By Topic

Pseudonmization techniques for clinical data: Privacy study in Sultan Ismail Hospital Johor Bahru

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Yahaya Abd. Rahim ; Faculty of Information and Communication Technology, Universiti Teknikal Malaysia Melaka (UTeM), Karung Berkunci 1752, Pejabat Pos Durian Tunggal, 76109 Durian Tunggal, Melaka, Malaysia ; Shahrin Sahib ; Mohd Khanapi Abd Ghani

Privacy includes the right of individuals and organizations to determine for themselves when, how and to what extent information about them is communicated to others. The growing need of managing large amounts of data in hospital or clinical raises important legal and ethical challenges. This paper introduces and show the testing implementation of the privacy-protection problems, and highlights the relevance of trusted third parties and of privacy-enhancing techniques (PETs) in the context of data collection, e.g., for research. Practical approache on the pseudonymization model for batch data collection are presented. The actual application of the described techniques today proves the possible benefits for medicine that innovative privacy-enhancing techniques can provide. Technical PET solutions can unlock valuable data sources, otherwise not available.

Published in:

Networked Computing (INC), 2011 The 7th International Conference on

Date of Conference:

26-28 Sept. 2011