메뉴 건너뛰기




Volumn 51, Issue 8 SUPPL.3, 2013, Pages

Privacy technology to support data sharing for comparative effectiveness research: A systematic review

Author keywords

comparative effectiveness research; data sharing; health privacy

Indexed keywords

ALGORITHM; ARTICLE; CLINICAL CLASSIFICATION; COMPARATIVE EFFECTIVENESS; CONCEPTUAL FRAMEWORK; CONTINGENCY TABLE; DATA MINING; DISEASE SURVEILLANCE; HUMAN; INFORMATION PROCESSING; MACHINE LEARNING; MEDICAL INFORMATION SYSTEM; NOISE; PRIORITY JOURNAL; PRIVACY; REPRODUCIBILITY; SYSTEMATIC REVIEW; WAVELET ANALYSIS;

EID: 84879881221     PISSN: 00257079     EISSN: 15371948     Source Type: Journal    
DOI: 10.1097/MLR.0b013e31829b1d10     Document Type: Article
Times cited : (25)

References (109)
  • 2
    • 84879885051 scopus 로고    scopus 로고
    • Standards for privacy of individually identifiable health information
    • Accessed February 20, 2012
    • Standards for privacy of individually identifiable health information. Final Rule, 45 CFR parts 160 and 164. Available at: http://www.hhs.gov/ocr/ privacy/hipaa/administrative/privacyrule/adminsimpregtext. pdf. Accessed February 20, 2012.
    • Final Rule, 45 CFR Parts 160 and 164
  • 3
    • 78650942280 scopus 로고    scopus 로고
    • Beyond safe harbor: Automatic discovery of health information de-identification policy alternatives
    • Paper presented
    • Benitez K, Loukides G, Malin BA. Beyond safe harbor: automatic discovery of health information de-identification policy alternatives. Paper presented at: The 1st ACM International Health Informatics Symposium, 2010.
    • (2010) 1st ACM International Health Informatics Symposium
    • Benitez, K.1    Loukides, G.2    Malin, B.A.3
  • 6
    • 33745647715 scopus 로고    scopus 로고
    • California HealthCare Foundation. Oakland, CA: California HealthCare Foundation
    • California HealthCare Foundation. National Consumer Health Privacy Survey. Oakland, CA: California HealthCare Foundation; 2005:1-5.
    • (2005) National Consumer Health Privacy Survey , pp. 1-5
  • 7
    • 84871866774 scopus 로고    scopus 로고
    • Building public trust in uses of Health Insurance Portability and Accountability Act de-identified data
    • McGraw D. Building public trust in uses of Health Insurance Portability and Accountability Act de-identified data. J Am Med Inform Assoc. 2012;20:29-34.
    • (2012) J Am Med Inform Assoc , vol.20 , pp. 29-34
    • McGraw, D.1
  • 8
    • 84869864446 scopus 로고    scopus 로고
    • Systematic reviews: CRD's guidance for undertaking reviews in health care
    • Tacconelli E. Systematic reviews: CRD's guidance for undertaking reviews in health care. Lancet Infect Dis. 2010;10:1-232.
    • (2010) Lancet Infect Dis , vol.10 , pp. 1-232
    • Tacconelli, E.1
  • 9
    • 84863552500 scopus 로고    scopus 로고
    • Strategies for maintaining patient privacy in i2b2
    • Murphy SN, Gainer V, Mendis M, et al. Strategies for maintaining patient privacy in i2b2. J Am Med Inform Assoc. 2011;18(suppl 1): 103-108.
    • (2011) J Am Med Inform Assoc , vol.18 , Issue.SUPPL. 1 , pp. 103-108
    • Murphy, S.N.1    Gainer, V.2    Mendis, M.3
  • 11
    • 29344461498 scopus 로고    scopus 로고
    • Confidentiality and confidence: Is data aggregation a means to achieve both?
    • DOI 10.1057/palgrave.jphp.3200029
    • Fefferman NH, O'Neil EA, Naumova EN. Confidentiality and confidence: is data aggregation a means to achieve both? J Public Health Policy. 2005;26:430-449. (Pubitemid 43003346)
    • (2005) Journal of Public Health Policy , vol.26 , Issue.4 , pp. 430-449
    • Fefferman, N.H.1    O'Neil, E.A.2    Naumova, E.N.3
  • 12
    • 84857264816 scopus 로고    scopus 로고
    • Data confidentiality: A review of methods for statistical disclosure limitation and methods for assessing privacy
    • Matthews GJ, Harel O. Data confidentiality: a review of methods for statistical disclosure limitation and methods for assessing privacy. Stat Surv. 2011;5:1-29.
    • (2011) Stat Surv , vol.5 , pp. 1-29
    • Matthews, G.J.1    Harel, O.2
  • 13
    • 78249243883 scopus 로고    scopus 로고
    • A survey on statistical disclosure control and micro-aggregation techniques for secure statistical databases
    • Fayyoumi E, Oommen BJ. A survey on statistical disclosure control and micro-aggregation techniques for secure statistical databases. Softw Pract Exper. 2010;40:1161-1188.
    • (2010) Softw Pract Exper , vol.40 , pp. 1161-1188
    • Fayyoumi, E.1    Oommen, B.J.2
  • 14
    • 3042715886 scopus 로고    scopus 로고
    • Protecting patient privacy by quantifiable control of disclosures in disseminated databases
    • DOI 10.1016/j.ijmedinf.2004.05.002, PII S1386505604000942
    • Ohno-Machado L, Silveira P, Vinterbo S. Protecting patient privacy by quantifiable control of disclosures in disseminated databases. Int J Med Inf. 2004;73:599-606. (Pubitemid 38891513)
    • (2004) International Journal of Medical Informatics , vol.73 , Issue.7-8 , pp. 599-606
    • Ohno-Machado, L.1    Silveira, P.S.P.2    Vinterbo, S.3
  • 15
    • 0033105319 scopus 로고    scopus 로고
    • Using Boolean reasoning to anonymize databases
    • DOI 10.1016/S0933-3657(98)00056-6, PII S0933365798000566
    • Ohrn A, Ohno-Machado L. Using Boolean reasoning to anonymize databases. Artif Intell Med. 1999;15:235-254. (Pubitemid 29136748)
    • (1999) Artificial Intelligence in Medicine , vol.15 , Issue.3 , pp. 235-254
    • Ohrn, A.1    Ohno-Machado, L.2
  • 17
    • 85206067367 scopus 로고    scopus 로고
    • Privacy-preserving data publishing
    • Fung BCM, Wang K, Chen R, et al. Privacy-preserving data publishing. ACM Comput Surv. 2010;42:1-53.
    • (2010) ACM Comput Surv , vol.42 , pp. 1-53
    • Bcm, F.1    Wang, K.2    Chen, R.3
  • 18
    • 70349305273 scopus 로고    scopus 로고
    • Differential privacy: A survey of results
    • Dwork C. Differential privacy: a survey of results. Theory Appl Models Comput. 2008;4978:1-19.
    • (2008) Theory Appl Models Comput , vol.4978 , pp. 1-19
    • Dwork, C.1
  • 19
    • 77951144748 scopus 로고    scopus 로고
    • A survey of quantification of privacy preserving data mining algorithms
    • Bertino E, Lin D, Jiang W. A survey of quantification of privacy preserving data mining algorithms. Privacy Preserving Data Mining. 2008;34:183-205.
    • (2008) Privacy Preserving Data Mining , vol.34 , pp. 183-205
    • Bertino, E.1    Lin, D.2    Jiang, W.3
  • 26
    • 84859258582 scopus 로고    scopus 로고
    • Minimizing minimality and maximizing utility: Analyzing method-based attacks on anonymized data
    • Cormode G, Srivastava D, Li N, et al. Minimizing minimality and maximizing utility: analyzing method-based attacks on anonymized data. Proc VLDB Endow. 2010;3:1045-1056.
    • (2010) Proc VLDB Endow , vol.3 , pp. 1045-1056
    • Cormode, G.1    Srivastava, D.2    Li, N.3
  • 29
    • 68549087035 scopus 로고    scopus 로고
    • Anonymization-based attacks in privacy-preserving data publishing
    • Wong RC-W, Fu AW-C, Wang K, et al. Anonymization-based attacks in privacy-preserving data publishing. ACM Trans Database Syst. 2009;34:1-46.
    • (2009) ACM Trans Database Syst , vol.34 , pp. 1-46
    • Rc-W, W.1    Aw-C, F.2    Wang, K.3
  • 30
    • 80052013720 scopus 로고    scopus 로고
    • Can the utility of anonymized data be used for privacy breaches?
    • Wong RC-W, Fu AW-C, Wang K, et al. Can the utility of anonymized data be used for privacy breaches? ACM Transact Knowl Discov Data (TKDD). 2011;5:1-24.
    • (2011) ACM Transact Knowl Discov Data (TKDD) , vol.5 , pp. 1-24
    • Rc-W, W.1    Aw-C, F.2    Wang, K.3
  • 34
    • 77951765129 scopus 로고    scopus 로고
    • D-presence without complete world knowledge
    • Nergiz ME, Clifton C. d-presence without complete world knowledge. IEEE Trans Knowl Data Eng. 2010;22:868-883.
    • (2010) IEEE Trans Knowl Data Eng , vol.22 , pp. 868-883
    • Nergiz, M.E.1    Clifton, C.2
  • 37
    • 26944448516 scopus 로고    scopus 로고
    • Ordinal, continuous and heterogeneous k-anonymity through microaggregation
    • DOI 10.1007/s10618-005-0007-5
    • Domingo-Ferrer J, Torra V. Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Data Mining Knowl Discov. 2005;11:195-212. (Pubitemid 41476765)
    • (2005) Data Mining and Knowledge Discovery , vol.11 , Issue.2 , pp. 195-212
    • Domingo-Ferrer, J.1    Torra, V.2
  • 41
    • 68649129111 scopus 로고    scopus 로고
    • A framework for efficient data anonymization under privacy and accuracy constraints
    • Ghinita G, Karras P, Kalnis P, et al. A framework for efficient data anonymization under privacy and accuracy constraints. ACM Trans Database Syst. 2009;34:1-47.
    • (2009) ACM Trans Database Syst , vol.34 , pp. 1-47
    • Ghinita, G.1    Karras, P.2    Kalnis, P.3
  • 43
    • 45749151381 scopus 로고    scopus 로고
    • Providing k-anonymity in data mining
    • Friedman A, Wolff R, Schuster A. Providing k-anonymity in data mining. VLDB J. 2007;17:789-804.
    • (2007) VLDB J , vol.17 , pp. 789-804
    • Friedman, A.1    Wolff, R.2    Schuster, A.3
  • 44
  • 45
    • 78649431051 scopus 로고    scopus 로고
    • Privacy-preserving OLAP an information-theoretic approach
    • Zhang N, Zhao W. Privacy-preserving OLAP: an information-theoretic approach. IEEE Trans knowl Data Eng. 2011;23:122-138.
    • (2011) IEEE Trans Knowl Data Eng , vol.23 , pp. 122-138
    • Zhang, N.1    Zhao, W.2
  • 47
    • 41849097852 scopus 로고    scopus 로고
    • Removes search data on vast group of web users
    • Hansell S. Removes search data on vast group of web users. New York Times. 2006;8:C4.
    • (2006) New York Times , vol.8
    • Hansell, S.1
  • 49
    • 49249103738 scopus 로고    scopus 로고
    • Protecting privacy using k-anonymity
    • El Emam K, Dankar FK. Protecting privacy using k-anonymity. J Am Med Inform Assoc. 2008;15:627-627.
    • (2008) J Am Med Inform Assoc , vol.15 , pp. 627-627
    • El Emam, K.1    Dankar, F.K.2
  • 50
    • 85206067367 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A survey of recent developments
    • Fung BCM, Wang K, Chen R, et al. Privacy-preserving data publishing: a survey of recent developments. ACM Comput Surv (CSUR). 2009;42:1-53.
    • (2009) ACM Comput Surv (CSUR) , vol.42 , pp. 1-53
    • Bcm, F.1    Wang, K.2    Chen, R.3
  • 51
    • 64549145427 scopus 로고    scopus 로고
    • Privacy-preserving data publishing for cluster analysis
    • Fung BCM, Wang K, Wang L, et al. Privacy-preserving data publishing for cluster analysis. Data Knowl Eng. 2009;68:552-575.
    • (2009) Data Knowl Eng , vol.68 , pp. 552-575
    • Bcm, F.1    Wang, K.2    Wang, L.3
  • 52
    • 69549114557 scopus 로고    scopus 로고
    • A globally optimal k-anonymity method for the de-identification of health data
    • El Emam K, Dankar FK, Issa R, et al. A globally optimal k-anonymity method for the de-identification of health data. J Am Med Inform Assoc. 2009;16:670-682.
    • (2009) J Am Med Inform Assoc , vol.16 , pp. 670-682
    • El Emam, K.1    Dankar, F.K.2    Issa, R.3
  • 53
    • 78149335185 scopus 로고    scopus 로고
    • Centralized and distributed anonymization for high-dimensional healthcare data
    • Mohammed N, Fung BCM, Hung PCK, et al. Centralized and distributed anonymization for high-dimensional healthcare data. ACM Trans Knowl Discov Data. 2010;4:18:11-18:33.
    • (2010) ACM Trans Knowl Discov Data , vol.4 , pp. 1811-1833
    • Mohammed, N.1    Bcm, F.2    Pck, H.3
  • 55
    • 25044433982 scopus 로고    scopus 로고
    • Effects of data anonymization by cell suppression on descriptive statistics and predictive modeling performance
    • Ohno-Machado L, Vinterbo S, Dreiseitl S. Effects of data anonymization by cell suppression on descriptive statistics and predictive modeling performance. J Am Med Inform Assoc. 2002;9:115S-119S.
    • (2002) J Am Med Inform Assoc , vol.9
    • Ohno-Machado, L.1    Vinterbo, S.2    Dreiseitl, S.3
  • 56
    • 0001582302 scopus 로고    scopus 로고
    • Post randomisation for statistical disclosure control: Theory and implementation
    • Gouweleeuw J, Kooiman P, Willenborg L, et al. Post randomisation for statistical disclosure control: theory and implementation. J Offical Stat. 1998;14:463-478.
    • (1998) J Offical Stat , vol.14 , pp. 463-478
    • Gouweleeuw, J.1    Kooiman, P.2    Willenborg, L.3
  • 58
    • 35448955720 scopus 로고    scopus 로고
    • Privacy, accuracy, and consistency too: A holistic solution to contingency table release
    • Paper presented Beijing
    • Barak B, Chaudhuri K, Dwork C, et al. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. Paper presented at: Principles of Database Systems (PODS), 2007, Beijing.
    • (2007) Principles of Database Systems (PODS)
    • Barak, B.1    Chaudhuri, K.2    Dwork, C.3
  • 59
    • 79959540412 scopus 로고    scopus 로고
    • Differential privacy via wavelet transforms
    • Xiao X, Wang G, Gehrke J. Differential privacy via wavelet transforms. IEEE Trans Knowl Data Eng. 2011;23:1200-1214.
    • (2011) IEEE Trans Knowl Data Eng , vol.23 , pp. 1200-1214
    • Xiao, X.1    Wang, G.2    Gehrke, J.3
  • 61
    • 78049357399 scopus 로고    scopus 로고
    • Secure multiparty computation for privacypreserving data mining
    • Lindell Y, Pinkas B. Secure multiparty computation for privacypreserving data mining. J Privacy Confidentiality. 2009;1:59-98.
    • (2009) J Privacy Confidentiality , vol.1 , pp. 59-98
    • Lindell, Y.1    Pinkas, B.2
  • 63
    • 38649100979 scopus 로고    scopus 로고
    • Privacy-preserving SVM classification
    • Vaidya J, Yu H, Jiang X, et al. Privacy-preserving SVM classification. Knowl Inf Syst. 2008;14:161-178.
    • (2008) Knowl Inf Syst , vol.14 , pp. 161-178
    • Vaidya, J.1    Yu, H.2    Jiang, X.3
  • 64
    • 84871482758 scopus 로고    scopus 로고
    • Grid LOgistic REgression (GLORE): Building shared models without sharing data
    • Wu Y, Jiang X, Kim J, et al. Grid LOgistic REgression (GLORE): building shared models without sharing data. J Am Med Inform Assoc. 2012;19:758-764.
    • (2012) J Am Med Inform Assoc , vol.19 , pp. 758-764
    • Wu, Y.1    Jiang, X.2    Kim, J.3
  • 67
    • 79958247462 scopus 로고    scopus 로고
    • A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
    • El Emam K, Hu J, Mercer J, et al. A secure protocol for protecting the identity of providers when disclosing data for disease surveillance. J Am Med Inform Assoc. 2011;18:212-212.
    • (2011) J Am Med Inform Assoc , vol.18 , pp. 212-212
    • El Emam, K.1    Hu, J.2    Mercer, J.3
  • 69
    • 42949124901 scopus 로고    scopus 로고
    • Privacy-preserving collaborative data mining
    • DOI 10.1109/MCI.2008.919071, 4490259
    • Zhan J. Privacy-preserving collaborative data mining. IEEE Comput Intell Mag. 2008;3:31-41. (Pubitemid 351606018)
    • (2008) IEEE Computational Intelligence Magazine , vol.3 , Issue.2 , pp. 31-41
    • Zhan, J.1
  • 74
    • 33746086554 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • Paper presented, New York, NY
    • Dwork C, McSherry F, Nissim K, et al. Calibrating noise to sensitivity in private data analysis. Paper presented at: Theory of Cryptography Conference (TCC), 2006, New York, NY.
    • (2006) Theory of Cryptography Conference (TCC)
    • Dwork, C.1    McSherry, F.2    Nissim, K.3
  • 77
    • 77956293777 scopus 로고    scopus 로고
    • Privacy integrated queries: An extensible platform for privacy-preserving data analysis
    • McSherry F. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. Commun ACM. 2010;53:89-89.
    • (2010) Commun ACM , vol.53 , pp. 89-89
    • McSherry, F.1
  • 81
    • 69949111709 scopus 로고    scopus 로고
    • (alpha k)-anonymous data publishing
    • Wong R, Li J, Fu A, et al. (alpha, k)-anonymous data publishing. J Intell Inf Syst. 2009;33:209-234.
    • (2009) J Intell Inf Syst , vol.33 , pp. 209-234
    • Wong, R.1    Li, J.2    Fu, A.3
  • 84
    • 71249104252 scopus 로고    scopus 로고
    • Generation of synthetic data by means of fuzzy c-Regression
    • Paper presented 2009
    • Cano I, Torra V. Generation of synthetic data by means of fuzzy c-Regression. Paper presented at: 2009 IEEE International Conference on Fuzzy Systems, 2009.
    • (2009) IEEE International Conference on Fuzzy Systems
    • Cano, I.1    Torra, V.2
  • 85
    • 78049302999 scopus 로고    scopus 로고
    • Hybrid microdata using microaggregation
    • Domingo-Ferrer J, González-Nicolás U. Hybrid microdata using microaggregation. Inf Sci. 2010;180:2834-2844.
    • (2010) Inf Sci , vol.180 , pp. 2834-2844
    • Domingo-Ferrer, J.1    González-Nicolás, U.2
  • 86
    • 78650518102 scopus 로고    scopus 로고
    • Boosting the accuracy of differentially private histograms through consistency
    • Hay M, Rastogi V, Miklau G, et al. Boosting the accuracy of differentially private histograms through consistency. VLDB Endow. 2010;3:1021-1032.
    • (2010) VLDB Endow , vol.3 , pp. 1021-1032
    • Hay, M.1    Rastogi, V.2    Miklau, G.3
  • 91
    • 77952555772 scopus 로고    scopus 로고
    • A statistical framework for differential privacy
    • Wasserman L, Zhou S. A statistical framework for differential privacy. J Am Stat Assoc. 2010;105:375-389.
    • (2010) J Am Stat Assoc , vol.105 , pp. 375-389
    • Wasserman, L.1    Zhou, S.2
  • 94
    • 67749118306 scopus 로고    scopus 로고
    • ANGEL: Enhancing the utility of generalization for privacy preserving publication
    • Tao Y, Chen H, Xiao X, et al. ANGEL: enhancing the utility of generalization for privacy preserving publication. IEEE Trans Knowl Data Eng. 2009;21:1073-1087.
    • (2009) IEEE Trans Knowl Data Eng , vol.21 , pp. 1073-1087
    • Tao, Y.1    Chen, H.2    Xiao, X.3
  • 98
    • 80051799598 scopus 로고    scopus 로고
    • An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers
    • Rebollo-Monedero D, Forné J, Soriano M. An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers. Data Knowl Eng. 2011;70: 892-921.
    • (2011) Data Knowl Eng , vol.70 , pp. 892-921
    • Rebollo-Monedero, D.1    Forné, J.2    Soriano, M.3
  • 99
    • 0034567068 scopus 로고    scopus 로고
    • Determining the identifiability of DNA database entries
    • Los Angeles, CA
    • Malin BA, Sweeney LA. Determining the identifiability of DNA database entries. Proceedings AMIA Symposium. 2000; Los Angeles, CA: 537-541.
    • (2000) Proceedings AMIA Symposium , pp. 537-541
    • Malin, B.A.1    Sweeney, L.A.2
  • 100
    • 11144348715 scopus 로고    scopus 로고
    • An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future
    • DOI 10.1197/jamia.M1603, PII S1067502704001549
    • Malin BA. An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future. J Am Med Inform Assoc. 2005;12:28-34. (Pubitemid 40038620)
    • (2005) Journal of the American Medical Informatics Association , vol.12 , Issue.1 , pp. 28-34
    • Malin, B.A.1
  • 101
    • 2942522665 scopus 로고    scopus 로고
    • How (not) to protect genomic data privacy in a distributed network: Using trail re-identification to evaluate and design anonymity protection systems
    • Malin BA, Sweeney LA. How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems. J Biomed Inform. 2004;37:179-192.
    • (2004) J Biomed Inform , vol.37 , pp. 179-192
    • Malin, B.A.1    Sweeney, L.A.2
  • 102
    • 80053335117 scopus 로고    scopus 로고
    • Identifiability in biobanks: Models, measures, and mitigation strategies
    • Malin BA, Loukides G, Benitez K, et al. Identifiability in biobanks: models, measures, and mitigation strategies. Hum Genet. 2011;130: 383-392.
    • (2011) Hum Genet , vol.130 , pp. 383-392
    • Malin, B.A.1    Loukides, G.2    Benitez, K.3
  • 103
    • 0036359620 scopus 로고    scopus 로고
    • Inferring genotype from clinical phenotype through a knowledge based algorithm
    • Singapore
    • Malin BA, Sweeney LA. Inferring genotype from clinical phenotype through a knowledge based algorithm. Pac Symp Biocomput. 2002; Singapore: 41-52.
    • (2002) Pac Symp Biocomput , pp. 41-52
    • Malin, B.A.1    Sweeney, L.A.2
  • 106
    • 34548497406 scopus 로고    scopus 로고
    • State-of-The-art Anonymization of Medical Records Using an Iterative Machine Learning Framework
    • DOI 10.1197/j.jamia.M2441, PII S1067502707001776
    • Szarvas G, Farkas R, Busa-Fekete R. State-of-the-art anonymization of medical records using an iterative machine learning framework. J Am Med Inform Assoc. 2007;14:574-580. (Pubitemid 47379570)
    • (2007) Journal of the American Medical Informatics Association , vol.14 , Issue.5 , pp. 574-580
    • Szarvas, G.1    Farkas, R.2    Busa-Fekete, R.3
  • 109
    • 84879888144 scopus 로고    scopus 로고
    • National Opinion Research Center, Accessed May 23, 2012
    • National Opinion Research Center. Available at: http://www.norc.org/ Pages/default.aspx. Accessed May 23, 2012.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.