[4]  
Clifton C., 2002, ACM SIGKDD Explor. Newslett., V4, P28, DOI [DOI 10.1145/772862.772867, 10.1145/772862.772867]
[5]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[6]  
Ferrer J.D.I., 1996, QUESTIIO QUADERNS ES, V20, P505
[7]   A new privacy homomorphism and applications [J].
Ferrer, JDI .
INFORMATION PROCESSING LETTERS, 1996, 60 (05) :277-282
[8]  
Goethals B., 2004, 7 INT C INF SEC CRYP
[9]  
Han SG, 2008, LECT NOTES ARTIF INT, V5012, P136
[10]  
Karr A.F., 2009, J PRIVACY CONFIDENTI, V1, P197