No Silver Bullet: Identifying Security Vulnerabilities in Anonymization Protocols for Hospital Databases

被引:2
|
作者
Zhang, Nan [1 ]
O'Neill, Liam [2 ]
Das, Gautam [3 ]
Cheng, Xiuzhen [1 ]
Huang, Heng [3 ]
机构
[1] George Washington Univ, Dept Comp Sci, Washington, DC 20052 USA
[2] Univ North Texas, Hlth Sci Ctr, Sch Publ Hlth, Ft Worth, TX 76107 USA
[3] Univ Texas Arlington, Dept Comp Sci & Engn, Arlington, TX 76019 USA
关键词
Data Analytic Processing; Data Privacy; Diagnosis Related Group (DRG); Health Insurance Portability and Accountability Act (HIPAA); Re-Identification;
D O I
10.4018/jhisi.2012100104
中图分类号
R-058 [];
学科分类号
摘要
In accordance with HIPAA regulations, patients' personal information is typically removed or generalized prior to being released as public data files. However, it is not known if the standard method of de-identification is sufficient to prevent re-identification by an intruder. The authors conducted analytical processing to identify security vulnerabilities in the protocols to de-identify hospital data. Their techniques for discovering privacy leakage utilized three disclosure channels: (1) data inter-dependency, (2) biomedical domain knowledge, and (3) suppression algorithms and partial suppression results. One state's inpatient discharge data set was used to represent the current practice of de-identification of health care data, where a systematic approach had been employed to suppress certain elements of the patient's record. Of the 1,098 records for which the hospital ID was suppressed, the original hospital ID was recovered for 616 records, leading to a nullification rate of 56.1%. Utilizing domain knowledge based on the patient's Diagnosis Related Group (DRG) code, the authors recovered the real age of 64 patients, the gender of 83 male patients and 713 female patients. They also successfully identified the ZIP code of 1,219 patients. The procedure used to de-identify hospital records was found to be inadequate to prevent disclosure of patient information. As the masking procedure described was found to be reversible, this increases the risk that an intruder could use this information to re-identify individual patients.
引用
收藏
页码:48 / 58
页数:11
相关论文
共 31 条
  • [1] IoT Security: A review of vulnerabilities and security protocols
    Varma, Ravi Kiran P.
    Priyanka, M.
    Krishna, Vamsi B. S.
    Raju, Subba K., V
    [J]. JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (02): : 509 - 520
  • [2] IoT Networks: Security Vulnerabilities of Application Layer Protocols
    Lalit, Mohit
    Chawla, Sunil Kumar
    Rana, Arun Kumar
    Nisar, Kashif
    Soomro, Tariq Rahim
    Khan, Muhammad Asghar
    [J]. 2022 14TH INTERNATIONAL CONFERENCE ON MATHEMATICS, ACTUARIAL SCIENCE, COMPUTER SCIENCE AND STATISTICS (MACS), 2022,
  • [3] Survey of Security Protocols and Vulnerabilities in Unmanned Aerial Vehicles
    Shafique, Arslan
    Mehmood, Abid
    Elhadef, Mourad
    [J]. IEEE ACCESS, 2021, 9 : 46927 - 46948
  • [4] A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks
    Laibinis, Linas
    Troubitsyna, Elena
    Pereverzeva, Inna
    Oliver, Ian
    Holtmanns, Silke
    [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2016, 2016, 10009 : 141 - 158
  • [5] Identifying Security Vulnerabilities of Weakly Detectable Network Parameter Errors
    Lin, Yuzhang
    Abur, Ali
    [J]. 2017 55TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2017, : 295 - 301
  • [6] Identifying and Measuring Security Critical Path for Uncovering Circuit Vulnerabilities
    Hu, Wei
    Ardeshiricham, Armaiti
    Kastner, Ryan
    [J]. 2017 18TH INTERNATIONAL WORKSHOP ON MICROPROCESSOR AND SOC TEST, SECURITY AND VERIFICATION (MTV 2017), 2017, : 62 - 67
  • [7] The silver bullet: Protecting privacy and security through law and technology
    Rosen, Jeffrey
    [J]. PROCEEDINGS OF THE AMERICAN PHILOSOPHICAL SOCIETY, 2007, 151 (03) : 291 - 299
  • [8] Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols
    Cao, Zhen
    Guan, Zhi
    Chen, Zhong
    Hu, Jian-Bin
    Tang, Li-Yong
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (02) : 375 - 387
  • [9] Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols
    Zhen Cao
    Zhi Guan
    Zhong Chen
    Jian-Bin Hu
    Li-Yong Tang
    [J]. Journal of Computer Science and Technology, 2010, 25 : 375 - 387
  • [10] Internet of Things Protocols Comparison, Architecture, Vulnerabilities and Security: State of the art
    Chahid, Yassine
    Benabdellah, Mohamed
    Azizi, Abdelmalek
    [J]. ICCWCS'17: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND WIRELESS COMMUNICATION SYSTEMS, 2017,