Skip to main content
Article thumbnail
Location of Repository

Mathematical techniques for the protection of patient's privacy in medical databases

By Przybyko Marcin, Dorosh Orest, Giemza Joanna, Gorski Tomasz, Kortyka Anna, Kowalska Dorota, Krasnicki Tomasz, Ockendon John, Szlendak Pawel, Warchol Michal and Zubkov Vladimir


In modern society, keeping the balance between privacy and public access to information is becoming a widespread problem more and more often. Valid data is crucial for many kinds of research, but the public good should not be achieved at the expense of individuals.\ud \ud While creating a central database of patients, the CSIOZ wishes to provide statistical information for selected institutions. However, there are some plans to extend the access by providing the statistics to researchers or even to citizens. This might pose a significant risk of disclosure of some private, sensitive information about\ud individuals. This report proposes some methods to prevent data leaks.\ud \ud One category of suggestions is based on the idea of modifying statistics, so that they would maintain importance for statisticians and at the same time guarantee the protection of patient's privacy.\ud \ud Another group of proposed mechanisms, though sometimes difficult to implement, enables one to obtain precise statistics, while restricting such queries which might reveal sensitive information

Topics: Information and communication technology
Year: 2011
OAI identifier:

Suggested articles


  1. (1976). A Lattice Model of Secure Information Flow,
  2. (1979). Computers and Intractability: A Guide to the Theory of NPCompleteness. W.H. Freeman and co.,
  3. (1982). Cryptography and data security, Eddison-Wesley,
  4. (1997). Expert Systems and Probabilistic Network Models. Monographs in Computer Science.
  5. (2005). Federal Committee on Statistical Methodology, Report on Statistical Disclosure Limitation Methodology,
  6. forms used to gather information for statistical database (available 2010.10.01)
  7. (2003). Prezesa Rady Ministrów z dn. 20 lutego
  8. (2010). Releasing Microdata: Disclosure Risk Estimation, Data Masking and Assessing Utility.
  9. (2001). Security Engineering: A guide to Building Dependable Distributed Systems,
  10. (2009). Statystyczny Ministerstwa Zdrowia,

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.