The issues connected with the anonymization of medical data. Part 2. Advanced anonymization and anonymization controlled by owner of protected sensitive data

Journal Title: Medical Science Pulse - Year 2014, Vol 8, Issue 2

Abstract

Introduction: Medical documentation ought to be accessible with the preservation of its integrity as well as the protection of personal data. One of the manners of its protection against disclosure is anonymization. Contemporary methods ensure anonymity without the possibility of sensitive data access control. it seems that the future of sensitive data processing systems belongs to the personalized method. In the first part of the paper k-Anonymity, (X,y)- Anonymity, (α,k)- Anonymity, and (k,e)-Anonymity methods were discussed. these methods belong to well - known elementary methods which are the subject of a significant number of publications. As the source papers to this part, Samarati, Sweeney, wang, wong and zhang’s works were accredited. the selection of these publications is justified by their wider research review work led, for instance, by Fung, Wang, Fu and y. however, it should be noted that the methods of anonymization derive from the methods of statistical databases protection from the 70s of 20th century. Due to the interrelated content and literature references the first and the second part of this article constitute the integral whole.Aim of the study: The analysis of the methods of anonymization, the analysis of the methods of protection of anonymized data, the study of a new security type of privacy enabling device to control disclosing sensitive data by the entity which this data concerns.Material and methods: Analytical methods, algebraic methods.Results: Delivering material supporting the choice and analysis of the ways of anonymization of medical data, developing a new privacy protection solution enabling the control of sensitive data by entities which this data concerns.Conclusions: In the paper the analysis of solutions for data anonymization, to ensure privacy protection in medical data sets, was conducted. the methods of: k-Anonymity, (X,y)- Anonymity, (α,k)- Anonymity, (k,e)-Anonymity, (X,y)-Privacy, lKc-Privacy, l-Diversity, (X,y)-linkability, t-closeness, confidence Bounding and Personalized Privacy were described, explained and analyzed. The analysis of solutions of controlling sensitive data by their owner was also conducted. Apart from the existing methods of the anonymization, the analysis of methods of the protection of anonymized data was included. In particular, the methods of: δ-Presence, e-Differential Privacy, (d,γ)-Privacy, (α,β)-Distributing Privacy and protections against (c,t)-isolation were analyzed. Moreover, the author introduced a new solution of the controlled protection of privacy. the solution is based on marking a protected field and the multi-key encryption of sensitive value. The suggested way of marking the fields is in accordance with Xmlstandard. For the encryption, (n,p) different keys cipher was selected. to decipher the content the p keys of n were used. The proposed solution enables to apply brand new methods to control privacy of disclosing sensitive data.

Authors and Affiliations

Arkadiusz Liber

Keywords

Related Articles

What should a cosmetologist know about dermatological lesions on the face?

In everyday practice, cosmetologists often observe abnormalities on the facial skin of his or her clients. Facial lesions have a diverse clinical picture, although most are benign. However, some lesions may be malignant...

A delivery in breech presentation – a physiology or pathology? Historical deliberations

The breech presentation of the foetus is noted in approximately 3 percentages of all deliveries and the way they are assessed constitutes an important issue in contemporary obstetrics. In order to recognize the breech po...

Szczepienia zalecane pacjentom w podeszłym wieku oraz przewlekle chorym

Szczepienia ochronne stanowią jedną z najskuteczniejszych form zapobiegania chorobom. Są jednym z podstawowych składowych profilaktyki chorób. Profilaktyka szczepionkowa w przypadku szczepień masowych jest korzystna dla...

Całościowa Ocena Geriatryczna a opieka medyczna nad osobą starszą

Prognozy demograficzne wskazują, że najszybciej rosnącą grupą wiekową pacjentów na świecie są osoby powyżej 65. roku życia. Szacuje się, że ich odsetek w 2050 r. osiągnie ok. 31,3% populacji Polski. Oznacza to, że ludzie...

The effectiveness of therapeutic massage in lumbar spine pain syndrome

Introduction: The chronic lumbar spine pain is one of the most common disorders reported by patients at family doctor’s visits. The symptoms associated with the problem usually include limited mobility of the trunk and t...

Download PDF file
  • EP ID EP69095
  • DOI -
  • Views 161
  • Downloads 0

How To Cite

Arkadiusz Liber (2014). The issues connected with the anonymization of medical data. Part 2. Advanced anonymization and anonymization controlled by owner of protected sensitive data. Medical Science Pulse, 8(2), 13-24. https://europub.co.uk/articles/-A-69095