Cargando…

Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation

BACKGROUND: Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results. However, duplicate records in a distributed dataset may lead to incorrect statistical results. Therefore, to increase the accuracy of the sta...

Descripción completa

Detalles Bibliográficos
Autores principales: Yigzaw, Kassaye Yitbarek, Michalas, Antonis, Bellika, Johan Gustav
Formato: Online Artículo Texto
Lenguaje:English
Publicado: BioMed Central 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5209873/
https://www.ncbi.nlm.nih.gov/pubmed/28049465
http://dx.doi.org/10.1186/s12911-016-0389-x
Descripción
Sumario:BACKGROUND: Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results. However, duplicate records in a distributed dataset may lead to incorrect statistical results. Therefore, to increase the accuracy of the statistical analysis of a distributed dataset, secure deduplication is an important preprocessing step. METHODS: We designed a secure protocol for the deduplication of horizontally partitioned datasets with deterministic record linkage algorithms. We provided a formal security analysis of the protocol in the presence of semi-honest adversaries. The protocol was implemented and deployed across three microbiology laboratories located in Norway, and we ran experiments on the datasets in which the number of records for each laboratory varied. Experiments were also performed on simulated microbiology datasets and data custodians connected through a local area network. RESULTS: The security analysis demonstrated that the protocol protects the privacy of individuals and data custodians under a semi-honest adversarial model. More precisely, the protocol remains secure with the collusion of up to N − 2 corrupt data custodians. The total runtime for the protocol scales linearly with the addition of data custodians and records. One million simulated records distributed across 20 data custodians were deduplicated within 45 s. The experimental results showed that the protocol is more efficient and scalable than previous protocols for the same problem. CONCLUSIONS: The proposed deduplication protocol is efficient and scalable for practical uses while protecting the privacy of patients and data custodians. ELECTRONIC SUPPLEMENTARY MATERIAL: The online version of this article (doi:10.1186/s12911-016-0389-x) contains supplementary material, which is available to authorized users.