{"title":"Evaluation of secure multi-party computation for reuse of distributed electronic health data","authors":"K. Y. Yigzaw, J. G. Bellika","doi":"10.1109/BHI.2014.6864343","DOIUrl":null,"url":null,"abstract":"There has been an increasing need for reuse of health data (i.e. research, quality assurance, public health, and commercial applications). However, privacy and legal issues have limited the reuse. Several privacy-preserving techniques (both centralized and distributed) have been developed to allow reuse of health data while preserving privacy. The distributed techniques enable institutions to jointly compute on their private data while preserving the privacy of their data. However, the centralize approach applies perturbation or anonymization technique on the private data before giving out the data for computation. This paper presents criteria, such as privacy level, linkability support, efficiency and scalability, to evaluate distributed privacy preserving techniques.","PeriodicalId":177948,"journal":{"name":"IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BHI.2014.6864343","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
There has been an increasing need for reuse of health data (i.e. research, quality assurance, public health, and commercial applications). However, privacy and legal issues have limited the reuse. Several privacy-preserving techniques (both centralized and distributed) have been developed to allow reuse of health data while preserving privacy. The distributed techniques enable institutions to jointly compute on their private data while preserving the privacy of their data. However, the centralize approach applies perturbation or anonymization technique on the private data before giving out the data for computation. This paper presents criteria, such as privacy level, linkability support, efficiency and scalability, to evaluate distributed privacy preserving techniques.