IDEAS home Printed from https://ideas.repec.org/a/gam/jijerp/v16y2019i9p1490-d226382.html
   My bibliography  Save this article

PAX: Using Pseudonymization and Anonymization to Protect Patients’ Identities and Data in the Healthcare System

Author

Listed:
  • Mishall Al-Zubaidie

    (Thi-Qar University, Nasiriyah 64001, Iraq
    Faculty of Health, Engineering and Sciences, University of Southern Queensland, Toowoomba, QLD 4350, Australia)

  • Zhongwei Zhang

    (Faculty of Health, Engineering and Sciences, University of Southern Queensland, Toowoomba, QLD 4350, Australia)

  • Ji Zhang

    (Faculty of Health, Engineering and Sciences, University of Southern Queensland, Toowoomba, QLD 4350, Australia)

Abstract

Electronic health record (EHR) systems are extremely useful for managing patients’ data and are widely disseminated in the health sector. The main problem with these systems is how to maintain the privacy of sensitive patient information. Due to not fully protecting the records from unauthorised users, EHR systems fail to provide privacy for protected health information. Weak security measures also allow authorised users to exceed their specific privileges to access medical records. Thus, some of the systems are not a trustworthy source and are undesirable for patients and healthcare providers. Therefore, an authorisation system that provides privacy when accessing patients’ data is required to address these security issues. Specifically, security and privacy precautions should be raised for specific categories of users, doctor advisors, physician researchers, emergency doctors, and patients’ relatives. Presently, these users can break into the electronic systems and even violate patients’ privacy because of the privileges granted to them or the inadequate security and privacy mechanisms of these systems. To address the security and privacy problems associated with specific users, we develop the Pseudonymization and Anonymization with the XACML (PAX) modular system, which depends on client and server applications. It provides a security solution to the privacy issues and the problem of safe-access decisions for patients’ data in the EHR. The results of theoretical and experimental security analysis prove that PAX provides security features in preserving the privacy of healthcare users and is safe against known attacks.

Suggested Citation

  • Mishall Al-Zubaidie & Zhongwei Zhang & Ji Zhang, 2019. "PAX: Using Pseudonymization and Anonymization to Protect Patients’ Identities and Data in the Healthcare System," IJERPH, MDPI, vol. 16(9), pages 1-36, April.
  • Handle: RePEc:gam:jijerp:v:16:y:2019:i:9:p:1490-:d:226382
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1660-4601/16/9/1490/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1660-4601/16/9/1490/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Waldemar W. Koczkodaj & Mirosław Mazurek & Dominik Strzałka & Alicja Wolny-Dominiak & Marc Woodbury-Smith, 2019. "Electronic Health Record Breaches as Social Indicators," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 141(2), pages 861-871, January.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Mishall Al-Zubaidie & Ghanima Sabr Shyaa, 2023. "Applying Detection Leakage on Hybrid Cryptography to Secure Transaction Information in E-Commerce Apps," Future Internet, MDPI, vol. 15(8), pages 1-20, August.
    2. Mahmoud Elkhodr & Ergun Gide & Omar Darwish & Shorouq Al-Eidi, 2023. "BioChainReward: A Secure and Incentivised Blockchain Framework for Biomedical Data Sharing," IJERPH, MDPI, vol. 20(19), pages 1-14, September.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Yujin Han & Yawei Zhang & Sten H. Vermund, 2022. "Blockchain Technology for Electronic Health Records," IJERPH, MDPI, vol. 19(23), pages 1-6, November.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jijerp:v:16:y:2019:i:9:p:1490-:d:226382. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.