scholarly journals DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING

2020 ◽  
Vol 30 (Supplement_5) ◽  
Author(s):  
F Estupiñán-Romero ◽  
J Gonzalez-García ◽  
E Bernal-Delgado

Abstract Issue/problem Interoperability is paramount when reusing health data from multiple data sources and becomes vital when the scope is cross-national. We aimed at piloting interoperability solutions building on three case studies relevant to population health research. Interoperability lies on four pillars; so: a) Legal frame (i.e., compliance with the GDPR, privacy- and security-by-design, and ethical standards); b) Organizational structure (e.g., availability and access to digital health data and governance of health information systems); c) Semantic developments (e.g., existence of metadata, availability of standards, data quality issues, coherence between data models and research purposes); and, d) Technical environment (e.g., how well documented are data processes, which are the dependencies linked to software components or alignment to standards). Results We have developed a federated research network architecture with 10 hubs each from a different country. This architecture has implied: a) the design of the data model that address the research questions; b) developing, distributing and deploying scripts for data extraction, transformation and analysis; and, c) retrieving the shared results for comparison or pooled meta-analysis. Lessons The development of a federated architecture for population health research is a technical solution that allows full compliance with interoperability pillars. The deployment of this type of solution where data remain in house under the governance and legal requirements of the data owners, and scripts for data extraction and analysis are shared across hubs, requires the implementation of capacity building measures. Key messages Population health research will benefit from the development of federated architectures that provide solutions to interoperability challenges. Case studies conducted within InfAct are providing valuable lessons to advance the design of a future pan-European research infrastructure.


2016 ◽  
Vol 8 (3) ◽  
Author(s):  
Neal D Goldstein ◽  
Anand D Sarwate

Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools.


Subject IoT ecosystem. Significance The market for the Internet of Things (IoT) or connected devices is expanding rapidly, with no manufacturer currently forecast to dominate the supply chain. This has fragmented the emerging IoT ecosystem, triggering questions about interoperability and cybersecurity of IoT devices. Impacts Firms in manufacturing, transportation and logistics and utilities are expected to see the highest IoT spending in coming years. The pace of IoT adoption is inextricably linked to that of related technologies such as 5G, artificial intelligence and cloud computing. Data privacy and security will be the greatest constraint to IoT adoption.


2018 ◽  
pp. 77-92 ◽  
Author(s):  
Srinivas Sethi ◽  
Sai Sruti

Cloud computing refers to the basic setup for an emerging model of service delivery, that has the advantage of decreasing the cost by sharing computing, infrastructure including storage resources. This can be combined with on-demand delivery mechanism relying on a pay-per-use model. Cloud computing offers an added level of risk because of essential services provided by it to a third party, which makes it difficult to maintain data privacy and security. Security in cloud computing is a critical aspect, which has various issues and challenges related to it. Cloud service providers/ brokers and the cloud service users should make aware of safety cloud. That is the cloud is safe enough from all kinds of the threats, so that the users do not face any problem like; loss of data or data theft. There is a possibility that, a malicious user can enters the cloud by imitating an authentic user, thus corrupt the entire cloud. It can affect many users who are sharing these types of clouds. This chapter mentions the list of parameters that disturb the security of the cloud. This also explores the cloud security issues and challenges faced by cloud service provider/brokers and cloud service users like; data, privacy, and infected application. Finally, it discusses the countermeasure for handling these issues and its challenges.


2021 ◽  
Vol 6 (Suppl 5) ◽  
pp. e005057
Author(s):  
Nivedita Saksena ◽  
Rahul Matthan ◽  
Anant Bhan ◽  
Satchit Balsari

In August 2020, India announced its vision for the National Digital Health Mission (NDHM), a federated national digital health exchange where digitised data generated by healthcare providers will be exported via application programme interfaces to the patient’s electronic personal health record. The NDHM architecture is initially expected to be a claims platform for the national health insurance programme ‘Ayushman Bharat’ that serves 500 million people. Such large-scale digitisation and mobility of health data will have significant ramifications on care delivery, population health planning, as well as on the rights and privacy of individuals. Traditional mechanisms that seek to protect individual autonomy through patient consent will be inadequate in a digitised ecosystem where processed data can travel near instantaneously across various nodes in the system and be combined, aggregated, or even re-identified.In this paper we explore the limitations of ‘informed’ consent that is sought either when data are collected or when they are ported across the system. We examine the merits and limitations of proposed alternatives like the fiduciary framework that imposes accountability on those that use the data; privacy by design principles that rely on technological safeguards against abuse; or regulations. Our recommendations combine complementary approaches in light of the evolving jurisprudence in India and provide a generalisable framework for health data exchange that balances individual rights with advances in data science.


2021 ◽  
Vol 3 ◽  
Author(s):  
Benjamin Maus ◽  
Carl Magnus Olsson ◽  
Dario Salvi

The reliance on data donation from citizens as a driver for research, known as citizen science, has accelerated during the Sars-Cov-2 pandemic. An important enabler of this is Internet of Things (IoT) devices, such as mobile phones and wearable devices, that allow continuous data collection and convenient sharing. However, potentially sensitive health data raises privacy and security concerns for citizens, which research institutions and industries must consider. In e-commerce or social network studies of citizen science, a privacy calculus related to user perceptions is commonly developed, capturing the information disclosure intent of the participants. In this study, we develop a privacy calculus model adapted for IoT-based health research using citizen science for user engagement and data collection. Based on an online survey with 85 participants, we make use of the privacy calculus to analyse the respondents' perceptions. The emerging privacy personas are clustered and compared with previous research, resulting in three distinct personas which can be used by designers and technologists who are responsible for developing suitable forms of data collection. These are the 1) Citizen Science Optimist, the 2) Selective Data Donor, and the 3) Health Data Controller. Together with our privacy calculus for citizen science based digital health research, the three privacy personas are the main contributions of this study.


2019 ◽  
Vol 8 (S3) ◽  
pp. 76-80
Author(s):  
K. Srilakshmi ◽  
P. Bhargavi

Cloud computing is a new and fast emergent technology in field of computation and data storage as a service at very eye-catching facilities. It provides fast and well organized on demand services for storage, network, software, and hardware through the Internet. Applications that run in the cloud can balance various elements comprising load balancing, bandwidth, security and size of data. Major problems to cloud adoption are data privacy and security, because the data owner and the service provider are not within the similar trusted domain. Safety issues are increasingly significant in lowest layer Infrastructure as a Service (IaaS) to higher Platform as a Service (PaaS). In this paper we present range of dissimilar techniques or security algorithms exploiting to uphold the secrecy and security of the cloud with cryptographic algorithms.


2017 ◽  
Author(s):  
Paulina Bondaronek ◽  
Ghadah Alkhaldi ◽  
April Slee ◽  
Fiona L Hamilton ◽  
Elizabeth Murray

BACKGROUND Within the new digital health landscape, the rise of health apps creates novel prospects for health promotion. The market is saturated with apps that aim to increase physical activity (PA). Despite the wide distribution and popularity of PA apps, there are limited data on their effectiveness, user experience, and safety of personal data. OBJECTIVE The purpose of this review and content analysis was to evaluate the quality of the most popular PA apps on the market using health care quality indicators. METHODS The top-ranked 400 free and paid apps from iTunes and Google Play stores were screened. Apps were included if the primary behavior targeted was PA, targeted users were adults, and the apps had stand-alone functionality. The apps were downloaded on mobile phones and assessed by 2 reviewers against the following quality assessment criteria: (1) users’ data privacy and security, (2) presence of behavior change techniques (BCTs) and quality of the development and evaluation processes, and (3) user ratings and usability. RESULTS Out of 400 apps, 156 met the inclusion criteria, of which 65 apps were randomly selected to be downloaded and assessed. Almost 30% apps (19/65) did not have privacy policy. Every app contained at least one BCT, with an average number of 7 and a maximum of 13 BCTs. All but one app had commercial affiliation, 12 consulted an expert, and none reported involving users in the app development. Only 12 of 65 apps had a peer-reviewed study connected to the app. User ratings were high, with only a quarter of the ratings falling below 4 stars. The median usability score was excellent—86.3 out of 100. CONCLUSIONS Despite the popularity of PA apps available on the commercial market, there were substantial shortcomings in the areas of data safety and likelihood of effectiveness of the apps assessed. The limited quality of the apps may represent a missed opportunity for PA promotion.


10.2196/25368 ◽  
2021 ◽  
Vol 23 (7) ◽  
pp. e25368
Author(s):  
Maria Sääskilahti ◽  
Riitta Ahonen ◽  
Johanna Timonen

Background Patient portals have been introduced in several countries in the last few decades. Despite worldwide objectives of introducing patient portals, nationwide portals are rare, and studies about their use are limited. Finland is one of the forerunners in developing nationwide health data systems. A nationwide patient portal, My Kanta, for viewing electronic prescriptions and health data has been phased in, starting in 2010. Objective The aim of this study was to investigate what functions Finnish pharmacy customers use in My Kanta, their perceptions of the service’s usability, and how satisfied users are with My Kanta overall. Methods In spring 2019, questionnaires (N=2866) were distributed from 18 pharmacies of varying size across mainland Finland to adult pharmacy customers purchasing prescription medications for themselves or for their child under 18 years of age. Questions were asked about the use and usability of the patient portal by means of structured and Likert-scale questions. Statistical analyses included frequencies, means, medians, chi-square tests, Fisher exact tests, and Kruskal-Wallis tests. Results In total, 994 completed questionnaires of 2866 delivered questionnaires (34.68%) were returned. The most-used My Kanta functions were browsing prescription information (781/802, 97.4%), records of health care visits (772/802, 96.3%), and results of laboratory tests and x-ray examinations (722/804, 89.8%). Most users (558/793, 70.4%) had also requested a prescription renewal using the service. My Kanta was perceived as easy to log into (772/816, 94.6%) and clear to view (709/808, 87.7%). Most users considered the service useful for monitoring their health information (753/813, 92.6%) and felt that it provides a good overall picture of the medications prescribed to them (711/813, 87.5%). The majority of users found the information recorded about them easy to understand (684/800, 85.5%). Of the users, 16.7% (135/807) disagreed with the statement that the information they were looking for was easy to find. Approximately two-thirds (501/814, 61.5%) of users did not know whether it is easy to view in which pharmacies and health care units their prescription information has been viewed, and over one-third (306/805, 38.0%) did not know whether it is easy to view in which health care units their health information has been processed. Approximately one-fifth of participants (181/805, 22.5%) feared that unauthorized persons might view their information and that their electronically saved prescription and health information might disappear (180/810, 22.2%). In addition, 16.1% (129/799) expressed interest in receiving guidance on My Kanta use. The vast majority of users (719/804, 89.4%) were satisfied with the service overall. Conclusions Pharmacy customers were satisfied with the nationwide patient portal. It was mostly used for browsing e-prescriptions and medical records. Overall, the usability of the service was good. However, users need to be better informed about data privacy and security issues, and guidance on using the portal needs to be improved.


Sign in / Sign up

Export Citation Format

Share Document