Secure Health Statistical Analysis Methods
نویسنده
چکیده
Health informatics, using new information technology, provides a fruitful set of data resource and knowledge that is very useful for secondary data users and researchers in various health systems and applications. Privacy acts, on the other hand, prevent direct access to this information without patient's consent. Various solutions have been proposed such as data anonymization and de-identification, on-site analysis, and limited remote access, to preserve the data owner's privacy. Each of those approaches has different drawbacks and limitations. For instance, data de-identification will reduce data utility because of low precision of the final released data, and also it has a risk of data re-identification using available public data and background knowledge. On-site analysis has physical limitations, such as lack of data centers in every geographic area, and time-consuming procedures, such as background checks. Remote access increases security risks, and when data has to be pulled from multiple data resources, it requires patient consent for data disclosure. In this paper, we propose a set of privacy-preserving methods and techniques for some popular health statistical analysis methods. Using this set of secure protocols health researchers and other data users are able to issue their requests as some queries, and receive only the results of their queries from the data owners, while each data custodian can keep their sensitive data private. Proposed methods have been tested using sample data to illustrate the performance of the results in terms of computational and communication complexities. Security proof of the proposed protocols has also been provided as a proof of concept.
منابع مشابه
Psychometric Characteristics of the Persian (Farsi) Version of Attachment Style Questionnaire
Abstract Background: Attachment relationship provides a secure base for the infants from which to explore the environment and a safe haven to return to in times of danger. Attachment style shapes the behavior of individuals in adulthood. There are many different measures of attachment and a lot of controversy about what they measure and how they relate to each other. Hence, we tried to evaluate...
متن کاملSocial Adjustment and Academic Achievement of Female Children with Secure and Insecure Attachment Patterns
Social Adjustment and Academic Achievement of Female Children with Secure and Insecure Attachment Patterns E. Ghorbanian, M.A. T. PourEbrahim, Ph.D. P.S. Seyed Mousavi, Ph.D. M. Habibi, Ph.D. This study was undertaken to compare social adjustment and academic achievement of female children with secure and insecure attachment patterns. The research type was descript...
متن کاملSecure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation
BACKGROUND Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results. However, duplicate records in a distributed dataset may lead to incorrect statistical results. Therefore, to increase the accuracy of the statistical analysis of a distributed dataset, secure deduplication is an important preprocessing ste...
متن کاملPrivacy-Preserving Statistical Analysis on Ubiquitous Health Data
In this work, we consider ubiquitous health data generated from wearable sensors in a Ubiquitous Health Monitoring System (UHMS) and examine how these data can be used within privacypreserving distributed statistical analysis. To this end, we propose a secure multi-party computation based on a privacy-preserving cryptographic protocol that accepts as input current or archived values of users’ w...
متن کاملPrivacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification
Multivariate statistical analysis is an important data analysis technique that has found applications in various areas. In this paper, we study some multivariate statistical analysis methods in Secure 2-party Computation (S2C) framework illustrated by the following scenario: two parties, each having a secret data set, want to conduct the statistical analysis on their joint data, but neither par...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016