Evaluation of Secure Computation in a Distributed Healthcare Setting

Stud Health Technol Inform. 2016:228:152-6.

Abstract

Issues related to ensuring patient privacy and data ownership in clinical repositories prevent the growth of translational research. Previous studies have used an aggregator agent to obscure clinical repositories from the data user, and to ensure the privacy of output using statistical disclosure control. However, there remain several issues that must be considered. One such issue is that a data breach may occur when multiple nodes conspire. Another is that the agent may eavesdrop on or leak a user's queries and their results. We have implemented a secure computing method so that the data used by each party can be kept confidential even if all of the other parties conspire to crack the data. We deployed our implementation at three geographically distributed nodes connected to a high-speed layer two network. The performance of our method, with respect to processing times, suggests suitability for practical use.

MeSH terms

  • Computer Security / standards*
  • Confidentiality / standards*
  • Health Information Exchange / standards*
  • Humans
  • Software Design