Skip to main content
Erschienen in: Journal of Medical Systems 2/2007

01.04.2007 | Original Paper

Security and Access of Health Research Data

verfasst von: Willy Susilo, Khin Than Win

Erschienen in: Journal of Medical Systems | Ausgabe 2/2007

Einloggen, um Zugang zu erhalten

Abstract

The objective of this study is to discover how to maximise the use of health research data without breaching the patient’s confidentiality. To achieve this, we have examined available options identified in enhancing information security of health research data. It has been noted that there are gaps in information security for health research data. Our novel approach, searching through encrypted data is discussed in this paper.
Literatur
1.
Zurück zum Zitat Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., and Shi, H., Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions, Proceedings of Crypto 2005 (to appear), 2005. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., and Shi, H., Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions, Proceedings of Crypto 2005 (to appear), 2005.
2.
Zurück zum Zitat Australian Medical Council, Legal, ethical and organisational aspects of the practice of medicine. In: Anthology of Medical Conditions, Marshall, V. C. et al. (ed.), Australian Medical Council Incorporated, 2003. Australian Medical Council, Legal, ethical and organisational aspects of the practice of medicine. In: Anthology of Medical Conditions, Marshall, V. C. et al. (ed.), Australian Medical Council Incorporated, 2003.
3.
Zurück zum Zitat Baek, J., Safavi-Naini, R., and Susilo, W., Public Key Encryption with Keyword Search Revisited. http://eprint.iacr.org/2005/191, 2005. Baek, J., Safavi-Naini, R., and Susilo, W., Public Key Encryption with Keyword Search Revisited. http://​eprint.​iacr.​org/​2005/​191, 2005.
4.
Zurück zum Zitat Baek, J., Safavi-Naini, R., and Susilo, W., On the integration of public key data encryption and public key encryption with keyword search. The 9th Information Security Conference, ISC 2006, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 2006. Baek, J., Safavi-Naini, R., and Susilo, W., On the integration of public key data encryption and public key encryption with keyword search. The 9th Information Security Conference, ISC 2006, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 2006.
5.
Zurück zum Zitat Behlen, F. M., and Johnson, S. B., Multicenter patient records research: Security policies and tools. J. Am. Med. Inform. Assoc. 6(6):435-443, 1999. Behlen, F. M., and Johnson, S. B., Multicenter patient records research: Security policies and tools. J. Am. Med. Inform. Assoc. 6(6):435-443, 1999.
6.
Zurück zum Zitat Boneh, D., Crescenzo, G. D., Ostrovsky, R., and Persiano, G., Searchable Public Key Encryption. http://eprint.iacr.org/2003/195, 2003. Boneh, D., Crescenzo, G. D., Ostrovsky, R., and Persiano, G., Searchable Public Key Encryption. http://​eprint.​iacr.​org/​2003/​195, 2003.
7.
Zurück zum Zitat Boneh, D., and Fraklin, M., Identity-based encryption from the Weil pairing. Proceedings of Crypto 2001, Springer-Verlag, pp. 213–229, 2001. Boneh, D., and Fraklin, M., Identity-based encryption from the Weil pairing. Proceedings of Crypto 2001, Springer-Verlag, pp. 213–229, 2001.
8.
Zurück zum Zitat Carney, P.A., Geller, B. M., Moffett, H., Ganger, M., Sewell, M., Barlow, W. E., Stalnaker, N., Taplin, S. H., Sisk, C., Ernster, V., Wilkie, H. A., Yankaskas, B., Poplack, S.P., Urban, N., West, M. M., Rosenberg, R. D., Michael, S., Mercurio, T. D., and Ballard-Barbash, R., Current medicolegal and confidentiality issues in large, multicenter research programs. Am. J. Epidemiol. 152(4):371–378, 2000. Carney, P.A., Geller, B. M., Moffett, H., Ganger, M., Sewell, M., Barlow, W. E., Stalnaker, N., Taplin, S. H., Sisk, C., Ernster, V., Wilkie, H. A., Yankaskas, B., Poplack, S.P., Urban, N., West, M. M., Rosenberg, R. D., Michael, S., Mercurio, T. D., and Ballard-Barbash, R., Current medicolegal and confidentiality issues in large, multicenter research programs. Am. J. Epidemiol. 152(4):371–378, 2000.
9.
Zurück zum Zitat Dreiseitl, S., Vinterbo, S., and Ohno-Machado, L., Disambiguation data: Extracting information from anonymized sources. J. Am. Med. Inform. Assoc. 9(6):110–114, 2002.CrossRef Dreiseitl, S., Vinterbo, S., and Ohno-Machado, L., Disambiguation data: Extracting information from anonymized sources. J. Am. Med. Inform. Assoc. 9(6):110–114, 2002.CrossRef
10.
Zurück zum Zitat Dudeck, J., Informed consent for cancer registration. Lancet Oncol. 2:8-9, 2001.CrossRef Dudeck, J., Informed consent for cancer registration. Lancet Oncol. 2:8-9, 2001.CrossRef
11.
Zurück zum Zitat Evans, B., and Ramay, C. N., Integrity of communicable disease surveillance is important patient care. Brit. Med. J. 322:858, 2001.CrossRef Evans, B., and Ramay, C. N., Integrity of communicable disease surveillance is important patient care. Brit. Med. J. 322:858, 2001.CrossRef
12.
Zurück zum Zitat Gritzalis, D., and Lambrinoudakis, C., A security architecture for interconnecting health information systems. Int. J. Med. Inform. 73:305-309, 2004. Gritzalis, D., and Lambrinoudakis, C., A security architecture for interconnecting health information systems. Int. J. Med. Inform. 73:305-309, 2004.
13.
Zurück zum Zitat Health Records and Information Privacy Act 2002, New South Wales. Health Records and Information Privacy Act 2002, New South Wales.
14.
Zurück zum Zitat Ingelfinger, J. R., and Drazen, J. M., Registry research and medical privacy. New Engl. J. Med. 350(14):1452, 2004.CrossRef Ingelfinger, J. R., and Drazen, J. M., Registry research and medical privacy. New Engl. J. Med. 350(14):1452, 2004.CrossRef
15.
Zurück zum Zitat Lowrance, W., Learning from experience: privacy and the secondary use of data in health research. J. Health Serv. Res. Policy 8(supp 1):S1:2–7, 2003. Lowrance, W., Learning from experience: privacy and the secondary use of data in health research. J. Health Serv. Res. Policy 8(supp 1):S1:2–7, 2003.
16.
Zurück zum Zitat Muralidhar, K., and Sarathy, R., Can you have your cake and eat it too? Sharing healthcare data without compromising privacy and confidentiality. In: Proceedings of the 11th Americas Conference on Information Systems. Omaha, NE, 2005. Muralidhar, K., and Sarathy, R., Can you have your cake and eat it too? Sharing healthcare data without compromising privacy and confidentiality. In: Proceedings of the 11th Americas Conference on Information Systems. Omaha, NE, 2005.
17.
Zurück zum Zitat Ohno-Machado, L., Silveira, P. S. P., and Vinterbo, S., Protecting patient privacy by quantifiable control of disclosures in disseminated databases. Int. J Med. Inform. 73:599–606, 2004.CrossRef Ohno-Machado, L., Silveira, P. S. P., and Vinterbo, S., Protecting patient privacy by quantifiable control of disclosures in disseminated databases. Int. J Med. Inform. 73:599–606, 2004.CrossRef
18.
Zurück zum Zitat Quantin, C., Allaert, F.-A., and Dusserre, L., Anonymous statistical methods versus cryptographic methods in epidemiology. Int. J. Med. Inform. 60:177–183, 2000.CrossRef Quantin, C., Allaert, F.-A., and Dusserre, L., Anonymous statistical methods versus cryptographic methods in epidemiology. Int. J. Med. Inform. 60:177–183, 2000.CrossRef
19.
Zurück zum Zitat Roberts, L., and Wilson, S., Argument for consent may invalidate research and stigmatize some patients. Brit. Med. J. 322:858(1 page), 2001. Roberts, L., and Wilson, S., Argument for consent may invalidate research and stigmatize some patients. Brit. Med. J. 322:858(1 page), 2001.
20.
Zurück zum Zitat Song, D. X., Wagner, D., and Perrig, A., Practical techniques for searches on encrypted data. IEEE Symposium on Security and Privacy, pp. 44–55, 2000. Song, D. X., Wagner, D., and Perrig, A., Practical techniques for searches on encrypted data. IEEE Symposium on Security and Privacy, pp. 44–55, 2000.
21.
Zurück zum Zitat Willison, D. J., Keshavjee, K., Nair, K., Goldsmith, C., and Holbrook, A. M., Patients’ consent preferences for research uses of information in electronic medical records: Interview and survey data. BMJ 326:373-376, 2003.CrossRef Willison, D. J., Keshavjee, K., Nair, K., Goldsmith, C., and Holbrook, A. M., Patients’ consent preferences for research uses of information in electronic medical records: Interview and survey data. BMJ 326:373-376, 2003.CrossRef
22.
Zurück zum Zitat Win, K. T., Information security of electronic health record systems. Health Inform. Manage. J. 34(1), 13–18, 2005. Win, K. T., Information security of electronic health record systems. Health Inform. Manage. J. 34(1), 13–18, 2005.
Metadaten
Titel
Security and Access of Health Research Data
verfasst von
Willy Susilo
Khin Than Win
Publikationsdatum
01.04.2007
Erschienen in
Journal of Medical Systems / Ausgabe 2/2007
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-006-9035-y

Weitere Artikel der Ausgabe 2/2007

Journal of Medical Systems 2/2007 Zur Ausgabe