BMC Medical Informatics and Decision Making | |
Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation | |
Technical Advance | |
Kassaye Yitbarek Yigzaw1  Antonis Michalas2  Johan Gustav Bellika3  | |
[1] Department of Computer Science, UiT The Arctic University of Norway, 9037, Tromsø, Norway;Norwegian Centre for E-health Research, University Hospital of North Norway, 9019, Tromsø, Norway;Department of Computer Science, University of Westminster, 115 New Cavendish Street, W1W 6UW, London, UK;Norwegian Centre for E-health Research, University Hospital of North Norway, 9019, Tromsø, Norway;Department of Clinical Medicine, UiT The Arctic University of Norway, 9037, Tromsø, Norway; | |
关键词: Bloom Filter; Data Reuse; Deduplication; Distributed Statistical Computation; Data Linkage; Duplicate Record; Electronic Health Record; Privacy; Record Linkage; Set Intersection; | |
DOI : 10.1186/s12911-016-0389-x | |
received in 2016-07-27, accepted in 2016-11-10, 发布年份 2017 | |
来源: Springer | |
【 摘 要 】
BackgroundTechniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results. However, duplicate records in a distributed dataset may lead to incorrect statistical results. Therefore, to increase the accuracy of the statistical analysis of a distributed dataset, secure deduplication is an important preprocessing step.MethodsWe designed a secure protocol for the deduplication of horizontally partitioned datasets with deterministic record linkage algorithms. We provided a formal security analysis of the protocol in the presence of semi-honest adversaries. The protocol was implemented and deployed across three microbiology laboratories located in Norway, and we ran experiments on the datasets in which the number of records for each laboratory varied. Experiments were also performed on simulated microbiology datasets and data custodians connected through a local area network.ResultsThe security analysis demonstrated that the protocol protects the privacy of individuals and data custodians under a semi-honest adversarial model. More precisely, the protocol remains secure with the collusion of up to N − 2 corrupt data custodians. The total runtime for the protocol scales linearly with the addition of data custodians and records. One million simulated records distributed across 20 data custodians were deduplicated within 45 s. The experimental results showed that the protocol is more efficient and scalable than previous protocols for the same problem.ConclusionsThe proposed deduplication protocol is efficient and scalable for practical uses while protecting the privacy of patients and data custodians.
【 授权许可】
CC BY
© The Author(s). 2016
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
RO202311099965822ZK.pdf | 1775KB | download | |
12864_2016_2798_Article_IEq6.gif | 1KB | Image | download |
12864_2016_3263_Article_IEq11.gif | 1KB | Image | download |
12864_2016_3263_Article_IEq13.gif | 1KB | Image | download |
12864_2016_2789_Article_IEq52.gif | 1KB | Image | download |
12864_2016_3263_Article_IEq16.gif | 1KB | Image | download |
12864_2017_3604_Article_IEq5.gif | 1KB | Image | download |
12893_2017_312_Article_IEq1.gif | 1KB | Image | download |
12864_2016_2443_Article_IEq13.gif | 1KB | Image | download |
12864_2016_2443_Article_IEq14.gif | 1KB | Image | download |
12864_2017_4020_Article_IEq34.gif | 1KB | Image | download |
12864_2017_4020_Article_IEq37.gif | 1KB | Image | download |
12864_2016_2463_Article_IEq4.gif | 1KB | Image | download |
12864_2015_2296_Article_IEq158.gif | 1KB | Image | download |
12864_2015_2296_Article_IEq159.gif | 1KB | Image | download |
12864_2016_2912_Article_IEq3.gif | 1KB | Image | download |
12864_2016_2821_Article_IEq35.gif | 1KB | Image | download |
12864_2016_3477_Article_IEq2.gif | 1KB | Image | download |
12864_2017_3910_Article_IEq1.gif | 1KB | Image | download |
12864_2017_3527_Article_IEq1.gif | 1KB | Image | download |
12864_2017_3670_Article_IEq1.gif | 1KB | Image | download |
12888_2017_1504_Article_IEq1.gif | 1KB | Image | download |
12864_2016_3098_Article_IEq57.gif | 1KB | Image | download |
12864_2017_4274_Article_IEq10.gif | 1KB | Image | download |
12864_2017_3600_Article_IEq1.gif | 1KB | Image | download |
12864_2016_2796_Article_IEq9.gif | 1KB | Image | download |
12864_2015_2055_Article_IEq92.gif | 1KB | Image | download |
12864_2015_2055_Article_IEq94.gif | 1KB | Image | download |
12864_2016_3477_Article_IEq10.gif | 1KB | Image | download |
12864_2016_2821_Article_IEq47.gif | 1KB | Image | download |
12864_2016_2796_Article_IEq14.gif | 1KB | Image | download |
12864_2016_3477_Article_IEq11.gif | 1KB | Image | download |
12864_2017_4186_Article_IEq34.gif | 1KB | Image | download |
12864_2017_4186_Article_IEq21.gif | 1KB | Image | download |
12864_2017_4186_Article_IEq23.gif | 1KB | Image | download |
12864_2017_4186_Article_IEq25.gif | 1KB | Image | download |
12864_2017_4004_Article_IEq7.gif | 1KB | Image | download |
12864_2017_4186_Article_IEq26.gif | 1KB | Image | download |
【 图 表 】
12864_2017_4186_Article_IEq26.gif
12864_2017_4004_Article_IEq7.gif
12864_2017_4186_Article_IEq25.gif
12864_2017_4186_Article_IEq23.gif
12864_2017_4186_Article_IEq21.gif
12864_2017_4186_Article_IEq34.gif
12864_2016_3477_Article_IEq11.gif
12864_2016_2796_Article_IEq14.gif
12864_2016_2821_Article_IEq47.gif
12864_2016_3477_Article_IEq10.gif
12864_2015_2055_Article_IEq94.gif
12864_2015_2055_Article_IEq92.gif
12864_2016_2796_Article_IEq9.gif
12864_2017_3600_Article_IEq1.gif
12864_2017_4274_Article_IEq10.gif
12864_2016_3098_Article_IEq57.gif
12888_2017_1504_Article_IEq1.gif
12864_2017_3670_Article_IEq1.gif
12864_2017_3527_Article_IEq1.gif
12864_2017_3910_Article_IEq1.gif
12864_2016_3477_Article_IEq2.gif
12864_2016_2821_Article_IEq35.gif
12864_2016_2912_Article_IEq3.gif
12864_2015_2296_Article_IEq159.gif
12864_2015_2296_Article_IEq158.gif
12864_2016_2463_Article_IEq4.gif
12864_2017_4020_Article_IEq37.gif
12864_2017_4020_Article_IEq34.gif
12864_2016_2443_Article_IEq14.gif
12864_2016_2443_Article_IEq13.gif
12893_2017_312_Article_IEq1.gif
12864_2017_3604_Article_IEq5.gif
12864_2016_3263_Article_IEq16.gif
12864_2016_2789_Article_IEq52.gif
12864_2016_3263_Article_IEq13.gif
12864_2016_3263_Article_IEq11.gif
12864_2016_2798_Article_IEq6.gif
【 参考文献 】
- [1]
- [2]
- [3]
- [4]
- [5]
- [6]
- [7]
- [8]
- [9]
- [10]
- [11]
- [12]
- [13]
- [14]
- [15]
- [16]
- [17]
- [18]
- [19]
- [20]
- [21]
- [22]
- [23]
- [24]
- [25]
- [26]
- [27]
- [28]
- [29]
- [30]
- [31]
- [32]
- [33]
- [34]
- [35]
- [36]
- [37]
- [38]
- [39]
- [40]
- [41]
- [42]
- [43]
- [44]
- [45]
- [46]
- [47]
- [48]
- [49]
- [50]
- [51]
- [52]
- [53]
- [54]
- [55]
- [56]
- [57]
- [58]
- [59]
- [60]
- [61]
- [62]
- [63]
- [64]
- [65]
- [66]
- [67]
- [68]
- [69]
- [70]
- [71]
- [72]