Skip to main content

Introduction to Medical Data Privacy

  • Chapter

Abstract

The advancements in medical and information technology have resulted in a tremendous increase in the amount and complexity of medical data that are being collected. These data are a valuable source for analyses that have strong potential to improve both medical research and practice. However, such analyses have also raised considerable concerns over potential violations of privacy and misuse of medical data. To address such concerns, technological and procedural solutions are necessary. These solutions must be applicable to different types of data, ranging from patient demographics to medical images, and be able to meet diverse application requirements, such as data publishing and health information exchange. This chapter provides an introduction to the field of medical data privacy, offers a taxonomy of the different research directions, and presents an overview of the state-of-the-art privacy-preserving solutions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: SIGMOD, pp. 563–574 (2004)

    Google Scholar 

  2. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)

    Article  MATH  Google Scholar 

  3. Boyd, J.H., Ferrante, A.M., O’Keefe, C.M., Bass, A.J., Randall, S.M., Semmens, J.B.: Data linkage infrastructure for cross-jurisdictional health-related research in Australia. BMC Health Serv. Res. 12(480), 10pp. (2012)

    Google Scholar 

  4. Canada health infoway-inforoute. http://www.infoway-inforoute.ca (2015). Accessed 6 Sept 2015

  5. Care.data. http://www.care-data.info/ (2015). Accessed 6 Sept 2015

  6. Dean, B., Lam, J., Natoli, J., Butler, Q., Aguilar, D., Nordyke, R.: Use of electronic medical records for health outcomes research: A literature review. Med. Care Res. Rev. 66(6), 611–638 (2010)

    Article  Google Scholar 

  7. Dwork, C.: Differential privacy. In: ICALP, pp. 1–12 (2006)

    Google Scholar 

  8. Farr Institute. http://www.farrinstitute.org/ (2015). Accessed 6 Sept 2015

  9. Freedman, D.A.: Statistical Models: Theory and Practice. Cambridge University Press, Cambridge (2009)

    Book  Google Scholar 

  10. Gkoulalas-Divanis, A., Loukides, G., Sun, J.: Publishing data from electronic health records while preserving privacy: a survey of algorithms. J. Biomed. Inform. 50, 4–19 (2014)

    Article  Google Scholar 

  11. HIPAA privacy rule. http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/ (2015). Accessed 6 Sept 2015

  12. Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: ICDE, pp. 106–115 (2007)

    Google Scholar 

  13. Loukides, G., Gkoulalas-Divanis, A., Malin, B.: Anonymization of electronic medical records for validating genome-wide association studies. Proc. Natl. Acad. Sci. 107(17), 7898–7903 (2010)

    Article  Google Scholar 

  14. Loukides, G., Liagouris, J., Gkoulalas-Divanis, A., Terrovitis, M.: Disassociation for electronic health record privacy. J. Biomed. Inform. 50, 46–61 (2014)

    Article  Google Scholar 

  15. Makoul, G., Curry, R.H., Tang, P.C.: The use of electronic medical records communication patterns in outpatient encounters. J. Am. Med. Inform. Assoc. 8(6), 610–615 (2001)

    Article  Google Scholar 

  16. Manolio, T., Collins, F., Cox, N., Goldstein, D., Hindorff, L., Hunter, D.: Finding the missing heritability of complex diseases. Nature 461, 747–753 (2009)

    Article  Google Scholar 

  17. Marinovic, S., Dulay, N., Sloman, M.: Rumpole: an introspective break-glass access control language. ACM Trans. Inf. Syst. Secur. 17(1), 1–32 (2014)

    Article  Google Scholar 

  18. medConfidential: keep my secrets https://medconfidential.org (2015). Accessed 6 Sept 2015

  19. National partnership for women & families, making it meaningful: how consumers value and trust health it survey. http://www.nationalpartnership.org/ (2015). Accessed 6 Sept 2015

  20. Nergiz, M.E., Atzori, M., Clifton, C.: Hiding the presence of individuals from shared databases. In: SIGMOD, pp. 665–676 (2007)

    Google Scholar 

  21. NHS patient care data sharing scheme delayed. http://www.theguardian.com/society/2014/dec/12/nhs-patient-care-data-sharing-scheme-delayed-2015-concerns (2015). Accessed 6 Sept 2015

  22. Picture archiving and communications system HSCIC. http://systems.hscic.gov.uk/pacs (2015). Accessed 6 Sept 2015

  23. Population data bc. https://www.popdata.bc.ca/data (2015). Accessed 6 Sept 2015

  24. Poulis, G., Loukides, G., Gkoulalas-Divanis, A., Skiadopoulos, S.: Anonymizing data with relational and transaction attributes. In: ECML/PKDD, pp. 353–369 (2013)

    Google Scholar 

  25. Samarati, P.: Protecting respondents’ identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)

    Article  Google Scholar 

  26. Sweeney, L.: K-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  27. Terrovitis, M., Liagouris, J., Mamoulis, N., Skiadopoulos, S.: Privacy preservation by disassociation. Proc.VLDB 5(10), 944–955 (2012)

    Google Scholar 

  28. UK Data Protection Act. http://www.legislation.gov.uk/ukpga/1998/29/contents (2015). Accessed 6 Sept 2015

  29. U.S. Veterans Health Administrations. http://www.va.gov/health/ (2015). Accessed 6 Sept 2015

  30. Wang, Q., Jin, H.: An analytical solution for consent management in patient privacy preservation. In: IHI, pp. 573–582 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aris Gkoulalas-Divanis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Gkoulalas-Divanis, A., Loukides, G. (2015). Introduction to Medical Data Privacy. In: Gkoulalas-Divanis, A., Loukides, G. (eds) Medical Data Privacy Handbook. Springer, Cham. https://doi.org/10.1007/978-3-319-23633-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23633-9_1

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23632-2

  • Online ISBN: 978-3-319-23633-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics