New threats to health data privacy

被引:21
|
作者
Li, Fengjun [1 ]
Zou, Xukai [2 ]
Liu, Peng [3 ]
Chen, Jake Y. [2 ]
机构
[1] Univ Kansas, Dept EECS, Lawrence, KS 66045 USA
[2] IUPUI, Dept Comp & Informat Sci, Indianapolis, IN USA
[3] Penn State Univ, Coll IST, University Pk, PA 16802 USA
来源
BMC BIOINFORMATICS | 2011年 / 12卷
基金
美国国家科学基金会;
关键词
Social Network Site; User Profile; Online Social Network; External Knowledge; Online Source;
D O I
10.1186/1471-2105-12-S12-S7
中图分类号
Q5 [生物化学];
学科分类号
071010 ; 081704 ;
摘要
Background: Along with the rapid digitalization of health data (e. g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. Results: We study how patient privacy could be compromised with the help of today's information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. Conclusion: We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] New technology for early detection of health threats
    Southern, Sarka O.
    Lilienthal, Gerald W.
    [J]. OPTICS AND PHOTONICS IN GLOBAL HOMELAND SECURITY IV, 2008, 6945
  • [42] The new health threats of exotic and global travel
    Coltart, Cordelia E. M.
    Behrens, Ron H.
    [J]. BRITISH JOURNAL OF GENERAL PRACTICE, 2012, 62 (603): : 512 - 513
  • [43] Threats to Global Health and Opportunities for Change: A New Global Health
    Laaser, Ulrich
    Epstein, Leon
    [J]. PUBLIC HEALTH REVIEWS, 2010, 32 (01) : 54 - 89
  • [44] Undermining data privacy in health information - New powers to control patient information contribute nothing to health
    Anderson, R
    [J]. BRITISH MEDICAL JOURNAL, 2001, 322 (7284): : 442 - 443
  • [45] Protecting privacy and promoting learning: blockchain and privacy preserving technology should inform new ethical guidelines for health data
    Gross, Marielle
    Miller, Robert C.
    [J]. HEALTH AND TECHNOLOGY, 2021, 11 (05) : 1165 - 1169
  • [46] Privacy threats and issues in mobile RFID
    Lee, Hyangjin
    Kim, Jeeyeon
    [J]. First International Conference on Availability, Reliability and Security, Proceedings, 2006, : 510 - 514
  • [47] Protecting privacy and promoting learning: blockchain and privacy preserving technology should inform new ethical guidelines for health data
    Marielle Gross
    Robert C. Miller
    [J]. Health and Technology, 2021, 11 : 1165 - 1169
  • [48] Privacy: Personal information, threats, and technologies
    Beckwith, R
    Mainwaring, S
    [J]. 2005 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGY AND SOCIETY (ISTAS), PROCEEDINGS: WEAPONS AND WIRES: PREVENTION AND SAFETY IN A TIME OF FEAR, 2005, : 9 - 16
  • [49] A Taxonomy of IoT: Security and Privacy Threats
    Alsamani, Badr
    Lahza, Husam
    [J]. CONFERENCE PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT), 2018, : 72 - 77
  • [50] Security and privacy threats to volunteer computing
    Abawajy, J. H.
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2008, 4 (03) : 245 - 255