Cargando…

Generating unique IDs from patient identification data using security models

BACKGROUND: The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer a wealth of data to researchers. However, var...

Descripción completa

Detalles Bibliográficos
Autores principales: Mohammed, Emad A., Slack, Jonathan C., Naugler, Christopher T.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Medknow Publications & Media Pvt Ltd 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5248399/
https://www.ncbi.nlm.nih.gov/pubmed/28163977
http://dx.doi.org/10.4103/2153-3539.197203
_version_ 1782497258065887232
author Mohammed, Emad A.
Slack, Jonathan C.
Naugler, Christopher T.
author_facet Mohammed, Emad A.
Slack, Jonathan C.
Naugler, Christopher T.
author_sort Mohammed, Emad A.
collection PubMed
description BACKGROUND: The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer a wealth of data to researchers. However, various bioethical, financial, logistical, and information security considerations must be addressed while transitioning to an EHR system. The need to encrypt private patient information for data sharing is one of the foremost challenges faced by health information technology. METHOD: We describe the usage of the message digest-5 (MD5) and secure hashing algorithm (SHA) as methods for encrypting electronic medical data. In particular, we present an application of the MD5 and SHA-1 algorithms in encrypting a composite message from private patient information. RESULTS: The results show that the composite message can be used to create a unique one-way encrypted ID per patient record that can be used for data sharing. CONCLUSION: The described software tool can be used to share patient EMRs between practitioners without revealing patients identifiable data.
format Online
Article
Text
id pubmed-5248399
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher Medknow Publications & Media Pvt Ltd
record_format MEDLINE/PubMed
spelling pubmed-52483992017-02-03 Generating unique IDs from patient identification data using security models Mohammed, Emad A. Slack, Jonathan C. Naugler, Christopher T. J Pathol Inform Technical Note: Software BACKGROUND: The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer a wealth of data to researchers. However, various bioethical, financial, logistical, and information security considerations must be addressed while transitioning to an EHR system. The need to encrypt private patient information for data sharing is one of the foremost challenges faced by health information technology. METHOD: We describe the usage of the message digest-5 (MD5) and secure hashing algorithm (SHA) as methods for encrypting electronic medical data. In particular, we present an application of the MD5 and SHA-1 algorithms in encrypting a composite message from private patient information. RESULTS: The results show that the composite message can be used to create a unique one-way encrypted ID per patient record that can be used for data sharing. CONCLUSION: The described software tool can be used to share patient EMRs between practitioners without revealing patients identifiable data. Medknow Publications & Media Pvt Ltd 2016-12-30 /pmc/articles/PMC5248399/ /pubmed/28163977 http://dx.doi.org/10.4103/2153-3539.197203 Text en Copyright: © 2016 Journal of Pathology Informatics http://creativecommons.org/licenses/by-nc-sa/3.0 This is an open access article distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License, which allows others to remix, tweak, and build upon the work non-commercially, as long as the author is credited and the new creations are licensed under the identical terms.
spellingShingle Technical Note: Software
Mohammed, Emad A.
Slack, Jonathan C.
Naugler, Christopher T.
Generating unique IDs from patient identification data using security models
title Generating unique IDs from patient identification data using security models
title_full Generating unique IDs from patient identification data using security models
title_fullStr Generating unique IDs from patient identification data using security models
title_full_unstemmed Generating unique IDs from patient identification data using security models
title_short Generating unique IDs from patient identification data using security models
title_sort generating unique ids from patient identification data using security models
topic Technical Note: Software
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5248399/
https://www.ncbi.nlm.nih.gov/pubmed/28163977
http://dx.doi.org/10.4103/2153-3539.197203
work_keys_str_mv AT mohammedemada generatinguniqueidsfrompatientidentificationdatausingsecuritymodels
AT slackjonathanc generatinguniqueidsfrompatientidentificationdatausingsecuritymodels
AT nauglerchristophert generatinguniqueidsfrompatientidentificationdatausingsecuritymodels