A Framework for Privacy-Preserving Medical Document Sharing
@inproceedings{Li2013AFF, title={A Framework for Privacy-Preserving Medical Document Sharing}, author={Xiaobai Li and Jialun Qin}, booktitle={International Conference on Interaction Sciences}, year={2013} }
Health information systems have greatly increased availability of medical documents and benefited healthcare management and research. However, there are growing concerns about privacy in sharing medical documents. Existing approaches for privacy( preserving data sharing deal mostly with structured data. Current privacy techniques for unstructured medical text focus on detection and removal of patient identifiers from the text, which may be inadequate for preserving privacy and data utility. We…
Figures and Tables from this paper
6 Citations
A Hybrid Privacy Preservation Framework for Healthcare Data Publishing
- Computer Science
- 2017
The feasibility of the hybrid approach is demonstrated and its ability to maintain the consistency of the data consistent with best practices in big data management by preserving the privacy of patients’ health data using k–Optimize algorithm and Map Reduce is shown.
Conceptualization of Personalized Privacy Preserving Algorithms
- Computer ScienceMTSR
- 2015
The proposed conceptualized model integrates the generic view of privacy preserving data anonymization algorithms with a personalized privacy approach and presents a domain-independent semantic model of data anonymized techniques which also considers individuals’ different privacy concerns.
Towards Privacy Preservation using Clustering based Anonymization: Recent Advances and Future Research Outlook
- Computer ScienceIEEE Access
- 2022
This paper presents a comprehensive analysis of clustering-based anonymization mechanisms (CAMs) that have been recently proposed to preserve both privacy and utility in data publishing, and systematically categorizes the existing CAMs based on heterogeneous types of data.
Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications
- Computer ScienceComput. Networks
- 2015
Privacy and Security Concern for Electronic Medical Record Acceptance and Use : State of the Art 1
- Computer Science, Medicine
- 2017
The aim of this paper is to explore the different factors that affect the EMR acceptance and use, and provides recommendations regarding the development of EMR in the context of privacy and security.
Unified Structured Process for Health Analytics
- Computer Science
- 2014
This work proposes a HA process model with features from rational unified process (RUP) model and agile methodology, which will help to overcome challenges through an effective process model.
27 References
An integrated framework for de-identifying unstructured medical data
- Computer ScienceData Knowl. Eng.
- 2009
Automatic de-identification of textual documents in the electronic health record: a review of recent research
- Computer ScienceBMC medical research methodology
- 2010
A review of recent research in automated de-identification of narrative text documents from the electronic health record finds methods based on dictionaries performed better with PHI that is rarely mentioned in clinical text, but are more difficult to generalize.
Privacy-Preserving Data Mining - Models and Algorithms
- Computer ScienceAdvances in Database Systems
- 2008
Privacy-Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in a privacy-preserving way and is designed for researchers, professors, and advanced-level students in computer science.
Class-Restricted Clustering and Microperturbation for Data Privacy
- Computer ScienceManag. Sci.
- 2013
This work proposes a novel cluster-level micro-perturbation method for masking data that overcomes a common problem of traditional clustering-based methods for data masking, which is their inability to preserve important statistical properties such as the variance of attributes and the covariance across attributes.
k-Anonymity: A Model for Protecting Privacy
- Computer ScienceInt. J. Uncertain. Fuzziness Knowl. Based Syst.
- 2002
The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment and examines re-identification attacks that can be realized on releases that adhere to k- anonymity unless accompanying policies are respected.
Protecting Privacy Against Record Linkage Disclosure: A Bounded Swapping Approach for Numeric Data
- Computer ScienceInf. Syst. Res.
- 2011
A data-masking method for protecting private information against record linkage disclosure that preserves the statistical properties of the data for legitimate analysis that significantly outperforms existing methods in terms of both preventing identity disclosure and preserving data quality.
Privacy Preserving Data Mining
- Computer ScienceJournal of Cryptology
- 2001
This work considers a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without revealing any unnecessary information, and proposes a protocol that is considerably more efficient than generic solutions and demands both very few rounds of communication and reasonable bandwidth.
Privacy preserving mining of association rules
- Computer Science, MathematicsKDD
- 2002
A class of randomization operators are proposed that are much more effective than uniform randomization in limiting the breaches of privacy breaches and derived formulae for an unbiased support estimator and its variance are derived.
Viewpoint Paper: Evaluating the State-of-the-Art in Automatic De-identification
- Computer ScienceJ. Am. Medical Informatics Assoc.
- 2007
An overview of this de-identification challenge is provided, the data and the annotation process are described, the evaluation metrics are explained, the nature of the systems that addressed the challenge are discussed, the results of received system runs are analyzed, and directions for future research are identified.