期刊论文详细信息
BMC Medical Informatics and Decision Making
Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation
Technical Advance
Kassaye Yitbarek Yigzaw1  Antonis Michalas2  Johan Gustav Bellika3 
[1] Department of Computer Science, UiT The Arctic University of Norway, 9037, Tromsø, Norway;Norwegian Centre for E-health Research, University Hospital of North Norway, 9019, Tromsø, Norway;Department of Computer Science, University of Westminster, 115 New Cavendish Street, W1W 6UW, London, UK;Norwegian Centre for E-health Research, University Hospital of North Norway, 9019, Tromsø, Norway;Department of Clinical Medicine, UiT The Arctic University of Norway, 9037, Tromsø, Norway;
关键词: Bloom Filter;    Data Reuse;    Deduplication;    Distributed Statistical Computation;    Data Linkage;    Duplicate Record;    Electronic Health Record;    Privacy;    Record Linkage;    Set Intersection;   
DOI  :  10.1186/s12911-016-0389-x
 received in 2016-07-27, accepted in 2016-11-10,  发布年份 2017
来源: Springer
PDF
【 摘 要 】

BackgroundTechniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results. However, duplicate records in a distributed dataset may lead to incorrect statistical results. Therefore, to increase the accuracy of the statistical analysis of a distributed dataset, secure deduplication is an important preprocessing step.MethodsWe designed a secure protocol for the deduplication of horizontally partitioned datasets with deterministic record linkage algorithms. We provided a formal security analysis of the protocol in the presence of semi-honest adversaries. The protocol was implemented and deployed across three microbiology laboratories located in Norway, and we ran experiments on the datasets in which the number of records for each laboratory varied. Experiments were also performed on simulated microbiology datasets and data custodians connected through a local area network.ResultsThe security analysis demonstrated that the protocol protects the privacy of individuals and data custodians under a semi-honest adversarial model. More precisely, the protocol remains secure with the collusion of up to N − 2 corrupt data custodians. The total runtime for the protocol scales linearly with the addition of data custodians and records. One million simulated records distributed across 20 data custodians were deduplicated within 45 s. The experimental results showed that the protocol is more efficient and scalable than previous protocols for the same problem.ConclusionsThe proposed deduplication protocol is efficient and scalable for practical uses while protecting the privacy of patients and data custodians.

【 授权许可】

CC BY   
© The Author(s). 2016

【 预 览 】
附件列表
Files Size Format View
RO202311099965822ZK.pdf 1775KB PDF download
12864_2016_2798_Article_IEq6.gif 1KB Image download
12864_2016_3263_Article_IEq11.gif 1KB Image download
12864_2016_3263_Article_IEq13.gif 1KB Image download
12864_2016_2789_Article_IEq52.gif 1KB Image download
12864_2016_3263_Article_IEq16.gif 1KB Image download
12864_2017_3604_Article_IEq5.gif 1KB Image download
12893_2017_312_Article_IEq1.gif 1KB Image download
12864_2016_2443_Article_IEq13.gif 1KB Image download
12864_2016_2443_Article_IEq14.gif 1KB Image download
12864_2017_4020_Article_IEq34.gif 1KB Image download
12864_2017_4020_Article_IEq37.gif 1KB Image download
12864_2016_2463_Article_IEq4.gif 1KB Image download
12864_2015_2296_Article_IEq158.gif 1KB Image download
12864_2015_2296_Article_IEq159.gif 1KB Image download
12864_2016_2912_Article_IEq3.gif 1KB Image download
12864_2016_2821_Article_IEq35.gif 1KB Image download
12864_2016_3477_Article_IEq2.gif 1KB Image download
12864_2017_3910_Article_IEq1.gif 1KB Image download
12864_2017_3527_Article_IEq1.gif 1KB Image download
12864_2017_3670_Article_IEq1.gif 1KB Image download
12888_2017_1504_Article_IEq1.gif 1KB Image download
12864_2016_3098_Article_IEq57.gif 1KB Image download
12864_2017_4274_Article_IEq10.gif 1KB Image download
12864_2017_3600_Article_IEq1.gif 1KB Image download
12864_2016_2796_Article_IEq9.gif 1KB Image download
12864_2015_2055_Article_IEq92.gif 1KB Image download
12864_2015_2055_Article_IEq94.gif 1KB Image download
12864_2016_3477_Article_IEq10.gif 1KB Image download
12864_2016_2821_Article_IEq47.gif 1KB Image download
12864_2016_2796_Article_IEq14.gif 1KB Image download
12864_2016_3477_Article_IEq11.gif 1KB Image download
12864_2017_4186_Article_IEq34.gif 1KB Image download
12864_2017_4186_Article_IEq21.gif 1KB Image download
12864_2017_4186_Article_IEq23.gif 1KB Image download
12864_2017_4186_Article_IEq25.gif 1KB Image download
12864_2017_4004_Article_IEq7.gif 1KB Image download
12864_2017_4186_Article_IEq26.gif 1KB Image download
【 图 表 】

12864_2017_4186_Article_IEq26.gif

12864_2017_4004_Article_IEq7.gif

12864_2017_4186_Article_IEq25.gif

12864_2017_4186_Article_IEq23.gif

12864_2017_4186_Article_IEq21.gif

12864_2017_4186_Article_IEq34.gif

12864_2016_3477_Article_IEq11.gif

12864_2016_2796_Article_IEq14.gif

12864_2016_2821_Article_IEq47.gif

12864_2016_3477_Article_IEq10.gif

12864_2015_2055_Article_IEq94.gif

12864_2015_2055_Article_IEq92.gif

12864_2016_2796_Article_IEq9.gif

12864_2017_3600_Article_IEq1.gif

12864_2017_4274_Article_IEq10.gif

12864_2016_3098_Article_IEq57.gif

12888_2017_1504_Article_IEq1.gif

12864_2017_3670_Article_IEq1.gif

12864_2017_3527_Article_IEq1.gif

12864_2017_3910_Article_IEq1.gif

12864_2016_3477_Article_IEq2.gif

12864_2016_2821_Article_IEq35.gif

12864_2016_2912_Article_IEq3.gif

12864_2015_2296_Article_IEq159.gif

12864_2015_2296_Article_IEq158.gif

12864_2016_2463_Article_IEq4.gif

12864_2017_4020_Article_IEq37.gif

12864_2017_4020_Article_IEq34.gif

12864_2016_2443_Article_IEq14.gif

12864_2016_2443_Article_IEq13.gif

12893_2017_312_Article_IEq1.gif

12864_2017_3604_Article_IEq5.gif

12864_2016_3263_Article_IEq16.gif

12864_2016_2789_Article_IEq52.gif

12864_2016_3263_Article_IEq13.gif

12864_2016_3263_Article_IEq11.gif

12864_2016_2798_Article_IEq6.gif

【 参考文献 】
  • [1]
  • [2]
  • [3]
  • [4]
  • [5]
  • [6]
  • [7]
  • [8]
  • [9]
  • [10]
  • [11]
  • [12]
  • [13]
  • [14]
  • [15]
  • [16]
  • [17]
  • [18]
  • [19]
  • [20]
  • [21]
  • [22]
  • [23]
  • [24]
  • [25]
  • [26]
  • [27]
  • [28]
  • [29]
  • [30]
  • [31]
  • [32]
  • [33]
  • [34]
  • [35]
  • [36]
  • [37]
  • [38]
  • [39]
  • [40]
  • [41]
  • [42]
  • [43]
  • [44]
  • [45]
  • [46]
  • [47]
  • [48]
  • [49]
  • [50]
  • [51]
  • [52]
  • [53]
  • [54]
  • [55]
  • [56]
  • [57]
  • [58]
  • [59]
  • [60]
  • [61]
  • [62]
  • [63]
  • [64]
  • [65]
  • [66]
  • [67]
  • [68]
  • [69]
  • [70]
  • [71]
  • [72]
  文献评价指标  
  下载次数:2次 浏览次数:4次