Skip to main page content
Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2017 Feb;66:42-51.
doi: 10.1016/j.jbi.2016.12.008. Epub 2016 Dec 19.

Towards a Privacy Preserving Cohort Discovery Framework for Clinical Research Networks

Affiliations
Free PMC article

Towards a Privacy Preserving Cohort Discovery Framework for Clinical Research Networks

Jiawei Yuan et al. J Biomed Inform. .
Free PMC article

Abstract

Background: The last few years have witnessed an increasing number of clinical research networks (CRNs) focused on building large collections of data from electronic health records (EHRs), claims, and patient-reported outcomes (PROs). Many of these CRNs provide a service for the discovery of research cohorts with various health conditions, which is especially useful for rare diseases. Supporting patient privacy can enhance the scalability and efficiency of such processes; however, current practice mainly relies on policy, such as guidelines defined in the Health Insurance Portability and Accountability Act (HIPAA), which are insufficient for CRNs (e.g., HIPAA does not require encryption of data - which can mitigate insider threats). By combining policy with privacy enhancing technologies we can enhance the trustworthiness of CRNs. The goal of this research is to determine if searchable encryption can instill privacy in CRNs without sacrificing their usability.

Methods: We developed a technique, implemented in working software to enable privacy-preserving cohort discovery (PPCD) services in large distributed CRNs based on elliptic curve cryptography (ECC). This technique also incorporates a block indexing strategy to improve the performance (in terms of computational running time) of PPCD. We evaluated the PPCD service with three real cohort definitions: (1) elderly cervical cancer patients who underwent radical hysterectomy, (2) oropharyngeal and tongue cancer patients who underwent robotic transoral surgery, and (3) female breast cancer patients who underwent mastectomy) with varied query complexity. These definitions were tested in an encrypted database of 7.1 million records derived from the publically available Healthcare Cost and Utilization Project (HCUP) Nationwide Inpatient Sample (NIS). We assessed the performance of the PPCD service in terms of (1) accuracy in cohort discovery, (2) computational running time, and (3) privacy afforded to the underlying records during PPCD.

Results: The empirical results indicate that the proposed PPCD can execute cohort discovery queries in a reasonable amount of time, with query runtime in the range of 165-262s for the 3 use cases, with zero compromise in accuracy. We further show that the search performance is practical because it supports a highly parallelized design for secure evaluation over encrypted records. Additionally, our security analysis shows that the proposed construction is resilient to standard adversaries.

Conclusions: PPCD services can be designed for clinical research networks. The security construction presented in this work specifically achieves high privacy guarantees by preventing both threats originating from within and beyond the network.

Keywords: Clinical research network (CRN); Data privacy; OneFlorida Clinical Data Research Network (CDRN); Patient-Centered Clinical Research Network (PCORnet); Privacy-preserving cohort discovery; Searchable encryption.

Conflict of interest statement

Conflict of Interest: The authors declare that they have no conflict of interest.

Figures

Figure 1
Figure 1
Overview of the proposed privacy-preserving cohort discovery framework based on the OneFlorida clinical data research network architecture.
Figure 2
Figure 2. Setup Algorithm
PPCD framework setup and key generation.
Figure 3
Figure 3. Encryption Algorithm
Each data source will encrypt its data with a combination of the public key of the data hub and a secret key only known to the source organization itself.
Figure 4
Figure 4. PPCD Algorithm
Privacy-preserving cohort discovery query generation and polynomial evaluation.
Figure 5
Figure 5
The privacy-preserving query process with block indexing strategy.

Similar articles

See all similar articles

Cited by 7 articles

See all "Cited by" articles

LinkOut - more resources

Feedback