The issues connected with the anonymization of medical data. Part 1. The introduction to the anonymization of medical data. Ensuring the protection of sensitive information with the use of such methods as f(a) and f(a,b)
Journal Title: Medical Science Pulse - Year 2014, Vol 8, Issue 1
Abstract
Introduction: Medical documentation must be protected against damage or loss, in compliance with its integrity and credibility and the opportunity to a permanent access by the authorized staff and, finally, protected against the access of unauthorized persons. Anonymization is one of the methods to safeguard the data against the disclosure.Aim of the study: The study aims at the analysis of methods of anonymization, the analysis of methods of the protection of anonymized data and the study of a new security type of privacy enabling to control sensitive data by the entity which the data concerns.Material and methods: The analytical and algebraic methods were used.Results: The study ought to deliver the materials supporting the choice and analysis of the ways of the anonymization of medical data, and develop a new privacy protection solution enabling the control of sensitive data by entities whom this data concerns.Conclusions: In the paper, the analysis of solutions of data anonymizing used for medical data privacy protection was con-ducted. The methods, such as k-Anonymity, (X,y)- Anonymity, (a,k)- Anonymity, (k,e)-Anonymity, (X,y)-Privacy, LKC-Privacy, l-Diversity, (X,y)-Linkability, t-Closeness, Confidence Bounding and Personalized Privacy were described, explained and analyzed. The analysis of solutions to control sensitive data by their owners was also conducted. Apart from the existing methods of the anonymization, the analysis of methods of the anonimized data protection was conducted, in particular the methods of: d-Presence, e-Differential Privacy, (d,g)-Privacy, (a,b)-Distributing Privacy and protections against (c,t)-Isolation were analyzed. The author introduced a new solution of the controlled protection of privacy. The solution is based on marking a protected field and multi-key encryption of the sensitive value. The suggested way of fields marking is in accordance to the XML standard. For the encryption (n,p) different key cipher was selected. To decipher the content the p keys of n is used. The proposed solution enables to apply brand new methods for the control of privacy of disclosing sensitive data.
Authors and Affiliations
ARKADIUSZ LIBER
Analysis of the Range of Motion in the Glenohumeral Joint Using a Goniometer v1.0 Application - a Pilot Study
Wpływ mezoterapii bezigłowej z użyciem kwasu hialuronowego na nawilżenie skóry w profilaktyce przeciwstarzeniowej. Doniesienie wstępne
DOGS WITH A PURPOSE SAINT FRANCIS SERVICE DOGS: ASSISTING PEOPLE WITH DISABILITIES
Formed in 1996, Saint Francis Service Dogs is a non-profit organization working to improve the lives of children and adults with disabilities through partnership with a service dog. The organization is also committed to...
Historia cięcia cesarskiego
W artykule przedstawiono historię cięcia cesarskiego od czasów starożytncyh do XXI w. Zwrócono uwagę na ewolucję technik operacyjnych i postepowania okołoporodowego na przestrzeni dziejów, co spowodowało obniżenie śmiert...
The value of interdisciplinary research: lessons from the 2017 Nobel Prize in chronobiology
Since 1901, the Nobel Prize has been awarded to scientists who have made the most important discoveries for the benefit of humanity. The 2017 Nobel Prize in Physiology or Medicine was awarded jointly to Jeffrey C. Hall,...