Feeds

Info-scrubbing algorithm unveiled to protect patient privacy

Medical data without the secrets

Next gen security for virtualised datacentres

US researchers have devised a novel way to protect the privacy of patients whose medical histories are included in public databases and electronic medial records, according to news reports.

The method, which was unveiled Monday by researchers from Vanderbilt University in Nashville, masks parts of a patient's records that aren't relevant to a particular inquiry. By generalizing vast amounts of clinical information, patients remain anonymous while still supplying researchers with data that's relevant to a specific project or topic.

The information-scrubbing algorithm has so far withstood simulated attempts to identify the individuals using data belonging to more than 2,600 patients. The mock hack assumed the would-be attackers knew the patient's identity and some or all of the patient's itemized medical history.

"There is definitely a need to de-identify individuals," Nils Homer of the University of California at Los Angeles, told Science News. He was part of a team that demonstrated two years ago that it was possible to trace a genetic signature back to the individual even when the patient's DNA profile was buried in a pool of thousands.

The finding prompted National Institutes of Health to restrict access to genetic databases.

The abstract to full article, Anonymization of electronic medical records for validating genome-wide association studies, is here. Additional coverage is here. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?