Abstract
The advancements in medical and information technology have resulted in a tremendous increase in the amount and complexity of medical data that are being collected. These data are a valuable source for analyses that have strong potential to improve both medical research and practice. However, such analyses have also raised considerable concerns over potential violations of privacy and misuse of medical data. To address such concerns, technological and procedural solutions are necessary. These solutions must be applicable to different types of data, ranging from patient demographics to medical images, and be able to meet diverse application requirements, such as data publishing and health information exchange. This chapter provides an introduction to the field of medical data privacy, offers a taxonomy of the different research directions, and presents an overview of the state-of-the-art privacy-preserving solutions.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: SIGMOD, pp. 563–574 (2004)
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)
Boyd, J.H., Ferrante, A.M., O’Keefe, C.M., Bass, A.J., Randall, S.M., Semmens, J.B.: Data linkage infrastructure for cross-jurisdictional health-related research in Australia. BMC Health Serv. Res. 12(480), 10pp. (2012)
Canada health infoway-inforoute. http://www.infoway-inforoute.ca (2015). Accessed 6 Sept 2015
Care.data. http://www.care-data.info/ (2015). Accessed 6 Sept 2015
Dean, B., Lam, J., Natoli, J., Butler, Q., Aguilar, D., Nordyke, R.: Use of electronic medical records for health outcomes research: A literature review. Med. Care Res. Rev. 66(6), 611–638 (2010)
Dwork, C.: Differential privacy. In: ICALP, pp. 1–12 (2006)
Farr Institute. http://www.farrinstitute.org/ (2015). Accessed 6 Sept 2015
Freedman, D.A.: Statistical Models: Theory and Practice. Cambridge University Press, Cambridge (2009)
Gkoulalas-Divanis, A., Loukides, G., Sun, J.: Publishing data from electronic health records while preserving privacy: a survey of algorithms. J. Biomed. Inform. 50, 4–19 (2014)
HIPAA privacy rule. http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/ (2015). Accessed 6 Sept 2015
Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: ICDE, pp. 106–115 (2007)
Loukides, G., Gkoulalas-Divanis, A., Malin, B.: Anonymization of electronic medical records for validating genome-wide association studies. Proc. Natl. Acad. Sci. 107(17), 7898–7903 (2010)
Loukides, G., Liagouris, J., Gkoulalas-Divanis, A., Terrovitis, M.: Disassociation for electronic health record privacy. J. Biomed. Inform. 50, 46–61 (2014)
Makoul, G., Curry, R.H., Tang, P.C.: The use of electronic medical records communication patterns in outpatient encounters. J. Am. Med. Inform. Assoc. 8(6), 610–615 (2001)
Manolio, T., Collins, F., Cox, N., Goldstein, D., Hindorff, L., Hunter, D.: Finding the missing heritability of complex diseases. Nature 461, 747–753 (2009)
Marinovic, S., Dulay, N., Sloman, M.: Rumpole: an introspective break-glass access control language. ACM Trans. Inf. Syst. Secur. 17(1), 1–32 (2014)
medConfidential: keep my secrets https://medconfidential.org (2015). Accessed 6 Sept 2015
National partnership for women & families, making it meaningful: how consumers value and trust health it survey. http://www.nationalpartnership.org/ (2015). Accessed 6 Sept 2015
Nergiz, M.E., Atzori, M., Clifton, C.: Hiding the presence of individuals from shared databases. In: SIGMOD, pp. 665–676 (2007)
NHS patient care data sharing scheme delayed. http://www.theguardian.com/society/2014/dec/12/nhs-patient-care-data-sharing-scheme-delayed-2015-concerns (2015). Accessed 6 Sept 2015
Picture archiving and communications system HSCIC. http://systems.hscic.gov.uk/pacs (2015). Accessed 6 Sept 2015
Population data bc. https://www.popdata.bc.ca/data (2015). Accessed 6 Sept 2015
Poulis, G., Loukides, G., Gkoulalas-Divanis, A., Skiadopoulos, S.: Anonymizing data with relational and transaction attributes. In: ECML/PKDD, pp. 353–369 (2013)
Samarati, P.: Protecting respondents’ identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)
Sweeney, L.: K-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)
Terrovitis, M., Liagouris, J., Mamoulis, N., Skiadopoulos, S.: Privacy preservation by disassociation. Proc.VLDB 5(10), 944–955 (2012)
UK Data Protection Act. http://www.legislation.gov.uk/ukpga/1998/29/contents (2015). Accessed 6 Sept 2015
U.S. Veterans Health Administrations. http://www.va.gov/health/ (2015). Accessed 6 Sept 2015
Wang, Q., Jin, H.: An analytical solution for consent management in patient privacy preservation. In: IHI, pp. 573–582 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Gkoulalas-Divanis, A., Loukides, G. (2015). Introduction to Medical Data Privacy. In: Gkoulalas-Divanis, A., Loukides, G. (eds) Medical Data Privacy Handbook. Springer, Cham. https://doi.org/10.1007/978-3-319-23633-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-23633-9_1
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23632-2
Online ISBN: 978-3-319-23633-9
eBook Packages: Computer ScienceComputer Science (R0)