RESUMO
There is a demand for a pseudonymization service by a Trusted Third Party (TTP), that features clientside pseudonymization. We propose a system using modern web technology, which requires no installation but can handle data preprocessing and pseudonymization safely on the client.
Assuntos
Segurança Computacional , Confidencialidade , Humanos , Tecnologia , ConfiançaRESUMO
Standardised, automated quality reports were generated at three pilot locations of the decentralized translational research network DKTK with separated local data warehouses (LDW), for assessing syntactic conformity against common data element definitions deposited in a central metadata repository (MDR). Deviations in the LDW were categorised, and locally corrected. Comparisons of reports from two time points confirm a major improvement in data quality in terms of syntactic conformity, an essential prerequisite for network-wide data integration.
Assuntos
Confiabilidade dos Dados , Pesquisa Translacional Biomédica , Elementos de Dados Comuns , Data Warehousing , MetadadosRESUMO
A growing framework of legal and ethical requirements limit scientific and commercial evaluation of personal data. Typically, pseudonymization, encryption, or methods of distributed computing try to protect individual privacy. However, computational infrastructures still depend on human system administrators. This introduces severe security risks and has strong impact on privacy: system administrators have unlimited access to the computers that they manage including encryption keys and pseudonymization-tables. Distributed computing and data obfuscation technologies reduce but do not eliminate the risk of privacy leakage by administrators. They produce higher implementation effort and possible data quality degradation. This paper proposes the Trusted Server as an alternative approach that provides a sealed and inaccessible computational environment in a cryptographically strict sense. During operation or by direct physical access to storage media, data stored and processed inside the Trusted Server can by no means be read, manipulated or leaked, other than by brute-force. Thus, secure and privacy-compliant data processing or evaluation of plain person-related data becomes possible even from multiple sources, which want their data kept mutually secret.