Methodology for sequencing sensitive data encryption methods are improved using the applied mathematics model
DOI:
https://doi.org/10.61841/3m798z46Keywords:
non-reversible encryption, hash encoding,, log binding, s, ecurity.Abstract
The log allows a link to aggregate the records of the same person from several sources, and thus can improve the feasibility of epidemiological research such as population studies. Security is important. Encryption of computer records and links to medical information chain for disease surveillance logo CNRS logo INIST Accrual / Home Improper / Print Contact / Contact Bookmark and Share Mendeley. It is presented before the identity is performed when a hash code is used based on the standard hash algorithm (S HA) function. Once the patient is anonymous ANONYMAT using a program, we can associate it in a way that takes many variables of definition into account. Several things have been done to connect the anonymous record both internally and externally. The applications show that the use of ANONYMAT software is possible to make respect for data confidentiality legislation without preventing access of data.
This chapter recalls some fundamental notions necessary for the understanding of the document, mainly on the Boolean functions applied to cryptography as well as on the niter bodies of characteristic 2 which we need. For the informed reader and connoisseur, it is quite possible to go directly to the next chapter and to enter the body of the document.
Downloads
References
1. ABRIAL V. (1998). Objective contracts between the public health establishments and the regional hospitalization agency: environmental analysis of the St-Tienne University Hospital. Thesis of Doctor in Medicine. University of Franche-Comté.
2. Regional Hospitalization Agency of Rhône-Alpes (1997). Investigation mission on medical and pharmaceutical expenses: Lyon 6 November.
3. ALDEGHI L, SIMON M.-O. (2002). Observatory of RMI entries and exits in Paris, report of the first
wave, reports management – CREDOC- December 2002 No. 226.
4. Azhar malik, Opción, Año 35, Especial No.19 (2019): Develop data encryption by using mathematical complement,pp 2407-2422
5. ALDEGHI L, OLM C. (2004). Observatory of RMI entries and exits in Paris. In Pascal Ardilly (ed.), "Sampling and Survey Methods", Dunod, Paris, pp 342-348.
6. BECKETT B. (1990). Introduction to cryptology methods, Masson, Paris. BORST F., ALLAERT F.- A., QUANTIN C. (2001). The Swiss solution for anonymously chaining patient files. Proc. MEDINFO 2001; IMIA: 1239-41.
7. BOUZELAT H. (1998). Anonymity and chaining of medical files for epidemiological studies. Thesis of Doctor of University specialized in Medical Informatics. University of Burgundy.
8. BRASSARD G. (1993). Contemporary cryptology, Masson, Paris. BRENNER H., SCHMIDTMANN I., STEGMAIER C. (1997). EfFects of record linkage errors on registry-based follow-up studies. Statistics in Medicine, 16 (23), 2633- 43.
9. Circular DHOS-PMSI-2001 No. 106 of 22 February 2001 relating to the chaining of stays in health facilities as part of the program of medicalization of information systems (PMSI).
10. COHEN O., MERMET M.-A., DEMONGEOT J. (2001). HC Forum®: a web site based on an
international human cytogenetic database. Nucleic Acids Research, 9, 305-307.
11. CORNET B., GOUYON J.-B., BINQUET C, SAGOT P., FERDYNUS C, METAL P., QUANTIN C.
(2001). Regional perinatal assessment: establishment of a continuous collection of indicators. Journal of Epidemiology and Public Health, 49, 583-593.
12. Decree defining the conditions under which the declarations and authorizations concerning the means
and services of cryptology are subscribed, n ° 98-101 of February 24, 1998.
13. Order fixing the list of means and services of cryptology exempted from any prior formality, No. 98- 206 of 23 March 1998.
14. Order fixing the list of means and services of cryptology for which the declaration replaces the authorization, n ° 98-207 of March 23, 1998.
15. Decree n ° 99-199 of March 17, 1999 defining the categories of means and services of cryptology for which the procedure of preliminary declaration is substituted for that of authorization.
16. DOUGLAS S. (1996). Cryptology, Theory and Practice, International Thomson Publishing.
17. FlSHER F., MADGE B. (1996). Data security and patient confidentiality: the manager's role. International Journal of Biomedical Computer, 43, 115-119.
18. GOUYON B., METAL P., FROMAGET J., SAGOT P., GOUYON J.-B (1999). Perinatal network of
Burgundy. Technology and Health, 37, 51-56.
19. JARO M.-A. (1995). Probabilistic-linkage of large public health data files. Statistics in Medicine, 14, 491-8.
20. Law No. 98-1266 of 30 December 1998 (Article 107). Finance law for the year 1999.
21. Letter from the Institut de Veille Sanitaire, prevalence, n ° 8, July 2003.
22. MARSAULT X. (1995). Compression and encryption of multimedia data, Hermès, Paris.
23. MERLIÈRE Y. (2004). "I SNIIR-AM" communication at the Journées de Statistique May 25, 2004, Montpellier.
24. QUANTIN C, BOUZELAT H., ALLAËRT F.-A. et al. (1998). Automatic record hash coding and
linkage for epidemiological follow-up data confidentiality. Methods of Information in Medicine, 37, 271-277.
25. QUANTIN C., ALLAERT F.-A., ATHis P., DUSSERRE L. (1999). Can a database be anonymous? MIE 99, Slovenia, 22-26 August 1999, 297-301.
26. QUANTIN C., ALLAERT F.-A., DUSSERRE L. (2000a). Anonymous statistical methods versus
cyrptographic methods in epidemiology. International Journal of Medical Informatics, 60, 177-83.
27. QUANTIN C, ALLAERT F.-A., BOUZELAT H., RODRIGUES J.-M., TROMBERTPAVIOT B.,
BRUNET-LECOMTE P., GREMY F., DUSSERRE L. (2000b). The security of medical information networks: application to epidemiological studies. Journal of Epidemiology and Public Health, 48, 89-99.
28. QUANTIN C, BINQUET C, BOURQUARD K., PATTISINA R., GOUYON B., FERDYNUS C,
GOUYON J.-B., ALLAERT F.-A. (2004). Which are the best identifiers for record linkage? Medical Informatics and the Internet Medicine, 29 (3-4), 221-227.
29. QUANTIN C, BINQUET C, ALLAERT F.-A., GOUYON B., PATTISINA R., TEUFF G.,
FERDYNUS C, GOUYON J.-B. (2005). Decision analysis for the assessment of a record linkage procedure: application to a perinatal network. Methods of Information in Medicine, 44, 72-79.
RIVEST R.L., SHAMIR A., ADLEMAN L. (1978). A method for obtaining digital signatures and public key cryptosystems, CACM, 2, 120.
30. SUGARMAN J.-R., HOLLIDAY M., Ross A. et al. (1996). Improving American Indian cancer data in the Washington state using Indian health services and t ribal records. American Cancer Society, 78 (7suppl), 1564-8.
31. SWEENEY L. (1998). Three Computational Systems for Disclosing Medical Data in the Year 1999. MEDINFO 98, IMIA, B. Cesnik, A. McCray, J.-R. Scherrer (Eds). IOS Press, Amsterdam, 1124-1129.
32. THIRION X., SAMBUC R., SAN MARCO J.-L. (1988). Epidemiology and anonymity: a new method. Journal of Pidemiology and Public Health, 36, 36-42.
33. TROUESSIN G., ALLAERT F.-A. (1997). HAY: a nominative information occultation function. MIE, 3, 196-200.
34. TROUESSIN G. "Diagnostic and Therapeutic Quality in Cancer" report: communication of multimedia
information in a multidisciplinary secure network. Security of medical information in telemedicine ", study of the Ministry of Research.
35. VuiLLET-TAVERNlER S. (2000). Reflection on anonymity in the processing of health data. Medicine and Law, 40, 1-4.
36. WLLLLENBORG L.C.R.J., WALL A.G., KELLER W.J (1995). Some Methodologies! Issues in
Statistical Disclosure Control. Statistics Netherlands, Department of Statistical Methods. Second Cathy Marsh Memorial Seminar, November 7, London.
37. ZIMMERMANN P. (1986). A proposed standard format for RSA cryptosystems, Boulder Software Engineering, Computer, 9, 21.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.