2014
DOI: 10.1016/j.jbi.2014.06.002
|View full text |Cite
|
Sign up to set email alerts
|

Publishing data from electronic health records while preserving privacy: A survey of algorithms

Abstract: The dissemination of Electronic Health Records (EHRs) can be highly beneficial for a range of medical studies, spanning from clinical trials to epidemic control studies, but it must be performed in a way that preserves patients' privacy. This is not straightforward, because the disseminated data need to be protected against several privacy threats, while remaining useful for subsequent analysis tasks. In this work, we present a survey of algorithms that have been proposed for publishing structured patient data… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
113
0
5

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 178 publications
(118 citation statements)
references
References 94 publications
0
113
0
5
Order By: Relevance
“…In this section, we discuss anonymization methods that are closer to ours (see [15,52,25] for surveys). For extensive surveys on anonymization principles and methods for healthcare data, the reader is referred to [17,25,27].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we discuss anonymization methods that are closer to ours (see [15,52,25] for surveys). For extensive surveys on anonymization principles and methods for healthcare data, the reader is referred to [17,25,27].…”
Section: Related Workmentioning
confidence: 99%
“…In particular, the privacy-preserving sharing of healthcare data beyond authorized recipients (e.g., researchers or employees of the institution that has collected the data) is challenging [15,16,25]. This is partly because it cannot be facilitated based on access control and encryption-based methods [59,65], or by relying solely on policies (e.g., the HIPAA Privacy Rule [57] in the US, the Anonymization Code [56] in the UK, and the Data Protection Directive [58] in the EU).…”
Section: Introductionmentioning
confidence: 99%
“…El Emam and colleagues authored a good overview of anonymization [51]. A good detailed review of anonymization algorithms was authored by Gkoulalas-Divanis and colleagues [87]. Recent algorithms have focused on enhancing the utility of anonymized data [88][89][90] and applying anonymization to distributed data networks [91].…”
Section: Impact On Reusementioning
confidence: 99%
“…Most of the existing literature on automatically identifying sensitive information has addressed the task of masking personal data [2,5]. However, sensitive information in government documents is more wide-ranging than personal information and can include, for example, issues of con dentiality or international relations.…”
Section: Related Workmentioning
confidence: 99%