
design that minimizes re-identification. Example ap-
proaches would be to temporarily store de-identified
patient information in the session as providers are
navigating the relevant patient history or utilizing
object oriented architectures where re-identification
would happen once for active patient’s object.
4 CONCLUSION AND FUTURE
WORK
De-identification of medical data has been a widely
used solution to produce data extracts for research
and analysis. The work was able to identify 7 frame-
work principles that could de-identify any health in-
formation system database through Segregation of
identifiable information in separate database tables
based on their importance and frequency, omitting the
use of relational database features between those ta-
bles through encryption of foreign keys, and address-
ing quasi-identifiers such as encounters dates through
masking with a random increment/decrement that is
stored in the same manner. The de-identification of
a sample EHR schema database was successful mi-
grating the original database structure to a structure
conforming to the 7 principles of the framework.
In future work, our aim is to test the framework
on a real-life EHR database and compare the perfor-
mance against the original to determine the suggested
framework efficiency.
REFERENCES
Avireddy, S., Perumal, V., Gowraj, N., Kannan, R. S., Thi-
nakaran, P., Ganapthi, S., Gunasekaran, J. R., and
Prabhu, S. (2012). Random4: An application specific
randomized encryption algorithm to prevent sql injec-
tion. In 2012 IEEE 11th International Conference on
Trust, Security and Privacy in Computing and Com-
munications, pages 1327–1333.
Caplan, R. (2003). Hipaa. health insurance portability and
accountability act of 1996. Dental assistant (Chicago,
Ill. : 1994), 72:6–8.
Capris, T., Melo, P., Garcia, N. M., Pires, I. M., and
Zdravevski, E. (2022). Comparison of sql and nosql
databases with different workloads: Mongodb vs
mysql evaluation. In 2022 International Conference
on Data Analytics for Business and Industry (ICD-
ABI), pages 214–218.
Chhabra, S., Amiri, H., Rastegar, M., and Dashti, A. (2022).
Cloud computing for healthcare systems in covid19
era. Open Access Research Journal of Biology and
Pharmacy, 06.
El Emam, K. (2010). Risk-based de-identification of health
data. IEEE Security & Privacy, 8(3):64–67.
Enterprise, V. (2018). 2018 data breach digest report.
Erdal, B., Liu, J., Ding, J., Chen, J., Marsh, C., Kamal, J.,
and Clymer, B. (2012). A database de-identification
framework to enable direct queries on medical data for
secondary use. Methods of information in medicine,
51:229–41.
Koushik, A. S., Jain, B., Menon, N., Lohia, D., Chaudhari,
S., and B.P, V. K. (2019). Performance analysis of
blockchain-based medical records management sys-
tem. In 2019 4th International Conference on Recent
Trends on Electronics, Information, Communication
& Technology (RTEICT), pages 985–989.
Lin, J. C.-W., Liu, Q., Fournier-Viger, P., and Hong, T.-
P. (2016). Pta: An efficient system for transaction
database anonymization. IEEE Access, 4:6467–6479.
Miller, A. and Payne, B. (2016). Health it security: An ex-
amination of modern challenges in maintaining hipaa
and hitech compliance. 2016 KSU Conference on Cy-
bersecurity Education, Research and Practice.
Oksuz, O. (2022). A System For Storing Anonymous Pa-
tient Healthcare Data Using Blockchain And Its Ap-
plications. The Computer Journal, 67(1):18–30.
Omran, E., Bokma, A., and Abu-Almaati, S. (2009). A k-
anonymity based semantic model for protecting per-
sonal information and privacy. In 2009 IEEE Interna-
tional Advance Computing Conference, pages 1443–
1447.
OWASP (2024). Owasp top ten.
Patel, D., Dhamdhere, N., Choudhary, P., and Pawar, M.
(2020). A system for prevention of sqli attacks. In
2020 International Conference on Smart Electronics
and Communication (ICOSEC), pages 750–753.
Rights, P. (2023). Privacy breaches.
Sai Lekshmi, A. S. and Devipriya, V. S. (2017). An emula-
tion of sql injection disclosure and deterrence. In 2017
International Conference on Networks & Advances
in Computational Technologies (NetACT), pages 314–
316.
Singh, A. (2024). Evolutionary architectures in web ap-
plications: A comprehensive study of client-server,
multi- tier, and service-oriented approaches. IJFMR.
Unlu, S. A. and Bicakci, K. (2010). Notabnab: Protection
against the “tabnabbing attack”. In 2010 eCrime Re-
searchers Summit, pages 1–5.
HEALTHINF 2025 - 18th International Conference on Health Informatics
218