A Review: Security And Privacy In Healthcare Using Bigdata

K. Sumdeepthi

Abstract


The ever-increasing integration of highly diverse enabled data generating technologies in medical, biomedical and healthcare fields and the growing availability of data at the central location that can be used in need of any organization from pharmaceutical manufacturers to health insurance companies to hospitals have primarily make healthcare organizations and all its sub-sectors in face of a flood of big data as never before experienced. Biomedical research often involves studying patient data that contain personal information. Wrong utilization of these information may prompt spillage of touchy data, which can put tolerant protection in danger. The issue of protecting patient security has gotten expanding considerations in the period of enormous information. Numerous security strategies have been created to ensure against different assault models. This paper audits applicable subjects with regards to biomedical research. We talk about protection saving advancements identified with (1) recordlinkage, (2) engineered information age, and (3) genomic information security. We additionally examine the moral ramifications of huge information protection in biomedicine and present difficulties in future research bearings for enhancing information security in biomedical research. Enormous information investigation empowers look into associations to break down a blend of organized and unstructured information for recognizing important therapeutic data and bits of knowledge in social insurance related biomedical innovative work.


References


Burghard C: Big Data and Analytics Key to Accountable Care Success. IDC Health Insights; 2012.

Fernandes L, O’Connor M, Weaver V: Big data, bigger outcomes. J AHIMA 2012:38–42.

David Houlding, MSc, CISSP: « Health Information at Risk: Successful Strategies for Healthcare Security andPrivacy » Healthcare IT Program Of ce Intel Corporation, white paper 2011. 4. “UNC Health Care relies on analytics to better manage medical data and improve patient care.” IBM press release. October 11, 2013.

Indiana Health Information Exchange: http://www.ihie.org/ (Accessed Date: March 24, 2016).

Transforming Healthcare through Big Data, Strategies for leveraging big data in the health care industry. Institute for health- 2013.

The Big Data revolution in healthcare, accelerating value and innovation – Peter Groves, Basel Kayyali, David Knott , Steve Van Kuiken –2013

Sophia Genetics: « Product & Technology Overview » 2014

CynergisTek, Redspin : « BREACH REPORT 2016: Protected Health Information (PHI)» February 2017

Rui Zhangand Ling Liu: ’’ Security Models and Requirements for Healthcare Application Clouds’’ in IEEE 3rd International Conference on Cloud Computing, 2010

K. Benitez and B. Malin, “Evaluating re-identification risks with respect to the HIPAA privacy rule,” J. Am. Med. Informatics Assoc., vol. 17, no. 2, pp. 169–177, 2010.

P. Kwok, M. Davern, E. Hair, and D. Lafky, “Harder than you think: a case study of re-identification risk of HIPAAcompliant records,” Chicago NORC Univ. Chicago. Abstr., vol. 302255, 2011.

L. Sweeney, “Data sharing under HIPAA: 12 years later,” in Workshop on the HIPAA Privacy Rule’s De-Identification Standard, 2010.

S. J. Nass, L. A. Levit, and L. O. Gostin, Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research. The National Academies Press, 2009.

X. Jiang, A. D. Sarwate, and L. Ohno-Machado, “Privacy technology to support data sharing for comparative effectiveness research: a systematic review.,” Med. Care, vol. 51, no. 8 Suppl 3, pp. S58–65, Aug. 2013.

B. A. Bernhardt, E. S. Tambor, G. Fraser, L. S. Wissow, and G. Geller, “Parents’ and children's attitudes toward the enrollment of minors in genetic susceptibility research: implications for informed consent,” Am. J. Med. Genet. Part A, vol. 116, no. 4, pp. 315–323, 2003.

A. L. McGuire, J. M. Oliver, M. J. Slashinski, J. L. Graves, T. Wang, P. A. Kelly, W. Fisher, C. C. Lau, J. Goss, M. Okcu, and others, “To share or not to share: a randomized trial of consent for data sharing in genome research,” Genet. Med., vol. 13, no. 11, pp. 948–955, 2011.

J. M. Oliver, M. J. Slashinski, T. Wang, P. A. Kelly, S. G. Hilsenbeck, and A. L. McGuire, “Balancing the risks and benefits of genomic data sharing: genome research participants’ perspectives,” Public Health Genomics, vol. 15, no. 2, pp. 106–114, 2012.

L. Jamal, J. C. Sapp, K. Lewis, T. Yanes, F. M. Facio, L. G. Biesecker, and B. B. Biesecker, “Research participants’ attitudes towards the confidentiality of genomic sequence information,” Eur. J. Hum. Genet., vol. 22, no. 8, pp. 964–968, 2014.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.