Health data privacy through homomorphic encryption and distributed ledger computing: an ethical-legal qualitative expert assessment study

BMC Medical Ethics 23 (1):1-13 (2022)
  Copy   BIBTEX

Abstract

BackgroundIncreasingly, hospitals and research institutes are developing technical solutions for sharing patient data in a privacy preserving manner. Two of these technical solutions are homomorphic encryption and distributed ledger technology. Homomorphic encryption allows computations to be performed on data without this data ever being decrypted. Therefore, homomorphic encryption represents a potential solution for conducting feasibility studies on cohorts of sensitive patient data stored in distributed locations. Distributed ledger technology provides a permanent record on all transfers and processing of patient data, allowing data custodians to audit access. A significant portion of the current literature has examined how these technologies might comply with data protection and research ethics frameworks. In the Swiss context, these instruments include the Federal Act on Data Protection and the Human Research Act. There are also institutional frameworks that govern the processing of health related and genetic data at different universities and hospitals. Given Switzerland’s geographical proximity to European Union (EU) member states, the General Data Protection Regulation (GDPR) may impose additional obligations.MethodsTo conduct this assessment, we carried out a series of qualitative interviews with key stakeholders at Swiss hospitals and research institutions. These included legal and clinical data management staff, as well as clinical and research ethics experts. These interviews were carried out with two series of vignettes that focused on data discovery using homomorphic encryption and data erasure from a distributed ledger platform.ResultsFor our first set of vignettes, interviewees were prepared to allow data discovery requests if patients had provided general consent or ethics committee approval, depending on the types of data made available. Our interviewees highlighted the importance of protecting against the risk of reidentification given different types of data. For our second set, there was disagreement amongst interviewees on whether they would delete patient data locally, or delete data linked to a ledger with cryptographic hashes. Our interviewees were also willing to delete data locally or on the ledger, subject to local legislation.ConclusionOur findings can help guide the deployment of these technologies, as well as determine ethics and legal requirements for such technologies.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,423

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Why privacy is not enough privacy in the context of “ubiquitous computing” and “big data”.Tobias Matzner - 2014 - Journal of Information, Communication and Ethics in Society 12 (2):93-106.
Protecting health privacy even when privacy is lost.T. J. Kasperbauer - 2020 - Journal of Medical Ethics 46 (11):768-772.
Medical Records Management Using Distributed Ledger and Storage.Samia Anjum, R. Ramaguru & M. Sethumadhavan - 2021 - International Conference on Advances in Computing and Data Sciences 1441:52-62.
Health Information Privacy and Public Health.James G. Hodge - 2003 - Journal of Law, Medicine and Ethics 31 (4):663-671.
Health Information Privacy and Public Health.James G. Hodge - 2003 - Journal of Law, Medicine and Ethics 31 (4):663-671.

Analytics

Added to PP
2022-12-01

Downloads
16 (#886,588)

6 months
10 (#255,509)

Historical graph of downloads
How can I increase my downloads?