Maintenance Notice

Due to necessary scheduled maintenance, the JMIR Publications website will be unavailable from Wednesday, July 01, 2020 at 8:00 PM to 10:00 PM EST. We apologize in advance for any inconvenience this may cause you.

Who will be affected?

Previously submitted to: JMIR Medical Informatics (no longer under consideration since Nov 06, 2020)

Date Submitted: Jan 15, 2018
Open Peer Review Period: Jan 19, 2018 - Mar 29, 2018
(closed for review but you can still tweet)

NOTE: This is an unreviewed Preprint

Warning: This is a unreviewed preprint (What is a preprint?). Readers are warned that the document has not been peer-reviewed by expert/patient reviewers or an academic editor, may contain misleading claims, and is likely to undergo changes before final publication, if accepted, or may have been rejected/withdrawn (a note "no longer under consideration" will appear above).

Peer review me: Readers with interest and expertise are encouraged to sign up as peer-reviewer, if the paper is within an open peer-review period (in this case, a "Peer Review Me" button to sign up as reviewer is displayed above). All preprints currently open for review are listed here. Outside of the formal open peer-review period we encourage you to tweet about the preprint.

Citation: Please cite this preprint only for review purposes or for grant applications and CVs (if you are the author).

Final version: If our system detects a final peer-reviewed "version of record" (VoR) published in any journal, a link to that VoR will appear below. Readers are then encourage to cite the VoR instead of this preprint.

Settings: If you are the author, you can login and change the preprint display settings, but the preprint URL/DOI is supposed to be stable and citable, so it should not be removed once posted.

Submit: To post your own preprint, simply submit to any JMIR journal, and choose the appropriate settings to expose your submitted version as preprint.

Warning: This is an author submission that is not peer-reviewed or edited. Preprints - unless they show as "accepted" - should not be relied on to guide clinical practice or health-related behavior and should not be reported in news media as established information.

A Survey of Privacy-Preserving Techniques for Reuse of Distributed Health Data

  • Kassaye Yitbarek Yigzaw; 
  • Gro K Rosvold Berntsen; 
  • Gunnar Hartvigsen; 
  • Joseph Hurley; 
  • Anders Andersen; 
  • Johan Gustav Bellika

Background:

Large amounts of detailed electronic health data are being collected. Reuse of these data has enormous potential for scientific discoveries that enables the improvement of healthcare systems’ effectiveness, efficiency, and quality of care. However, health data reuse should protect the privacy interests of the stakeholders (i.e., patients and healthcare providers) and promote public good through research. This is particularly challenging when the data are distributed across several data custodians.

Objective:

This paper aims to give an overall overview of existing privacy-preserving techniques for distributed data reuse and their practical applications.

Methods:

We searched for review papers that are focused on privacy-preserving techniques for different stages of distributed data reuse, such as creating dataset that satisfy a given criteria, analyzing the dataset, and releasing statistical results. We analyzed the identified techniques in terms of privacy, data utility, efficiency, and scalability. Practical uses of the techniques are also discussed when there is actual use.

Results:

Several privacy-preserving data reuse techniques have been identified. The techniques are developed for different stages of distributed data reuse based on de-identification, secure multi-party computation (SMC), or a combination of these two building blocks. Different combinations of the techniques need to be applied for the whole stages of distributed data reuse. Some of the surveyed techniques protect the privacy of data custodians in addition to individuals. The main challenge for de-identification based data reuse techniques is making a balance between utility and privacy. Whereas, efficiency and scalability are the main challenges for SMC based techniques.

Conclusions:

Enormous progress has been made towards making privacy-preserving reuse of distributed data possible. However, there are only few practical uses of the available techniques. the problem of distributed data reuse also requires governance, legal, and ethical frameworks, as well as the technical solutions. It is not clear whether consent, data-use agreement, and ethics review are required for practical uses of the techniques.


 Citation

Please cite as:

Yigzaw KY, Berntsen GKR, Hartvigsen G, Hurley J, Andersen A, Bellika JG

A Survey of Privacy-Preserving Techniques for Reuse of Distributed Health Data

JMIR Preprints. 15/01/2018:9847

DOI: 10.2196/preprints.9847

URL: https://preprints.jmir.org/preprint/9847

Download PDF


Request queued. Please wait while the file is being generated. It may take some time.

© The authors. All rights reserved. This is a privileged document currently under peer-review/community review (or an accepted/rejected manuscript). Authors have provided JMIR Publications with an exclusive license to publish this preprint on it's website for review and ahead-of-print citation purposes only. While the final peer-reviewed paper may be licensed under a cc-by license on publication, at this stage authors and publisher expressively prohibit redistribution of this draft paper other than for review purposes.