sation server responds with tho numbers. One is the
internal ID that denotes the items in the central medi-
cal database created by this physician to which he/she
has a direct access. The other one is the patient’s long
term pseudonym that is not seen by the physician but
can be later used to access other items created by other
physicians. This access depends on the patient’s con-
sent, as implemented in the protocol presented in this
paper.
In practice, the need to treat the same patient may
arise when he/she moves to another city or needs con-
sultations at many physicians: general practitioner
(family doctor) and various specialists. The patient
may be treated by an oncologist and the surgeon,
his/her tissues may be analyzed in a laboratory. At
a certain moment, a doctor has to collect all this in-
formation in order to assess the case and to define fur-
ther therapy. The patient, trusting the doctor, can al-
low him/her to access the relevant data created by all
specialists.
A registry (with the corresponding pseudonymi-
sation server - module) is organized around a specific
medical problem, like cancer, orthopedical prosthe-
ses, or else. The central database can support many
distinct modules. We intend not to connect data from
different modules. It could be of value for the medi-
cal research, but would pose new security and privacy
related problems.
Each module uses a specific function to construct
the long term pseudonym. The principle is always
the same: the module combines a selection of par-
tial identifiers, adds salt (specific for this module) and
computes a hash on this information. The selection of
the partial identifiers and the way they are combined
may vary from module to module. For instance, for
one module the social security number birth year and
gender can be used. For another module we can use
last name at birth, first name at birth, birth date, city
and country of birth. Each time a patient visits the
same module, the same pseudonym will be computed.
In some very rare cases two patients will receive the
same pseudonym, but only if they have exactly the
same identifiers.
Using (secret) salt prohibits the administrators of
the central database to discover the patients’ real iden-
tity.
Until now, we have discussed the long term
pseudonym that is used to connect anonymously the
patient’s data records. Another item, stored along
with the medical data and controlling the access to
them is the fingerprint. The fingerprint is created us-
ing the data stored on the patient’s health smartcard. If
the patient presents the same smartcard to the physi-
cian, the same fingerprint can be generated what is
understood as the consent to access the data given by
the patient present in persona. In following sections
the handling of the fingerprint will be presented.
3 RELATED WORK
As medical information is more and more stored elec-
tronically, studying various aspects of this process
has created a vast research area. Our interest is di-
rected towards privacy and security of medical data,
especially in the interaction of the systems used for
health support (Hospital Information Systems, Elec-
tronic Health Records) and the systems used for med-
ical research (clinical trials repositories, medical reg-
istries).
We will present here recent literature regarding
this subject.
In our article, we do not enter in detail into the
way the pseudonym is created to link all the cases
of the same patient in the database. This subject has
already been covered by other publications. For in-
stance (Elger et al., 2010) present the aspects of the
reuse of health data for clinical research, especially
the anonymization of data and the construction of
pseudonyms. (Wilson, 2005) addresses also the prob-
lem of pseudonymization, suggesting the use of the
PKI smartcards. We opted for the computation of a
hash based on information that remain stable (identity
at birth for instance) and a salt specific for each study.
Our system is much simpler and does not require any
new token or information from the patient.
It has to be stressed that retrieving and connecting
data is a different problem from controlling the access
to them. Data items have to be marked with the long
term pseudonyms if they have to be treated as a set,
what is a necessity in the case of medical research.
Consent validation is another problem and we use dif-
ferent means (a fingerprint based on the smartcard) to
achieve this goal.
(Kwon, 2011) proposes to use X.509 certificates
to provide anonymized session identifiers that could
be deanonymized under certain circumstances. This
is very near to what we aim, but we concentrate here
on the consent. The anonymity or the way how the
pseudonym is created is out of the scope of our article.
Another related problem is the one stressed by
(Camenisch and Lysyanskaya, 2001). They focus on
anonymous credentials delivered by a central author-
ity to anonymous users. We try to solve the inverse
problem, where an anonymous user (for us a patient)
gives a credential to a central system, while remaining
anonymous.
HowtoCollectConsentforanAnonymousMedicalDatabase
407