• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种医学数据化名化的方法。

A methodology for the pseudonymization of medical data.

机构信息

Institute of Software Technology and Interactive Systems, Vienna University of Technology, Favoritenstrasse 9-11, 1040 Vienna, Austria.

出版信息

Int J Med Inform. 2011 Mar;80(3):190-204. doi: 10.1016/j.ijmedinf.2010.10.016. Epub 2010 Nov 13.

DOI:10.1016/j.ijmedinf.2010.10.016
PMID:21075676
Abstract

PURPOSE

E-health enables the sharing of patient-related data whenever and wherever necessary. Electronic health records (EHRs) promise to improve communication between health care providers, thus leading to better quality of patients' treatment and reduced costs. However, as highly sensitive patient information provides a promising goal for attackers and is also frequently demanded by insurance companies and employers, there is increasing social and political pressure regarding the prevention of health data misuse. This work addresses this problem and introduces a methodology that protects health records from unauthorized access and lets the patient as data owner decide who the authorized persons are, i.e., who the patient discloses her health information to. Therefore, the methodology prevents data disclosure that negatively influences the patient's life (e.g., by being denied health insurance or employment).

METHODS

This research uses a combination of conceptual-analytical, artifact-building and artifact-evaluating research approaches. The article starts with a detailed exploration of existing privacy protection mechanisms, such as encryption, anonymization and pseudonymization, by comparing and analyzing related work (conceptual-analytical approach). Based on these results and the identified shortcomings, a pseudonymization methodology is defined and evaluated by means of a threat analysis. Finally, the research results are validated with the design and implementation of a prototype (artifact building and artifact evaluation).

RESULTS

This paper presents a new methodology for the pseudonymization of medical data that stores health data decoupled from the corresponding patient-identifying information, allowing privacy-preserving secondary use of the health records in clinical studies without additional anonymization steps. In contrast to clinical studies, where it is not necessary to identify the individual participants, insurance companies and employers are interested in the health status of individuals such as potential insurance or job applicants. In this case, pseudonymized records are practically useless for these parties as the patient controls who is able to reestablish the link between health records and patient for primary use - usually only trusted health care providers.

CONCLUSIONS

The framework provides health care providers with a unique solution that guarantees data privacy (e.g., according to HIPAA) and allows primary and secondary use of the data at the same time. The security analysis showed that the methodology is secure and protected against common intruder scenarios.

摘要

目的

电子健康使患者相关数据能够在任何时间、任何地点共享。电子健康记录(EHR)有望改善医疗服务提供者之间的沟通,从而提高患者治疗质量并降低成本。然而,由于高度敏感的患者信息为攻击者提供了一个有吸引力的目标,并且经常被保险公司和雇主所要求,因此关于防止健康数据滥用的社会和政治压力越来越大。这项工作解决了这个问题,并提出了一种方法,该方法可以保护健康记录免受未经授权的访问,并让患者作为数据所有者决定谁是授权人员,即患者向谁披露她的健康信息。因此,该方法可以防止对患者生活产生负面影响的数据泄露(例如,因拒绝健康保险或就业而导致的泄露)。

方法

本研究采用概念分析、构建人工制品和评估人工制品的研究方法相结合。本文首先通过比较和分析相关工作(概念分析方法),详细探讨了现有的隐私保护机制,如加密、匿名化和假名化。基于这些结果和确定的缺点,定义并通过威胁分析评估了假名化方法。最后,通过设计和实现原型(构建人工制品和评估人工制品)来验证研究结果。

结果

本文提出了一种新的医疗数据假名化方法,该方法将健康数据与相应的患者识别信息分离存储,允许在临床研究中对健康记录进行隐私保护的二次使用,而无需额外的匿名化步骤。与临床研究不同,在临床研究中不需要识别个体参与者,保险公司和雇主对个人的健康状况感兴趣,例如潜在的保险或求职者。在这种情况下,对于这些方来说,假名化的记录实际上是无用的,因为患者控制着谁能够重新建立健康记录和患者之间的联系,以便进行主要使用——通常只有值得信赖的医疗服务提供者。

结论

该框架为医疗服务提供者提供了一种独特的解决方案,该方案保证了数据隐私(例如,符合 HIPAA),并允许同时进行主要和次要使用。安全分析表明,该方法是安全的,并能抵御常见的入侵场景。

相似文献

1
A methodology for the pseudonymization of medical data.一种医学数据化名化的方法。
Int J Med Inform. 2011 Mar;80(3):190-204. doi: 10.1016/j.ijmedinf.2010.10.016. Epub 2010 Nov 13.
2
Improving patients privacy with Pseudonymization.通过假名化提高患者隐私。
Stud Health Technol Inform. 2008;136:691-6.
3
Confidentiality preserving audits of electronic medical record access.电子病历访问的保密审计
Stud Health Technol Inform. 2007;129(Pt 1):320-4.
4
Privacy preservation and information security protection for patients' portable electronic health records.患者便携式电子健康记录的隐私保护与信息安全防护
Comput Biol Med. 2009 Sep;39(9):743-50. doi: 10.1016/j.compbiomed.2009.06.004. Epub 2009 Jul 8.
5
Access and privacy rights using web security standards to increase patient empowerment.利用网络安全标准保障访问和隐私权,增强患者自主权。
Stud Health Technol Inform. 2008;137:275-85.
6
An 'Honest Broker' mechanism to maintain privacy for patient care and academic medical research.一种用于维护患者护理和学术医学研究隐私的“诚实中介”机制。
Int J Med Inform. 2007 May-Jun;76(5-6):407-11. doi: 10.1016/j.ijmedinf.2006.09.004. Epub 2006 Nov 1.
7
Aspects of privacy for electronic health records.电子健康记录的隐私问题。
Int J Med Inform. 2011 Feb;80(2):e26-31. doi: 10.1016/j.ijmedinf.2010.10.001. Epub 2010 Oct 30.
8
Complying with the Health Insurance Portability and Accountability Act. Privacy standards.遵守《健康保险流通与责任法案》。隐私标准。
AAOHN J. 2001 Nov;49(11):501-7.
9
The need to know versus the right to know: privacy of patient medical data in an information-based society.知情权与知晓权:信息社会中患者医疗数据的隐私问题
Suffolk Univ Law Rev. 1997 Winter;30(4):1183-218.
10
Privacy and security requirements of distributed computer based patient records.基于分布式计算机的患者记录的隐私和安全要求。
Int J Biomed Comput. 1994 Feb;35 Suppl:57-64.

引用本文的文献

1
Applicability Assessment of Technologies for Predictive and Prescriptive Analytics of Nephrology Big Data.肾脏病大数据预测性与规范性分析技术的适用性评估
Proteomics. 2025 Jun;25(11-12):e202400135. doi: 10.1002/pmic.202400135. Epub 2025 May 27.
2
Evaluating GPT models for clinical note de-identification.评估用于临床记录去识别化的GPT模型。
Sci Rep. 2025 Jan 31;15(1):3852. doi: 10.1038/s41598-025-86890-3.
3
Semi-local Time sensitive Anonymization of Clinical Data.临床数据的半局部时间敏感匿名化
Sci Data. 2024 Dec 20;11(1):1412. doi: 10.1038/s41597-024-04192-1.
4
Towards algorithm auditing: managing legal, ethical and technological risks of AI, ML and associated algorithms.迈向算法审计:管理人工智能、机器学习及相关算法的法律、伦理和技术风险。
R Soc Open Sci. 2024 May 15;11(5):230859. doi: 10.1098/rsos.230859. eCollection 2024 May.
5
A Python library to check the level of anonymity of a dataset.一个用于检查数据集匿名程度的 Python 库。
Sci Data. 2022 Dec 26;9(1):785. doi: 10.1038/s41597-022-01894-2.
6
A data flow process for confidential data and its application in a health research project.一个用于机密数据的数据流程及其在健康研究项目中的应用。
PLoS One. 2022 Jan 21;17(1):e0262609. doi: 10.1371/journal.pone.0262609. eCollection 2022.
7
Assessing the quality of clinical and administrative data extracted from hospitals: the General Medicine Inpatient Initiative (GEMINI) experience.评估从医院提取的临床和行政数据的质量:综合内科住院患者倡议(GEMINI)的经验。
J Am Med Inform Assoc. 2021 Mar 1;28(3):578-587. doi: 10.1093/jamia/ocaa225.
8
Accuracy of an Electronic Health Record Patient Linkage Module Evaluated between Neighboring Academic Health Care Centers.电子健康记录患者链接模块在相邻学术医疗中心间的准确性评估。
Appl Clin Inform. 2020 Oct;11(5):725-732. doi: 10.1055/s-0040-1718374. Epub 2020 Nov 4.
9
Deep learning workflow in radiology: a primer.放射学中的深度学习工作流程:入门指南。
Insights Imaging. 2020 Feb 10;11(1):22. doi: 10.1186/s13244-019-0832-5.
10
Patient Data Sharing and Confidentiality Practices of Researchers in Jordan.约旦研究人员的患者数据共享与保密实践
Risk Manag Healthc Policy. 2019 Nov 29;12:255-263. doi: 10.2147/RMHP.S227759. eCollection 2019.