ARX A Comprehensive Tool for Anonymizing Biomedical Data



Similar documents
CS346: Advanced Databases

DATA MINING - 1DL360

Anonymizing Unstructured Data to Enable Healthcare Analytics Chris Wright, Vice President Marketing, Privacy Analytics

Information Security in Big Data using Encryption and Decryption

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University

Policy-based Pre-Processing in Hadoop

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN

The De-identification of Personally Identifiable Information

Data Privacy and Biomedicine Syllabus - Page 1 of 6

RAPIDMINER FREE SOFTWARE FOR DATA MINING, ANALYTICS AND BUSINESS INTELLIGENCE. Luigi Grimaudo Database And Data Mining Research Group

Data attribute security and privacy in distributed database system

WebSphere Business Monitor

Introduction to REDCap for Clinical Data Collection Shannon M. Morrison, M.S. Quantitative Health Sciences Cleveland Clinic Foundation, Cleveland, OH

Azure Machine Learning, SQL Data Mining and R

Privacy Challenges of Telco Big Data

Unified Batch & Stream Processing Platform


De-Identification 101

Guidance on De-identification of Protected Health Information November 26, 2012.

Challenges of Data Privacy in the Era of Big Data. Rebecca C. Steorts, Vishesh Karwa Carnegie Mellon University November 18, 2014

Privacy Techniques for Big Data

A GENERAL SURVEY OF PRIVACY-PRESERVING DATA MINING MODELS AND ALGORITHMS

DATA Dr. Jan Krancke, VP Regulatory Strategy & Projects CERRE Expert Workshop, Brussels. re3rerererewr

Getting Started with Oracle Data Miner 11g R2. Brendan Tierney

Privacy-Preserving Big Data Publishing

Data Management for Biobanks

From Raw Data to. Actionable Insights with. MATLAB Analytics. Learn more. Develop predictive models. 1Access and explore data

Technical Approaches for Protecting Privacy in the PCORnet Distributed Research Network V1.0

Microsoft Business Intelligence

Test Data Management Concepts

Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53

ESS event: Big Data in Official Statistics. Antonino Virgillito, Istat

How to address top problems in test data management

German Record Linkage Center

ADVISORY GUIDELINES ON THE PERSONAL DATA PROTECTION ACT FOR SELECTED TOPICS ISSUED BY THE PERSONAL DATA PROTECTION COMMISSION ISSUED 24 SEPTEMBER 2013

ANONYMIZATION METHODS AS TOOLS FOR FAIRNESS

Protecting Respondents' Identities in Microdata Release

Pentaho Data Mining Last Modified on January 22, 2007

A Privacy Officer s Guide to Providing Enterprise De-Identification Services. Phase I

Database security. André Zúquete Security 1. Advantages of using databases. Shared access Many users use one common, centralized data set

Degrees of De-identification of Clinical Research Data

Efficient Algorithms for Masking and Finding Quasi-Identifiers

DAMAS. Flexible Platform for Energy and Utilities

<Insert Picture Here> Oracle SQL Developer 3.0: Overview and New Features

Collaborative Open Market to Place Objects at your Service

Design and Implementation of an Automated Geocoding Infrastructure for the Duke Medicine Enterprise Data Warehouse

IC05 Introduction on Networks &Visualization Nov

Practical Data Science with Azure Machine Learning, SQL Data Mining, and R

Towards a Domain-Specific Framework for Predictive Analytics in Manufacturing. David Lechevalier Anantha Narayanan Sudarsan Rachuri

Understanding De-identification, Limited Data Sets, Encryption and Data Masking under HIPAA/HITECH: Implementing Solutions and Tackling Challenges

Record Tagging for Microsoft Dynamics CRM

Aircloak Anonymized Analytics: Better Data, Better Intelligence

Software Verification: Infinite-State Model Checking and Static Program

Analysis Tools and Libraries for BigData

Secure Computation Martin Beck

Mining the Web of Linked Data with RapidMiner

How To Protect Privacy From Reidentification

Data Mining is the process of knowledge discovery involving finding

Predictive Analytics

Making Good Use of Data at Hand: Government Data Projects. Mark C. Cooke, Ph.D. Tax Management Associates, Inc.

WoPeD - An Educational Tool for Workflow Nets

FP7-ICT Scalable Data Analytics. Deadline: 16 April 2013 at 17:00:00 (Brussels local time)

Introducing Best Practices to Aggregation an EBS Consultation

ORACLE OLAP. Oracle OLAP is embedded in the Oracle Database kernel and runs in the same database process

Transcription:

ARX A Comprehensive Tool for Anonymizing Biomedical Data Fabian Prasser, Florian Kohlmayer, Klaus A. Kuhn Chair of Biomedical Informatics Institute of Medical Statistics and Epidemiology Rechts der Isar Hospital

Today s presenters Florian Kohlmayer Fabian Prasser Computer scientists, background in IT security and database systems Research assistants at the Chair for Biomedical Informatics at TUM Core-developers of ARX

Today s agenda Introduction Demonstration Questions & answers

Motivation: Data sharing in biomedical research Data sharing is a core element of biomedical research Wellcome Trust: Sharing research data to improve public health [1] OECD: Principles and guidelines for access to research data from public funding [2] Disclosure of data may lead to harm for individuals Data may be person-related and highly sensitive Large body of laws & regulations mandates privacy protection US: HIPPA Privacy Rule EU: European Data Protection Regulation DE: German Federal Data Protection Act Safeguards Access control, policies, agreements, De-identification / anonymization

Overview: De-identification / anonymization Controlling interactive data analysis Subject: query results, Methods: differential privacy, query-set-size control, Implementations: Fuzz, PINQ, Airavat, HIDE Masking identifiers in unstructured data Subject: clinical notes, Methods: machine learning, regular expressions, Implementations: MIST, MITdeid, NLM Scrubber Transforming structured data (focus of ARX) Subject: tabular data, Methods: generalization, suppression, Implementations: ARX, sdcmicro, PARAT

Background: Transforming structured data Basic idea: transform datasets in such a way that they adhere to a set of formal privacy guarantees Typical transformations Generalization: Germany Europe (often applied to individual values) Suppression: Germany * (often applied to whole entries) Example generalization hierarchies Level 2 Level 0 <50 1 2 North America Asia US High Very high [4.9, 10.0] High [4.1, 4.9[ Borderline high [3.4, 4.1[ 50 Normal Normal [2.6, 3.4[ 50 51 Europe Germany Low Low [1.8, 2.6[ Very low [0.0, 1.8[ Age Country LDL cholesterol

Background: Transforming structured data (cont.) Representation of gen. hierarchies Tree <50 50 1 2 50 51 ARX Tabular representation Level 0 Level 1 Level 2 1 <50 * 2 <50 * <50 * 50 50 * 51 50 * 50 * Full-domain generalization: all values of an attribute are generalized to the same level of the associated generalization hierarchy Search space: combinations of all generalization levels (lattice) (2,0,0) (1,1,0) (1,0,1) (0,1,1) (0,0,2) (1,0,0) (0,1,0) (0,0,1) Schema: Age Gender Zip code (0,0,0) Level 1 for attribute zip code Level 0 for attribute gender Level 0 for attribute age

Background: Privacy models Well-known models: k-anonymity, l-diversity, t-closeness, δ-presence Example: k-anonymity Proposed by Samarati and Sweeney in 1998 [3] Attacker model: linkage via a set of quasi-identifiers (identity disclosure) Mitigated by: building groups of indistinguishable data entries Adherence can be achieved with generalization and suppression Generalization (1,1,2) Age Gender Zip code 34 male 81667 45 female 81675 34 female 81931 45 male 81925 70 female 81931 70 male 81931 66 male 80931 2-anonymity Age Gender Zip code < 50 * 816** < 50 * 816** < 50 * 819** < 50 * 819** 50 * 819** 50 * 819** * * * Suppression

Background: k-anonymity Original dataset Age Gender Zip code 34 male 81667 45 female 81675 34 female 81931 45 male 81925 70 female 81931 70 male 81931 66 male 80931 2-anonymous dataset Age Gender Zip code < 50 * 816** < 50 * 816** < 50 * 819** < 50 * 819** 50 * 819** 50 * 819** * * *? Background knowledge, e.g. voter list Age Gender Zip code Name 45 female 81675 Alice 45 male 81925 Bob 70 male 81931 Charlie Background knowledge, e.g. voter list Age Gender Zip code Name 45 female 81675 Alice 45 male 81925 Bob 70 male 81931 Charlie

Challenge: Tool support Situation: anonymization of structured data is frequently recommended (laws, regulations, guidelines) but in practice it is only used rarely Main reasons Lack of understanding of opportunities and limitations Lack of ready-to-use tools Non-trivial: implementing useful tools is challenging Usefulness has many dimensions Ability to balance data utility with privacy requirements Support a broad spectrum of privacy methods, transformation techniques and methods for measuring and analyzing data utility Performance and scalability Intuitive visualization and parameterization of all process steps Provide methods to end-users as well as programmers In an integrated and harmonized manner Openness

Challenge: Related software sdcmicro Cross-platform open source software implemented in R Collection of a set of methods, not an integrated application Different types of recoding models and risk models Minimalistic graphical user interface µargus Closed source software for MS Windows Methods comparable to sdcmicro but more comprehensive user interface Development has ceased PARAT Commercial tool for MS Windows Powerful graphical interface Methods implemented overlap with methods implemented in ARX Centered around a risk-based approach More comprehensive list: http://arx.deidentifier.org/related-software/

ARX: Highlights Flexible transformation methods: generalization and suppression in a parameterizable and utility-driven manner Multiple privacy models: k-anonymity, l-diversity (three variants), t-closeness (two variants) and δ-presence, as well as arbitrary combinations Multiple methods for measuring data utility: automatically as well as manually Optimality: classification of the complete solution space Functional generalization rules: support for continuous and discrete variables Highly scalable: several million data entries on commodity hardware Comprehensive cross-platform Graphical User Interface: wizards, visualization of the solution space, analysis of data utility Application Programming Interface: full-blown Java library

ARX: Anonymization workflow Iteratively refine the anonymization process Supported by the scalability of our framework Three (potentially repeating) steps - Create and edit rules - Define privacy guarantees - Parameterize coding model - Configure utility measure - Filter and analyze the solution space - Organize transformations - Compare and analyze input and output

ARX: Demo

ARX: Facts and credits Three years of work by two main developers: Florian Kohlmayer and Fabian Prasser With help from multiple students: see credits on our website Interdisciplinary cooperation: Chair for IT Security, Chair for Database Systems, Chair for Biomedical Informatics Code metrics ARX Core/API: 178 files, 200 classes 37,332 LOC (16,281 lines of comments) ARX GUI: 174 files, 207 classes 44,772 LOC (15,062 lines of comments) ARX Tests: 997 JUnit tests Commits: 1,722 commits (since 03/2013)

ARX: Publications Implementation framework: Proc Int Symp CBMS, 2012 [4] Anonymization algorithm: Proc Int Conf PASSAT, 2012 [5] Anonymization of distributed data: J Biomed Inform, 2013 [6] Benchmark for anonymity methods: Proc Int Symp CBMS, 2014 [7] White Paper : AMIA Annu Symp Proc, 2014 [8]

Thank you for your attention! Questions? Disclaimer Anonymization must be performed by experts Additional safeguards are required (e.g., contractual measures) ARX is open source software Contributions are welcome, e.g., feature requests, code reviews, criticism, enhancements, questions Future developments: various projects, especially risk models Resources Project website: http://arx.deidentifier.org Code repository: https://github.com/arx-deidentifier/arx Get in touch Fabian Prasser (prasser@in.tum.de) Florian Kohlmayer (florian.kohlmayer@tum.de)

References 1. Wellcome Trust. Sharing research data to improve public health. 2013. [cited 2015 Jan 14]. Available at: http://www.wellcome.ac.uk/about-us/policy/spotlight-issues/data-sharing/publichealth-and-epidemiology/wtdv030690.htm. 2. OECD. Principles and guidelines for access to research data from public funding. 2006. [cited 2015 Jan 14]. Available at: www.oecd.org/sti/sci-tech/38500813.pdf. 3. Pierangela Samarati, Latanya Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Proc Symp Res Secur Priv 1998. 4. Florian Kohlmayer*, Fabian Prasser*, Claudia Eckert, Alfons Kemper and Klaus A. Kuhn. Highly efficient optimal k-anonymity for biomedical datasets. Proc Int Symp CBMS 2012. 5. Florian Kohlmayer*, Fabian Prasser*, Claudia Eckert, Alfons Kemper, Klaus. A. Kuhn. Flash: efficient, stable and optimal k-anonymity. Proc Int Conf PASSAT 2012. 6. Florian Kohlmayer*, Fabian Prasser*, Claudia Eckert, Klaus A. Kuhn. A flexible approach to distributed data anonymization. J Biomed Inform 2013. 7. Fabian Prasser*, Florian Kohlmayer*, Klaus A. Kuhn. A benchmark of globally-optimal anonymization methods for biomedical data. Proc Int Symp CMBS 2014. 8. Fabian Prasser*, Florian Kohlmayer*, Ronald Lautenschlaeger, Klaus A. Kuhn. ARX A comprehensive tool for anonymizing biomedical data. AMIA Annu Symp Proc 2014. *Equal contributors