Health Data Integration with Secured Record Linkage and Trust-Level Security Based Authentication

Authors

  • Katiwal V Dept. of Computer Science & Engineering, Jhulelal Institute of Technology, Nagpur, India
  • Balani N Dept. of Computer Science & Engineering, Jhulelal Institute of Technology, Nagpur, India
  • Dudhe P Dept. of Computer Science & Engineering, Jhulelal Institute of Technology, Nagpur, India

Keywords:

Data Security, Health Data Warehouse, Privacy Preserved Record Linkage, Data Mining

Abstract

Discovering Knowledge from various health data domains requires the incorporation of healthcare data from diversified sources. Maintaining record linkage during the integration of medical data is an important research issue. Researchers have given different solutions to this problem that are applicable for developed countries where electronic health record of patients are maintained with identifiers like social security number (SSN), universal patient identifier (UPI), health insurance number, etc. These solutions cannot be used correctly for record linkage of health data of developing countries because of missing data, ambiguity in patient identification, and high amount of noise in patient information. We have proposed a privacy preserved secured record linkage architecture that can support constrained health data of developing countries such as Bangladesh. Our technique can unidentified identifiable private data of the patients while maintaining record linkage in integrated health repositories to facilitate knowledge discovery process. This concept motivates us to create a trust level security authentication. It means, this healthcare database will be fully secured using cryptography algorithm of encryption and decryption using AES algorithm and authentication will be controlled on “Trust Level Security”. It means that if any researcher or organization need to access this data, then he/she must have at least above average trust level. We score 1 as minimum trust level 10 as maximum trust level and 5 as an average trust level. Trust level will be calculated on the basis of how much other organizations and researchers trust on A researcher or organization.

References

[1]T.R. Sahama, and P.R Croll, “A Data Warehouse Architecture for Clinical Data Warehousing,” Australasian Workshop on Health Knowledge Management and Discovery,2007.

[2] J. H. Weber-Jahnke & C. Obry “Protecting privacy during peer-to-peer exchange of medical documents”, Inf Syst Front (2012), Springer, 14:87–104

[3] H.C. Kum, A. Krishnamurthy, A. Machanavajjhala et. at., “Privacy preserving interactive record linkage (PPIRL), ” J Am Med Inform Assoc vol. 21, 2014, pp. 212–220.

[4] J. Liang, L. Chen, and S. Mehrotra, “Efficient Record Linkage in Large Data Sets,” In Proc. of the Eighth International Conference on Database Systems for Advanced Applications, 2003.

[5] Your medical record is worth more to hackers than your credit card.

[6] P. Christen, “Automatic record linkage using seeded nearest neighbour and support vector machine classification,” In Proc. of the 14th ACMSIGKDD International Conference on Knowledge Discovery and Data Mining, 2008.

[7] S. I. Khan and A.S.M.L. Hoque, “Privacy and security problems of national health data warehouse: a convenient solution for developing countries,” In Proc. of the International Conference on Networking Systems and Security (NSysS). IEEE,2016.

[8]C. F. Andrea, C. Danielle, T.M. Matthew et. al., “Development and evaluation of a de-identification procedure for a case register sourced from mental health electronic records,” BMC Medical Informatics and Decision Making, Vol. 13, 2013, pp.13:71.

[9] J.A. Lyman, K. Scully, and J.H. Harrison, “The development of health care data warehouses to support data mining,” Clin Lab Med. 28,1 2008, pp. 55-71

[10] P. Christen, “Automatic record linkage using seeded nearest neighbor and support vector machine classification,” In Proc. of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2008.

[11] E.A. Sauleau, J. Paumier, and A. Buemi, “Medical record linkage in health information systems by approximate string matching and clustering,” BMC Med Inform Decision Making, Vol. 5, 2005, pp.32– 44.

[12] A.B. McCoy, A. Wright, Kahn M. et al., “Matching identifiers in electronic health records: implications for duplicate records and patient safety,” BMJ Qual Saf Vol. 22, 2013, pp.219–24.

[13] C. F. Andrea, C. Danielle, T.M. Matthew et. al., “Development and evaluation of a de-identification procedure for a case register sourced from mental health electronic records,” BMC Medical Informatics and Decision Making, Vol. 13, 2013, pp.13:71.

[14] N. K. Abel, P. C. John, L. J. Kathryn et al., “Design and implementation of a privacy preserving electronic health record linkage tool in Chicago,” Journal of the American Medical Informatics Association, 2015, pp.1-9.

Downloads

Published

2025-11-25

How to Cite

[1]
V. Katiwal, N. Balani, and P. Dudhe, “Health Data Integration with Secured Record Linkage and Trust-Level Security Based Authentication”, Int. J. Comp. Sci. Eng., vol. 7, no. 12, pp. 129–132, Nov. 2025.