Skip to main content

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

  • 735 Accesses

Abstract

This chapter provides an introduction to the problem of anonymizing patient data derived from Electronic Medical Record (EMR) systems. We first illustrate the need for sharing such data, in a privacy-preserving way, to support a growing number of medical applications. Subsequently, we consider patient re-identification, a threat that has led to violations of patients’ privacy. We discuss the challenges that forestalling patient re-identification entails, as well as how these challenges are addressed by current research. Last, we provide a summary of the topics that will be examined in the remainder of the book.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    National Ambulatory Medical Care Survey (NAMCS). http://www.cdc.gov/nchs/ahcd.htm.

  2. 2.

    National Partnership for Women & Families, Making IT Meaningful: How Consumers Value and Trust Health IT Survey. http://www.nationalpartnership.org/

References

  1. EU Data Protection Directive 95/46/ECK (1995)

    Google Scholar 

  2. UK Data Protection Act (1998)

    Google Scholar 

  3. Personal Information Protection and Electronic Documents Act (2000)

    Google Scholar 

  4. Adam, N., Worthmann, J.: Security-control methods for statistical databases: a comparative study. ACM Comput. Surv. 21(4), 515–556 (1989)

    Article  Google Scholar 

  5. Benitez, K., Loukides, G., Malin, B.: Beyond safe harbor: automatic discovery of health information de-identification policy alternatives. In: ACM International Health Informatics Symposium, pp. 163–172 (2010)

    Google Scholar 

  6. Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: the sulq framework. In: PODS, pp. 128–138 (2005)

    Google Scholar 

  7. Dalenius, T., Reiss, S.: Data swapping: A technique for disclosure control. Journal of Statistical Planning and Inference 6, 731–785 (1982)

    Article  MathSciNet  Google Scholar 

  8. Dean, B., Lam, J., Natoli, J., Butler, Q., Aguilar, D., Nordyke, R.: Use of electronic medical records for health outcomes research: A literature review. Medical Care Reseach and Review 66(6), 611-638 (2010)

    Article  Google Scholar 

  9. Diesburg, S.M., Wang, A.: A survey of confidential data storage and deletion methods. ACM Computing Surveys 43(1), 1–37 (2010)

    Article  Google Scholar 

  10. Dwork, C.: Differential privacy. In: ICALP, pp. 1–12 (2006)

    Google Scholar 

  11. Emam, K.E.: Methods for the de-identification of electronic health records for genomic research. Genome Medicine 3(4), 25 (2011)

    Article  Google Scholar 

  12. Emam, K.E., Dankar, F.K.: Protecting privacy using k-anonymity. Journal of the American Medical Informatics Association 15(5), 627–637 (2008)

    Article  Google Scholar 

  13. Emam, K.E., Dankar, F.K., et al.: A globally optimal k-anonymity method for the de-identification of health data. Journal of the American Medical Informatics Association 16(5), 670–682 (2009)

    Article  Google Scholar 

  14. Emam, K.E., Paton, D., Dankar, F., Koru, G.: De-identifying a public use microdata file from the canadian national discharge abstract database. BMC Medical Informatics and Decision Making 11, 53 (2011)

    Article  Google Scholar 

  15. Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey on recent developments. ACM Comput. Surv. 42 (2010)

    Google Scholar 

  16. Gkoulalas-Divanis, A., Loukides, G.: PCTA: Privacy-constrained Clustering-based Transaction Data Anonymization. In: EDBT PAIS, p. 5 (2011)

    Google Scholar 

  17. Guttmacher, A.E., Collins, F.S.: Realizing the promise of genomics in biomedical research. Journal of the American Medical Association 294(11), 1399–1402 (2005)

    Article  Google Scholar 

  18. Kullo, I., Fan, J., Pathak, J., Savova, G., Ali, Z., Chute, C.: Leveraging informatics for genetic studies: use of the electronic medical record to enable a genome-wide association study of peripheral arterial disease. Journal of the American Medical Informatics Association 17(5), 568–574 (2010)

    Article  Google Scholar 

  19. Lau, E., Mowat, F., Kelsh, M., Legg, J., Engel-Nitz, N., Watson, H., Collins, H., Nordyke, R., Whyte, J.: Use of electronic medical records (EMR) for oncology outcomes research: assessing the comparability of EMR information to patient registry and health claims data. Clinical Epidemiology 3(1), 259–272 (2011)

    Google Scholar 

  20. LeFevre, K., DeWitt, D., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: ICDE, p. 25 (2006)

    Google Scholar 

  21. Lemke, A., Wolf, W., Hebert-Beirne, J., Smith, M.: Public and biobank participant attitudes toward genetic research participation and data sharing. Public Health Genomics 13(6), 368–377 (2010)

    Google Scholar 

  22. Loukides, G., Denny, J., Malin, B.: The disclosure of diagnosis codes can breach research participants’ privacy. Journal of the American Medical Informatics Association 17, 322–327 (2010)

    Google Scholar 

  23. Loukides, G., Gkoulalas-Divanis, A., Malin, B.: Anonymization of electronic medical records for validating genome-wide association studies. Proceedings of the National Academy of Sciences 17(107), 7898–7903 (2010)

    Article  Google Scholar 

  24. Loukides, G., Shao, J.: Capturing data usefulness and privacy protection in k-anonymisation. In: SAC, pp. 370–374 (2007)

    Google Scholar 

  25. Loukides, G., Shao, J.: Preventing range disclosure in k-anonymised data. Expert Systems with Applications 38(4), 4559–4574 (2011)

    Article  Google Scholar 

  26. Mailman, M., Feolo, M., Jin, Y., Kimura, M., Tryka, K., Bagoutdinov, R., et al.: The ncbi dbgap database of genotypes and phenotypes. Nature Genetics 39, 1181–1186 (2007)

    Article  Google Scholar 

  27. Makoul, G., Curry, R.H., Tang, P.C.: The use of electronic medical records communication patterns in outpatient encounters. Journal of the American Medical Informatics Association 8(6), 610–615 (2001)

    Article  Google Scholar 

  28. McCarty, C.A., et al.: The emerge network: A consortium of biorepositories linked to electronic medical records data for conducting genomic studies. BMC Medical Genomics 4, 13 (2011)

    Article  Google Scholar 

  29. National Institutes of Health: Policy for sharing of data obtained in NIH supported or conducted genome-wide association studies. NOT-OD-07-088. 2007.

    Google Scholar 

  30. Nin, J., Herranz, J., Torra, V.: Rethinking rank swapping to decrease disclosure risk. DKE 64(1), 346–364 (2008)

    Article  Google Scholar 

  31. Ollier, W., Sprosen, T., Peakman, T.: UK biobank: from concept to reality. Pharmacogenomics 6(6), 639–646 (2005)

    Article  Google Scholar 

  32. Pinkas, B.: Cryptographic techniques for privacy-preserving data mining. ACM Special Interest Group on Knowledge Discovery and Data Mining Explorations 4(2), 12–19 (2002)

    Google Scholar 

  33. Reis, B.Y., Kohane, I.S., Mandl, K.D.: Longitudinal histories as predictors of future diagnoses of domestic abuse: modelling study. BMJ 339(9) (2009)

    Google Scholar 

  34. Roden, D., Pulley, J., Basford, M., Bernard, G., Clayton, E., Balser, J., Masys, D.: Development of a large scale de-identified dna biobank to enable personalized medicine. Clinical Pharmacology and Therapeutics 84(3), 362–369 (2008)

    Article  Google Scholar 

  35. Samarati, P.: Protecting respondents identities in microdata release. TKDE 13(9), 1010–1027 (2001)

    Google Scholar 

  36. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38–47 (1996)

    Article  Google Scholar 

  37. Stead, W., Bates, R., Byrd, J., Giuse, D., Miller, R., Shultz, E.: Case study: The vanderbilt university medical center information management architecture (2003)

    Google Scholar 

  38. Sweeney, L.: k-anonymity: a model for protecting privacy. IJUFKS 10, 557–570 (2002)

    MathSciNet  MATH  Google Scholar 

  39. Tildesley, M.J., House, T.A., Bruhn, M., Curry, R., ONeil, M., Allpress, J., Smith, G., Keeling, M.: Impact of spatial clustering on disease transmission and optimal control. Proceedings of the National Academy of Sciences 107(3), 1041–1046 (2010)

    Google Scholar 

  40. U.S. Department of Health and Human Services Office for Civil Rights: HIPAA administrative simplification regulation text (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Author(s)

About this chapter

Cite this chapter

Gkoulalas-Divanis, A., Loukides, G. (2013). Introduction. In: Anonymization of Electronic Medical Records to Support Clinical Analysis. SpringerBriefs in Electrical and Computer Engineering. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5668-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-5668-1_1

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-5667-4

  • Online ISBN: 978-1-4614-5668-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics