36 resultados para privacy preserving
Resumo:
Equipped with state-of-the-art smartphones and mobile devices, today's highly interconnected urban population is increasingly dependent on these gadgets to organize and plan their daily lives. These applications often rely on current (or preferred) locations of individual users or a group of users to provide the desired service, which jeopardizes their privacy; users do not necessarily want to reveal their current (or preferred) locations to the service provider or to other, possibly untrusted, users. In this paper, we propose privacy-preserving algorithms for determining an optimal meeting location for a group of users. We perform a thorough privacy evaluation by formally quantifying privacy-loss of the proposed approaches. In order to study the performance of our algorithms in a real deployment, we implement and test their execution efficiency on Nokia smartphones. By means of a targeted user-study, we attempt to get an insight into the privacy-awareness of users in location-based services and the usability of the proposed solutions.
Resumo:
BACKGROUND Record linkage of existing individual health care data is an efficient way to answer important epidemiological research questions. Reuse of individual health-related data faces several problems: Either a unique personal identifier, like social security number, is not available or non-unique person identifiable information, like names, are privacy protected and cannot be accessed. A solution to protect privacy in probabilistic record linkages is to encrypt these sensitive information. Unfortunately, encrypted hash codes of two names differ completely if the plain names differ only by a single character. Therefore, standard encryption methods cannot be applied. To overcome these challenges, we developed the Privacy Preserving Probabilistic Record Linkage (P3RL) method. METHODS In this Privacy Preserving Probabilistic Record Linkage method we apply a three-party protocol, with two sites collecting individual data and an independent trusted linkage center as the third partner. Our method consists of three main steps: pre-processing, encryption and probabilistic record linkage. Data pre-processing and encryption are done at the sites by local personnel. To guarantee similar quality and format of variables and identical encryption procedure at each site, the linkage center generates semi-automated pre-processing and encryption templates. To retrieve information (i.e. data structure) for the creation of templates without ever accessing plain person identifiable information, we introduced a novel method of data masking. Sensitive string variables are encrypted using Bloom filters, which enables calculation of similarity coefficients. For date variables, we developed special encryption procedures to handle the most common date errors. The linkage center performs probabilistic record linkage with encrypted person identifiable information and plain non-sensitive variables. RESULTS In this paper we describe step by step how to link existing health-related data using encryption methods to preserve privacy of persons in the study. CONCLUSION Privacy Preserving Probabilistic Record linkage expands record linkage facilities in settings where a unique identifier is unavailable and/or regulations restrict access to the non-unique person identifiable information needed to link existing health-related data sets. Automated pre-processing and encryption fully protect sensitive information ensuring participant confidentiality. This method is suitable not just for epidemiological research but also for any setting with similar challenges.
Resumo:
PURPOSE The implementation of genomic-based medicine is hindered by unresolved questions regarding data privacy and delivery of interpreted results to health-care practitioners. We used DNA-based prediction of HIV-related outcomes as a model to explore critical issues in clinical genomics. METHODS We genotyped 4,149 markers in HIV-positive individuals. Variants allowed for prediction of 17 traits relevant to HIV medical care, inference of patient ancestry, and imputation of human leukocyte antigen (HLA) types. Genetic data were processed under a privacy-preserving framework using homomorphic encryption, and clinical reports describing potentially actionable results were delivered to health-care providers. RESULTS A total of 230 patients were included in the study. We demonstrated the feasibility of encrypting a large number of genetic markers, inferring patient ancestry, computing monogenic and polygenic trait risks, and reporting results under privacy-preserving conditions. The average execution time of a multimarker test on encrypted data was 865 ms on a standard computer. The proportion of tests returning potentially actionable genetic results ranged from 0 to 54%. CONCLUSIONS The model of implementation presented herein informs on strategies to deliver genomic test results for clinical care. Data encryption to ensure privacy helps to build patient trust, a key requirement on the road to genomic-based medicine.Genet Med advance online publication 14 January 2016Genetics in Medicine (2016); doi:10.1038/gim.2015.167.
Resumo:
This paper presents an overview of the Mobile Data Challenge (MDC), a large-scale research initiative aimed at generating innovations around smartphone-based research, as well as community-based evaluation of mobile data analysis methodologies. First, we review the Lausanne Data Collection Campaign (LDCC), an initiative to collect unique longitudinal smartphone dataset for the MDC. Then, we introduce the Open and Dedicated Tracks of the MDC, describe the specific datasets used in each of them, discuss the key design and implementation aspects introduced in order to generate privacy-preserving and scientifically relevant mobile data resources for wider use by the research community, and summarize the main research trends found among the 100+ challenge submissions. We finalize by discussing the main lessons learned from the participation of several hundred researchers worldwide in the MDC Tracks.
Resumo:
Patients after Legg-Calvé-Perthes disease (LCPD) often develop pain, impaired ROM, abductor weakness, and progression of osteoarthritis (OA) in early adulthood. Based on intraoperative observations during surgical hip dislocation, we established an algorithm for more detailed characterization of the underlying pathomorphologies with a proposed joint-preserving surgical treatment.
Resumo:
Deformity and malposition of the acetabulum can occur during the development of the hip. Developmental hip dysplasia and acetabular retroversion are possible causes of osteoarthritis in the young adult. Surgical management with reorientation of the acetabulum allows causal therapy of the deformity and preservation of the native hip joint. Established techniques are the Bernese periacetabular osteotomy (PAO) and the Tönnis and Kalchschmidt triple osteotomy of the pelvis. Both techniques permit three-dimensional correction of the position of the acetabulum. Advantages and disadvantages of each technique must be considered and are summarized in the present paper. If performed early (osteoarthritis grade Tönnis 0 and 1) with correct indication and proper technique, good results can be expected.
Resumo:
Less invasive methods of performing total hip arthroplasty have been considered controversial after increased complication rates and component malpositioning were reported. A new method of performing total hip arthroplasty through an incision in the superior capsule, posterior to the abductors and anterior to the posterior capsule, was developed with the aim of producing a technique that maintained the joint stability of the transgluteal exposure and the rapid abductor recovery of the posterior exposure. We assessed the recovery and complications of this technique performed with surgical navigation. The study group was compared with similar subjects who had conventional total hip arthroplasty, without surgical navigation, using the transgluteal exposure. There were 185 consecutive total hip arthroplasties in the study group and 189 nonconsecutive historical total hip arthroplasties in the control group. The two groups were controlled for complexity and had no differences in body mass index, gender, diagnosis, operative side, bilateral operations, and previous surgeries. Patients were evaluated for clinical recovery and perioperative complications at 9 and 24 weeks. The study group recovered faster at both followup examinations. The study group had fewer perioperative and postoperative complications compared with the control group. Accuracy of component positioning was not compromised compared to the control group. Less invasive surgery with the philosophy of maximally preserving the abductors, posterior capsule, and short rotators may result in a safer operation with faster recovery than traditional techniques.
Resumo:
When a lung tumor arises in segment 6, the close anatomical relationship to the middle lobe bronchus may make a lower bilobectomy necessary. Sleeve lobectomy may be an alternative. These procedures were compared retrospectively in 36 patients operated on between January 2005 and December 2006 with non-small-cell lung cancer (stage I-IIIB) of the right lower lobe. Sleeve lobectomy was performed in 21 patients and bilobectomy in 15 (41%). Preoperative lung function was comparable in both groups. Radical resection was achieved in 34/36 patients. Operation time was 121 min for sleeve lobectomy and 144 min for bilobectomy. Chest tubes were removed after 5 days in both groups. Postoperative lung function was better after sleeve lobectomy than bilobectomy (forced expiratory volume in 1st sec: 78% vs. 69%). Preservation of the middle lobe by sleeve lobectomy is feasible. There was no evidence that this resection was less radical, and complication rates were similar in both groups.