PSEUDONYMIZATION TECHNIQUES FOR PRIVACY STUDY WITH CLINICAL DATA 1.

Slides:



Advertisements
Similar presentations
Testing Relational Database
Advertisements

Usage statistics in context - panel discussion on understanding usage, measuring success Peter Shepherd Project Director COUNTER AAP/PSP 9 February 2005.
Design and Making of Information System at Dentist Work Place By : Advisor : Samuel Budi GAlexander Setiawan, MT Leo Willyanto Industry Engineering.
SEP1 - 1 Introduction to Software Engineering Processes SWENET SEP1 Module Developed with support from the National Science Foundation.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
The Education of a Software Engineer Mehdi Jazayeri Presented by Matthias Hauswirth.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
Creating Architectural Descriptions. Outline Standardizing architectural descriptions: The IEEE has published, “Recommended Practice for Architectural.
Institute of Information Systems, Humboldt University, 2006· Privacy Engineering Sarah Spiekermann & Lorrie Faith Cranor DIMACS Workshop, Rutgers University.
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
System Engineering Instructor: Dr. Jerry Gao. System Engineering Jerry Gao, Ph.D. Jan System Engineering Hierarchy - System Modeling - Information.
Abdallah M. Al-Mahasheer
Executive Dashboard Systems Secure CITI Adam Zagorecki April 30, 2004.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Debbie Schmidt RN, MCSE Conference 2009 Nurse 2.0 Engaging the Healthcare Consumer Mobile Wound Care.
Research Methods for the Social Sciences: Ethics Ryan J. Martin, Ph.D. Thomas N. Cummings Research Fellow March 9, 2010.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
AMBIENT INTELLIGENCE Presented by GOKUL SURESH. INTRODUCTION  Evolution of Ambient Intelligence.  Science with a fictional view.  Enriching environment.
Multiple Indicator Cluster Surveys Data Dissemination and Further Analysis Workshop Data Archiving MICS4 Data Dissemination and Further Analysis Workshop.
Information Technology Audit
Why Information Governance….instead of Records & Information Management? Angela Fares, RHIA, CRM, CISA, CGEIT, CRISC, CISM or
Information Asset Classification
R 18 G 65 B 145 R 0 G 201 B 255 R 104 G 113 B 122 R 216 G 217 B 218 R 168 G 187 B 192 Core and background colors: 1© Nokia Solutions and Networks 2014.
Lesson 1 Week01.
Data Governance Data & Metadata Standards Antonio Amorin © 2011.
Protection from internal threats: Evolution of DLP or Who sets trends.
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Instructore: Tasneem Darwish1 University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department Requirement engineering.
Protection of Relations Within Large Datasets1 Protection of Relations Within Large Datasets Mgr. Boleslav Bobčík, T-Systems Czech Republic, a.s.
A GENERIC PROCESS FOR REQUIREMENTS ENGINEERING Chapter 2 1 These slides are prepared by Enas Naffar to be used in Software requirements course - Philadelphia.
Revalidation for SAS doctors John Bache FRCS RST Associate NHS Revalidation Support Team SASG Annual Conference Manchester 13th January 2010.
Top 10 Privacy Risks in Web Applications Method, results and some countermeasures 29 May 2015 Florian Stahl (Project Leader) Sponsored by.
FI-CORE Data Context Media Management Chapter Release 4.1 & Sprint Review.
Database Design Part of the design process is deciding how data will be stored in the system –Conventional files (sequential, indexed,..) –Databases (database.
Relative importance Area of impact What happened! The New Role: The Widening Scope of Information Systems.
Chapter 14 Part II: Architectural Adaptation BY: AARON MCKAY.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
Privacy Engineering for Digital Rights Management Systems By XiaoYu Chen.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
IHE Profile – SOA Analysis: In Progress Update Brian McIndoe January 18, 2011.
© 2010 Health Information Management: Concepts, Principles, and Practice Chapter 5: Data and Information Management.
Health Insurance portability and Accountability Act (HIPAA)‏
Integrated business-information system for sales process support Bitrix24 Marta Alić, prof. University of Applied Sciences, Zagreb.
Lecture 14 22/10/15. The Object-Oriented Analysis and Design  Process of progressively developing representation of a system component (or object) through.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Development of a community-based participatory network for integrated solid waste management By: Y.P. Cai, G.H. Huang, Q. Tan & G.C. Li EVSE, Faculty of.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Outlines Overview Defining the Vision Through Business Requirements
APEC Engineers Workshop Legal Considerations - Central Register Sept 2015 Angela Frawley, General Counsel.
Castlebridge associates | | Castlebridge changing how people think about information How to Implement the.
UNSD/ NSCB Regional workshop on data dissemination & communication Manila, Philippines, June 2012 Promoting (survey) microdata dissemination policies:
Guided By: Prof. Rajarshree Karande JSPM’S IMPERIAL COLLEGE OF ENGINEERING & RESEARCH WAGHOLI, PUNE Group MemberRoll No. Abhijeet Aralgundkar03.
Online School Management System Supervisor Name: Ashraful Islam Juwel Lecturer of Asian University of Bangladesh Submitted By: Bikash Chandra SutrodhorID.
ELECTRONIC – GOVERNMENT PROCUREMENT SYSTEM (E-GP) ELECTRONIC – GOVERNMENT PROCUREMENT SYSTEM (E-GP)
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
An agency of the European Union Guidance on the anonymisation of clinical reports for the purpose of publication in accordance with policy 0070 Industry.
Brussels Privacy Symposium on Identifiability
Cloud Security for eHealth – Study Validation
United States Retinol Market Research Report by Manufacturers, States, Type and Application, Forecast to 2022
Celtic-Plus Proposers Day 22 September 2016, Istanbul
Published: Aug 2017 Single User PDF: US$ 2500 No. of Pages: 499
Dissemination Workshop for African countries on the Implementation of International Recommendations for Distributive Trade Statistics May 2008,
DieboldNixdorf.com Tokenization Roman Cinkais |
A SEMINAR SYNOPSIS ON XML ENCRYPTION
ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions
MSc. Research Methods Week 1- Introduction.
Crown Jewels Risk Assessment: Cost-Effective Risk Identification
Presentation transcript:

PSEUDONYMIZATION TECHNIQUES FOR PRIVACY STUDY WITH CLINICAL DATA 1

Introduction  Hospital, clinic or pharmacy among the organizations that huge of personal data.  In new trend, Vijay (2002), these organizations are interested to release or publish data for research or public benefit like business or legal reasons.  However most of the data are “SENSITIVE”.  According to Tiangcheng Li & Ninghui Li (2008), many organizations, industries and governments are increasingly publishing and sharing the valuable and sensitive information without to protect of the privacy of entities. Publishing the data may put the respondent’s privacy in risk, Ge Ruan (2007).  Focus on techniques for data privacy on clinical data. 2

Introduction  What is Privacy?  Privacy includes the right of individuals and organizations to determine for themselves when, how and to what extent information about them is communicated to others.  What Impact with Hospital or Clinical?  Challenging with managing large data in hospital or clinical especially with legal and ethical. 3

Literature Review Data Protection Techniques 4 Protection (Data) Encrypt Anonymity Application Source : IHSN ( June 2009) Purpose : Security & Privacy Pseudonymization

Literature Review Issues: Data Privacy Area 5 Privacy (Data) Anonymous communication Anonymous transactions Anonymity in Files & Databases Purpose : Privacy Anonymous Credentials Anonymous Publication & Storage

Literature Review Issues: Data Privacy Medical Application Elements 6 Privacy (Data) “Hard” de- identification Various Types Anonymization Data Flow Segmentation Purpose : Privacy Controlled Database Privacy Risk Assessment

Literature Review Why Data Need To Anonymous? Publish Anonymous Process Researcher (Customize) Pattern / Predict (Customize) Advertise (Customize) Information Loss Leak - Privacy Incur ProblemSecurity (Pure)

Literature Review Issues : Anonymity Technique  Most anonymous techniques consist in reducing the level of detail in the information provided. Therefore, typically most the result in a loss of information, IHSN (2009).  Difficulties into the role of anonymous as a complete solution to the problem of data protection. It must be considered within the context of the analysis to be done on the data, which information needs to be protect.  Anonymous Process must also be considered within its legal context (Burkhart M., Schatzmann D. & Bernhard P., 2010). But should be the lesser extent for generating licensed files / legal context, IHSN (2009). 8

Problem Statement 9 Most anonymous process may cause privacy leakage with the original data from user information. Chances of loss information in most anonymous process is high.

Scope The scope of this research are:  Implemented the pseudonymization techniques from anonymous process with medical clinical data.  Using data in offline mode. 10

Pseudonymization Techniques 11  always map a given identifier with the same pseudo-ID  map a given identifier with a different pseudo-ID  Time-dependent  location-dependent  content-dependent

12 Data Privacy (Domain) Data Reduction Data Perturbation Data synthetic Dataset Anonymous dataset Pseudonymization Process Flow On Research Methodology

Pseudonymization Implementations 13 Privacy Protection Data Suppliers (sources)Data Collectors (data registers)

Pseudonymization Implementations: Architecture 14

15 Data Public Pseudonymization Engine AnonymizerRisk Analyzer Data Storage Source : Enhanced Simplifying Anonymizing Proxy, Saikat Guha, Pseudonymization Implementations

Result View (RO4) 16 Density Of Information Source: Statistic IHSN, 2009 Black Marker, Truncation

Conclusion It is expected that this research shall produce:  A new technique in anonymous process which more comprehensive where this technique be reduce or none information loss with protection of privacy leakage. 17

Future Work 18 Generalization Process In Pseudonymization  Micro data e.g: Medical data  Network data Online Anonymization Process as Alternative Beside Encryption

end Thank you….. 19