Skip to main content
Log in

Embedding a Hiding Function in a Portable Electronic Health Record for Privacy Preservation

  • Original Paper
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

The objective of this study was to develop a method to hide information in a portable electronic health record (PEHR). In compliance with HIPAA guidelines, a hiding function for personal identifiers in a PEHR was implemented by recognizing and hiding techniques. The method emphasizes the feasibility of embedding a hiding function in a PEHR. The hiding function could be executed to hide identifiers in offline mode. The present study showed that embedding the hiding function in a PEHR is a practical way not only satisfies data confidentiability needs, but also meets patient’s personal privacy requirements. The effects of executing the hiding function would be the same as through de-identification or anonymization process.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Code of Federal Regulations (U.S.). Title 45(Part 164), (2002)

  2. Batami, B., Patient data confidentiality and patient rights. Int. J. Med. Inform. 62:141–49, 2001 doi:10.1016/S1386-5056(00)00135-0.

    Article  Google Scholar 

  3. Fowles, J. B., Kind, A. C., Craft, C., Kind, E. A., Mandel, J. L., and Adlis, S., Patients’ interest in reading their medical record: relation with clinical and sociodemographic characteristics and patients’ approach to health care. Arch. Intern. Med. 164:7793–800, 2004 doi:10.1001/archinte.164.7.793.

    Article  Google Scholar 

  4. Berman, J. J., Concept-match medical data scrubbing. How pathology text can be used in research. Arch. Pathol. Lab. Med. 127:6680–686, 2003.

    Google Scholar 

  5. Douglass, M., Clifford, G. D., Reisner, A., Moody, G. B., and Mark, R. G., Computer-assisted de-identification of free text in the MIMIC II database. Comput. Cardiol. 31:341–344, 2004 doi:10.1109/CIC.2004.1442942.

    Article  Google Scholar 

  6. Gupta, D., Saul, M., and Gilbertson, J., Evaluation of a deidentification (De-Id) software engine to share pathology reports and clinical documents for research. Am. J. Clin. Pathol. 121:2176–186, 2004 doi:10.1309/E6K33GBPE5C27FYU.

    Article  Google Scholar 

  7. Beckwith, B. A., Mahaadevan, R., Balis, U. J., and Kuo, F., Development and evaluation of an open source software tool for deidentification of pathology reports. BMC Med. Inform. Decis. Mak. 6:12, 2006 doi:10.1186/1472-6947-6-12.

    Article  Google Scholar 

  8. Szarvas, G., Farkas, R., and Busa-Fekete, R., State-of-the-art anonymization of medical records using an iterative machine learning framework. J. Am. Med. Inform. Assoc. 14:5574–580, 2007 doi:10.1197/j.jamia.M2441.

    Article  Google Scholar 

  9. Wellner, B., Huyck, M., Mardis, S., Aberdeen, J., Morgan, A., Peshkin, L., Yeh, A., Hitzeman, J., and Hirschman, L., Rapidly retargetable approaches to de-identification in medical records. J. Am. Med. Inform. Assoc. 14:5564–573, 2007 doi:10.1197/jamia.M2435.

    Article  Google Scholar 

  10. Uzuner, O., Luo, Y., and Szolovits, P., Evaluating the state-of-the-art in automatic de-identification. J. Am. Med. Inform. Assoc. 14:5550–563, 2007 doi:10.1197/jamia.M2444.

    Article  Google Scholar 

  11. Healthcare Information Technology Standards Panel: HITSP Anonymize Component Ver.2.1, 2007, Available from: http://www.hitsp.org/

  12. Weerasinghe, D., Rajarajan, M., Elmufti, K., and Rakocevic, V., Patient privacy protection using anonymous access control techniques. Methods Inf. Med. 47:3235–240, 2008.

    Google Scholar 

  13. Pommerening, K., and Reng, M., Secondary use of the electronic health record via pseudonymization. Stud. Health Technol. Inform. 103:441–446, 2004.

    Google Scholar 

  14. Noumeir, R., Lemay, A., and Lina, J. M., Pseudonymisation of radiology data for research purposes. J. Digit. Imaging. 20:3284–295, 2007 doi:10.1007/s10278-006-1051-4.

    Article  Google Scholar 

  15. Neubauer, T., and Riedl, B., Improving patients privacy with pseudonymization. Stud. Health Technol. Inform. 136:691–696, 2008.

    Google Scholar 

  16. Pommerening, K., Miller, M., Schmidtmann, I., and Michaelis, J., Pseudonyms for cancer registries. Methods Inf. Med. 35:2112–121, 1996.

    Google Scholar 

  17. Healthcare Information Technology Standards Panel: HITSP Pseudonymize Transaction. Ver.2.1, 2007, Available from: http://www.hitsp.org/

  18. IHE IT Infrastructure Technical Framework Supplement 2006-2007, Cross-Enterprise Document Media Interchange (XDM). Available from: http://www.ihe.net/Technical_Framework/

  19. Seitz, L., Pierson, J. M., and Brunie, L., Encrypted storage of medical data on a grid. Methods Inf. Med. 44:2198–201, 2005.

    Google Scholar 

  20. Pangalos, G., Mavridis, I., Ilioudis, C., and Georgiadis, C., Developing a public key infrastructure for a secure regional e-health environment. Methods Inf. Med. 41:5414–418, 2002.

    Google Scholar 

  21. Brandner, R., Van Der Haak, M., Hartmann, M., Haux, R., and Schmucker, P., Electronic signature for medical documents—integration and evaluation of a public key infrastructure in hospitals. Methods Inf. Med. 41:4321–330, 2002.

    Google Scholar 

  22. Gass, P., Walton, E., Winlow, R., Sagardoyburu, M., Stubbs, P., Kean, D., Tillin, M., Bourhill, G., Yabuta, K., and Takatani, T., Privacy LCD technology for cellular phones. Sharp Tech. J. 95:45–49, 2007.

    Google Scholar 

  23. Friedlin, F. J., and McDonald, C. J., A software tool for removing patient identifying information from clinical documents. J. Am. Med. Inform. Assoc. 15:5601–610, 2008 doi:10.1197/jamia.M2702.

    Article  Google Scholar 

  24. Neamatullah, I., Douglass, M. M., Lehman, L. W., Reisner, A., Villarroel, M., Long, W. J., Szolovits, P., Moody, G. B., Mark, R. G., and Clifford, G. D., Automated de-identification of free-text medical records. BMC Med. Inform. Decis. Mak. 8:32, 2008 doi:10.1186/1472-6947-8-32.

    Article  Google Scholar 

  25. Standard, A.I.I.M.: Implementation Guide for the Portable Document Format in Healthcare (PDF/H), AIIM, 2007; Available from : http://www.aiim.org/standards/article.aspx?ID=33284

  26. Standard, A.S.T.M.: E31.28, E2369-05 Standard Specification for Continuity of Care Record (CCR), ASTM International, West Conshohocken, PA, USA, http://www.astm.org, 2005.

  27. Dorr, D. A., Phillips, W. F., Phansalkar, S., Sims, S. A., and Hurdle, J. F., Assessing the difficulty and time cost of de-identification in clinical narratives. Methods Inf. Med. 45:3246–252, 2006.

    Google Scholar 

Download references

Acknowledgements

This work was supported by a grant from the National Science Council, Taiwan (NSC 95-2221-E010-003).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tsair Kao.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Huang, LC., Chu, HC., Lien, CY. et al. Embedding a Hiding Function in a Portable Electronic Health Record for Privacy Preservation. J Med Syst 34, 313–320 (2010). https://doi.org/10.1007/s10916-008-9243-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10916-008-9243-8

Keywords

Navigation