New threats to health data privacy

被引:21
|
作者
Li, Fengjun [1 ]
Zou, Xukai [2 ]
Liu, Peng [3 ]
Chen, Jake Y. [2 ]
机构
[1] Univ Kansas, Dept EECS, Lawrence, KS 66045 USA
[2] IUPUI, Dept Comp & Informat Sci, Indianapolis, IN USA
[3] Penn State Univ, Coll IST, University Pk, PA 16802 USA
来源
BMC BIOINFORMATICS | 2011年 / 12卷
基金
美国国家科学基金会;
关键词
Social Network Site; User Profile; Online Social Network; External Knowledge; Online Source;
D O I
10.1186/1471-2105-12-S12-S7
中图分类号
Q5 [生物化学];
学科分类号
071010 ; 081704 ;
摘要
Background: Along with the rapid digitalization of health data (e. g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. Results: We study how patient privacy could be compromised with the help of today's information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. Conclusion: We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] New threats to health data privacy
    Fengjun Li
    Xukai Zou
    Peng Liu
    Jake Y Chen
    [J]. BMC Bioinformatics, 12
  • [2] Privacy threats of data retention in internet communications
    Kotzanikolaou, Panayiotis
    Douligeris, Christos
    [J]. 2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 3990 - 3993
  • [3] Privacy Threats When Seeking Online Health Information
    Huesch, Marco D.
    [J]. JAMA INTERNAL MEDICINE, 2013, 173 (19) : 1838 - 1839
  • [4] An Analysis of Requirements and Privacy Threats in Mobile Data Donations
    Reichert, Leonie
    Scheuermann, Bjoern
    [J]. 2023 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW, 2023, : 84 - 93
  • [5] Relative Privacy Threats and Learning From Anonymized Data
    Boreale, Michele
    Corradi, Fabio
    Viscardi, Cecilia
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1379 - 1393
  • [6] Threats to privacy
    Nesson, C
    [J]. SOCIAL RESEARCH, 2001, 68 (01): : 105 - 113
  • [7] A Case Study on Privacy Threats and Research Challenges in Privacy Preserving Data Analytics
    Rao, P. Ram Mohan
    Krishna, S. Murali
    Kumar, A. P. Siva
    [J]. 2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 185 - 188
  • [8] Social network data analysis to highlight privacy threats in sharing data
    Cerruto, Francesca
    Cirillo, Stefano
    Desiato, Domenico
    Gambardella, Simone Michele
    Polese, Giuseppe
    [J]. JOURNAL OF BIG DATA, 2022, 9 (01)
  • [9] Social network data analysis to highlight privacy threats in sharing data
    Francesca Cerruto
    Stefano Cirillo
    Domenico Desiato
    Simone Michele Gambardella
    Giuseppe Polese
    [J]. Journal of Big Data, 9
  • [10] Growing Security and Privacy Threats Inspire New Approaches
    Edwards, John
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2019, 36 (01) : 13 - 16