Mobile Medical Data Access System

Author(s):  
Z. Hunaiti ◽  
A. Rahman ◽  
Z. Huneiti ◽  
W. Balachandran
2008 ◽  
pp. 49-60
Author(s):  
Ziad Hunaiti ◽  
Zayed Huneiti ◽  
Wamadeva Balachandran ◽  
Gregory Savelis ◽  
Ammar Rahman
Keyword(s):  

Complying with privacy in multi-jurisdictional health domains is important as well as challenging. The compliance management process will not be efficient unless it manages to show evidences of explicit verification of legal requirements. In order to achieve this goal, privacy compliance should be addressed through “a privacy by design” approach. This paper presents an approach to privacy protection verification by means of a novel audit framework. It aims to allow privacy auditors to look at past events of data processing effectuated by healthcare organisation and verify compliance to legal privacy requirements. The adapted approach used semantic modelling and a semantic reasoning layer that could be placed on top of hospital databases. These models allow the integration of fine-grained context information about the sharing of patient data and provide an explicit capturing of applicable privacy obligation. This is particularly helpful for insuring a seamless data access logging and an effective compliance checking during audit trials


2014 ◽  
Vol 8 (2) ◽  
pp. 13-24 ◽  
Author(s):  
Arkadiusz Liber

Introduction: Medical documentation ought to be accessible with the preservation of its integrity as well as the protection of personal data. One of the manners of its protection against disclosure is anonymization. Contemporary methods ensure anonymity without the possibility of sensitive data access control. it seems that the future of sensitive data processing systems belongs to the personalized method. In the first part of the paper k-Anonymity, (X,y)- Anonymity, (α,k)- Anonymity, and (k,e)-Anonymity methods were discussed. these methods belong to well - known elementary methods which are the subject of a significant number of publications. As the source papers to this part, Samarati, Sweeney, wang, wong and zhang’s works were accredited. the selection of these publications is justified by their wider research review work led, for instance, by Fung, Wang, Fu and y. however, it should be noted that the methods of anonymization derive from the methods of statistical databases protection from the 70s of 20th century. Due to the interrelated content and literature references the first and the second part of this article constitute the integral whole.Aim of the study: The analysis of the methods of anonymization, the analysis of the methods of protection of anonymized data, the study of a new security type of privacy enabling device to control disclosing sensitive data by the entity which this data concerns.Material and methods: Analytical methods, algebraic methods.Results: Delivering material supporting the choice and analysis of the ways of anonymization of medical data, developing a new privacy protection solution enabling the control of sensitive data by entities which this data concerns.Conclusions: In the paper the analysis of solutions for data anonymization, to ensure privacy protection in medical data sets, was conducted. the methods of: k-Anonymity, (X,y)- Anonymity, (α,k)- Anonymity, (k,e)-Anonymity, (X,y)-Privacy, lKc-Privacy, l-Diversity, (X,y)-linkability, t-closeness, confidence Bounding and Personalized Privacy were described, explained and analyzed. The analysis of solutions of controlling sensitive data by their owner was also conducted. Apart from the existing methods of the anonymization, the analysis of methods of the protection of anonymized data was included. In particular, the methods of: δ-Presence, e-Differential Privacy, (d,γ)-Privacy, (α,β)-Distributing Privacy and protections against (c,t)-isolation were analyzed. Moreover, the author introduced a new solution of the controlled protection of privacy. the solution is based on marking a protected field and the multi-key encryption of sensitive value. The suggested way of marking the fields is in accordance with Xmlstandard. For the encryption, (n,p) different keys cipher was selected. to decipher the content the p keys of n were used. The proposed solution enables to apply brand new methods to control privacy of disclosing sensitive data.


2021 ◽  
Vol 1 ◽  
pp. 80
Author(s):  
Thijs Devriendt ◽  
Clemens Ammann ◽  
Folkert W. Asselbergs ◽  
Alexander Bernier ◽  
Rodrigo Costas ◽  
...  

Various data sharing platforms are being developed to enhance the sharing of cohort data by addressing the fragmented state of data storage and access systems. However, policy challenges in several domains remain unresolved. The euCanSHare workshop was organized to identify and discuss these challenges and to set the future research agenda. Concerns over the multiplicity and long-term sustainability of platforms, lack of resources, access of commercial parties to medical data, credit and recognition mechanisms in academia and the organization of data access committees are outlined. Within these areas, solutions need to be devised to ensure an optimal functioning of platforms.


Author(s):  
Anukul Pandey ◽  
Butta Singh ◽  
Barjinder Singh Saini ◽  
Neetu Sood

The primary objective of this chapter is to analyze the existing tools and techniques for medical data security. Typically, medical data includes either medical signals such as electrocardiogram, electroencephalogram, electromyography, or medical imaging like digital imaging and communications in medicine, joint photographic experts group format. The medical data are sensitive, subject to privacy preservation, and data access rights. Security in e-health field is an integrated concept which includes robust combination of confidentiality, integrity, and availability of medical data. Confidentiality ensures the data is inaccessible to unauthorized access. Integrity restricts the alteration in data by the unauthorized user. Whereas availability provides the readiness of the data when needed by the authorized user. Additionally, confidentiality, integrity and availability, accountability parameter records the back action list which answers the why, when, what, and whom data is accessed. The selected tools and techniques used in medical data security in e-health applications is discussed.


Author(s):  
Kerina Jones ◽  
David Ford ◽  
Caroline Brooks

ABSTRACT ObjectivesWhilst the current expansion of health-related big data and data linkage research are exciting developments with great potential, they bring a major challenge. This is how to strike an appropriate balance between making the data accessible for beneficial uses, whilst respecting the rights of individuals, the duty of confidentiality and protecting the privacy of person-level data, without undue burden to research. ApproachUsing a case study approach, we describe how the UK Secure Research Platform (UKSeRP) for the Secure Anonymised Information Linkage (SAIL) databank addresses this challenge. We outline the principles, features and operating model of the SAIL UKSeRP, and how we are addressing the challenges of making health-related data safely accessible to increasing numbers of research users within a secure environment. ResultsThe SAIL UKSeRP has four basic principles to ensure that it is able to meet the needs of the growing data user community, and these are to: A) operate a remote access system that provides secure data access to approved data users; B) host an environment that provides a powerful platform for data analysis activities; (C) have a robust mechanism for the safe transfer of approved files in and out of the system; and (D) ensure that the system is efficient and scalable to accommodate a growing data user base. Subject to independent Information Governance approval and within a robust, proportionate Governance framework, the SAIL UKSeRP provides data users with a familiar Windows interface and their usual toolsets to access anonymously-linked datasets for research and evaluation. ConclusionThe SAIL UKSeRP represents a powerful analytical environment within a privacy-protecting safe haven and secure remote access system which has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. Further challenges lie ahead as the landscape develops and emerging data types become more available. UKSeRP technology is available and customisable for other use cases within the UK and international jurisdictions, to operate within their respective governance frameworks.


Sign in / Sign up

Export Citation Format

Share Document