Implementation of Privacy and Security for a Genomic Information System Based on Standards

被引:4
|
作者
Llorente, Silvia [1 ]
Delgado, Jaime [1 ]
机构
[1] Univ Politecn Catalunya BarcelonaTech, Informat Modeling & Proc IMP Grp, DMAG Distributed Multimedia Applicat Grp, Comp Architecture Dept, Barcelona 08034, Spain
来源
JOURNAL OF PERSONALIZED MEDICINE | 2022年 / 12卷 / 06期
关键词
genomics; privacy; security; modular architecture; GIPAMS; standards;
D O I
10.3390/jpm12060915
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Genomic information is a very sensitive type of digital information as it not only applies to a person, but also to close relatives. Therefore, privacy provision is key to protecting genomic information from unauthorized access. It is worth noting that most of the current genomic information formats do not provide specific mechanisms by which to secure the stored information. In order to solve, among other things, the privacy provision issue, we proposed the GIPAMS (Genomic Information Protection And Management System) modular architecture, which is based on the use of standards such as ISO/IEC 23092 and a few GA4GH (Global Alliance for Genomics and Health) initiatives. Some of the GIPAMS modules have already been implemented, mainly based on ISO/IEC 23092 features, and we are conducting work on the complete version of the architecture, and other standards are also considered. One of the objectives of GIPAMS is to enable the management of different formats of genomic information in a unique and interoperable way, providing privacy and security for formats that do not currently support them.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] Implementation of Privacy and Security for a Genomic Information System
    Delgado, Jaime
    Llorente, Silvia
    Reig, Guillem
    [J]. PHEALTH 2021, 2021, 285 : 253 - 258
  • [2] Adding Security and Privacy to Genomic Information Representation
    Delgado, Jaime
    Llorente, Silvia
    Naro, Daniel
    [J]. ICT FOR HEALTH SCIENCE RESEARCH, 2019, 258 : 75 - 79
  • [3] Managing information privacy - Developing a context for security and privacy standards convergence
    Robbins, Jim
    Sabo, John T.
    [J]. IEEE SECURITY & PRIVACY, 2006, 4 (04) : 92 - 95
  • [4] Information and communications security, privacy and trust: Standards and regulations
    Thuraisingham, Bhavani
    Gritzalis, Stefanos
    [J]. COMPUTER STANDARDS & INTERFACES, 2010, 32 (5-6) : 229 - 229
  • [5] Privacy of Patient Information Implementation and Security Analysis of a Secure Three Tier Patient Information System based on QR Code
    Panwar, Narendra
    Rauthan, Manmohan Singh
    Agarwal, Amit
    [J]. 2016 INTERNATIONAL CONFERENCE ON MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING (ICMETE), 2016, : 232 - 234
  • [6] Information security management system standards
    Edward Humphreys
    [J]. Datenschutz und Datensicherheit - DuD, 2011, 35 (1) : 7 - 11
  • [7] Implementation of security information system
    Cui, JS
    Li, TK
    [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVI, PROCEEDINGS: SYSTEMICS AND INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATION, 2003, : 42 - 47
  • [8] CONTROLS-BASED APPROACH FOR EVALUATION OF INFORMATION SECURITY STANDARDS IMPLEMENTATION COSTS
    Olifer, Dmitrij
    Goranin, Nikolaj
    Kaceniauskas, Arnas
    Cenys, Antanas
    [J]. TECHNOLOGICAL AND ECONOMIC DEVELOPMENT OF ECONOMY, 2017, 23 (01) : 196 - 219
  • [9] Security Privacy and Policy for Cryptographic Based Electronic Medical Information System
    Chen, Hsuan-Yu
    Wu, Zhen-Yu
    Chen, Tzer-Long
    Huang, Yao-Min
    Liu, Chia-Hui
    [J]. SENSORS, 2021, 21 (03) : 1 - 14
  • [10] DEVELOPING SECURITY PRIVACY PROGRAM IN INFORMATION SYSTEM
    Haryatno, Muhamad Afghany
    Putra, Yeffry Handoko
    [J]. JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2024, 19 (03): : 821 - 833