2011
DOI: 10.1007/978-3-642-22890-2_16
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Storage and Access of Medical Data through Pseudonymization and Encryption

Abstract: Abstract. E-health allows better communication between health care providers and higher availability of medical data. However, the downside of interconnected systems is the increased probability of unauthorized access to highly sensitive records that could result in serious discrimination against the patient. This article provides an overview of actual privacy threats and presents a pseudonymization approach that preserves the patient's privacy and data confidentiality. It allows (direct care) primary use of m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…Prior work proposed the assignment of identical pseudonyms to records linked to the same participant or patient in order to enable record grouping or patient-specific data joins [4,13]. Pseudonymization is often combined with encryption to ensure both deidentification and confidentiality of the data [13]. Pseudonyms establish linked records within the database during the whole lifecycle of the database.…”
Section: Discussionmentioning
confidence: 99%
“…Prior work proposed the assignment of identical pseudonyms to records linked to the same participant or patient in order to enable record grouping or patient-specific data joins [4,13]. Pseudonymization is often combined with encryption to ensure both deidentification and confidentiality of the data [13]. Pseudonyms establish linked records within the database during the whole lifecycle of the database.…”
Section: Discussionmentioning
confidence: 99%
“…The pesudonymization is the earliest technique used for privacy-preserving eHealthcare system. Many protocols around the pesudonymization [21]- [25] have been studied in recent years. The key idea is to remove all the information that can identify the users.…”
Section: A Pseudonymization Based Schemes For Ehealthcare Systemmentioning
confidence: 99%
“…Giving the patients the control of how to encrypt their files and whom to give access to what part of their PHR is a novel approach. Heurix et al in [13] discuss the prejudice and discrimination patients are subjected to in the event of unauthorized disclosure of their Electronic Health Records (EHR) to insurance companies or even potential employers. The authors present a pseudonymization approach that preserves the patient's privacy and data confidentiality and provides a balance between privacy and data usability.…”
Section: Healthcarementioning
confidence: 99%