Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2020 Jun;6(2):296-308.
doi: 10.1109/TBDATA.2016.2608848. Epub 2016 Sep 13.

Big Data Privacy in Biomedical Research

Affiliations

Big Data Privacy in Biomedical Research

Shuang Wang et al. IEEE Trans Big Data. 2020 Jun.

Abstract

Biomedical research often involves studying patient data that contain personal information. Inappropriate use of these data might lead to leakage of sensitive information, which can put patient privacy at risk. The problem of preserving patient privacy has received increasing attentions in the era of big data. Many privacy methods have been developed to protect against various attack models. This paper reviews relevant topics in the context of biomedical research. We discuss privacy preserving technologies related to (1) record linkage, (2) synthetic data generation, and (3) genomic data privacy. We also discuss the ethical implications of big data privacy in biomedicine and present challenges in future research directions for improving data privacy in biomedical research.

Keywords: Biomedical research; bioethics; data privacy; data security; genome analysis.

PubMed Disclaimer

Figures

Figure 1
Figure 1
Illustrative diagram of Homomorpic encryption, which allows computation over encrypted data with encrypted output.

References

    1. Health Information Technology for Economic and Clinical Health. 2010.
    1. Slaughter L. Genetic Information Nondiscrimination Act of 2008. 2008;50:41. HeinOnline.
    1. Health Insurance Portability and Accountability Act (HIPAA) [Online]. Available: http://www.hhs.gov/ocr/hipaa.
    1. Lafky D. The Safe Harbor method of de-identification: An empirical test. Fourth Natl. HIPAA Summit West. 2010
    1. McGraw D. [Accessed: 20-Sep-2015];Why the HIPAA privacy rules would not adequately protect personal health records: Center for Democracy and Technology (CDT) brief. 2008 [Online]. Available: http://www.cdt.org/brief/why-hipaa-privacy-rules-would-not-adequately-pr....

LinkOut - more resources