Methodology for sequencing sensitive data encryption methods are improved using the applied mathematics model

Authors

  • Azhar malik University of Technology/ Baghdad / Iraq Author

DOI:

https://doi.org/10.61841/3m798z46

Keywords:

non-reversible encryption, hash encoding,, log binding, s, ecurity.

Abstract

The log allows a link to aggregate the records of the same person from several sources, and thus can improve the feasibility of epidemiological research such as population studies. Security is important. Encryption of computer records and links to medical information chain for disease surveillance logo CNRS logo INIST Accrual / Home Improper / Print Contact / Contact Bookmark and Share Mendeley. It is presented before the identity is performed when a hash code is used based on the standard hash algorithm (S HA) function. Once the patient is anonymous ANONYMAT using a program, we can associate it in a way that takes many variables of definition into account. Several things have been done to connect the anonymous record both internally and externally. The applications show that the use of ANONYMAT software is possible to make respect for data confidentiality legislation without preventing access of data.

This chapter recalls some fundamental notions necessary for the understanding of the document, mainly on the Boolean functions applied to cryptography as well as on the niter bodies of characteristic 2 which we need. For the informed reader and connoisseur, it is quite possible to go directly to the next chapter and to enter the body of the document.

 

Downloads

Download data is not yet available.

References

1. ABRIAL V. (1998). Objective contracts between the public health establishments and the regional hospitalization agency: environmental analysis of the St-Tienne University Hospital. Thesis of Doctor in Medicine. University of Franche-Comté.

2. Regional Hospitalization Agency of Rhône-Alpes (1997). Investigation mission on medical and pharmaceutical expenses: Lyon 6 November.

3. ALDEGHI L, SIMON M.-O. (2002). Observatory of RMI entries and exits in Paris, report of the first

wave, reports management – CREDOC- December 2002 No. 226.

4. Azhar malik, Opción, Año 35, Especial No.19 (2019): Develop data encryption by using mathematical complement,pp 2407-2422

5. ALDEGHI L, OLM C. (2004). Observatory of RMI entries and exits in Paris. In Pascal Ardilly (ed.), "Sampling and Survey Methods", Dunod, Paris, pp 342-348.

6. BECKETT B. (1990). Introduction to cryptology methods, Masson, Paris. BORST F., ALLAERT F.- A., QUANTIN C. (2001). The Swiss solution for anonymously chaining patient files. Proc. MEDINFO 2001; IMIA: 1239-41.

7. BOUZELAT H. (1998). Anonymity and chaining of medical files for epidemiological studies. Thesis of Doctor of University specialized in Medical Informatics. University of Burgundy.

8. BRASSARD G. (1993). Contemporary cryptology, Masson, Paris. BRENNER H., SCHMIDTMANN I., STEGMAIER C. (1997). EfFects of record linkage errors on registry-based follow-up studies. Statistics in Medicine, 16 (23), 2633- 43.

9. Circular DHOS-PMSI-2001 No. 106 of 22 February 2001 relating to the chaining of stays in health facilities as part of the program of medicalization of information systems (PMSI).

10. COHEN O., MERMET M.-A., DEMONGEOT J. (2001). HC Forum®: a web site based on an

international human cytogenetic database. Nucleic Acids Research, 9, 305-307.

11. CORNET B., GOUYON J.-B., BINQUET C, SAGOT P., FERDYNUS C, METAL P., QUANTIN C.

(2001). Regional perinatal assessment: establishment of a continuous collection of indicators. Journal of Epidemiology and Public Health, 49, 583-593.

12. Decree defining the conditions under which the declarations and authorizations concerning the means

and services of cryptology are subscribed, n ° 98-101 of February 24, 1998.

13. Order fixing the list of means and services of cryptology exempted from any prior formality, No. 98- 206 of 23 March 1998.

14. Order fixing the list of means and services of cryptology for which the declaration replaces the authorization, n ° 98-207 of March 23, 1998.

15. Decree n ° 99-199 of March 17, 1999 defining the categories of means and services of cryptology for which the procedure of preliminary declaration is substituted for that of authorization.

16. DOUGLAS S. (1996). Cryptology, Theory and Practice, International Thomson Publishing.

17. FlSHER F., MADGE B. (1996). Data security and patient confidentiality: the manager's role. International Journal of Biomedical Computer, 43, 115-119.

18. GOUYON B., METAL P., FROMAGET J., SAGOT P., GOUYON J.-B (1999). Perinatal network of

Burgundy. Technology and Health, 37, 51-56.

19. JARO M.-A. (1995). Probabilistic-linkage of large public health data files. Statistics in Medicine, 14, 491-8.

20. Law No. 98-1266 of 30 December 1998 (Article 107). Finance law for the year 1999.

21. Letter from the Institut de Veille Sanitaire, prevalence, n ° 8, July 2003.

22. MARSAULT X. (1995). Compression and encryption of multimedia data, Hermès, Paris.

23. MERLIÈRE Y. (2004). "I SNIIR-AM" communication at the Journées de Statistique May 25, 2004, Montpellier.

24. QUANTIN C, BOUZELAT H., ALLAËRT F.-A. et al. (1998). Automatic record hash coding and

linkage for epidemiological follow-up data confidentiality. Methods of Information in Medicine, 37, 271-277.

25. QUANTIN C., ALLAERT F.-A., ATHis P., DUSSERRE L. (1999). Can a database be anonymous? MIE 99, Slovenia, 22-26 August 1999, 297-301.

26. QUANTIN C., ALLAERT F.-A., DUSSERRE L. (2000a). Anonymous statistical methods versus

cyrptographic methods in epidemiology. International Journal of Medical Informatics, 60, 177-83.

27. QUANTIN C, ALLAERT F.-A., BOUZELAT H., RODRIGUES J.-M., TROMBERTPAVIOT B.,

BRUNET-LECOMTE P., GREMY F., DUSSERRE L. (2000b). The security of medical information networks: application to epidemiological studies. Journal of Epidemiology and Public Health, 48, 89-99.

28. QUANTIN C, BINQUET C, BOURQUARD K., PATTISINA R., GOUYON B., FERDYNUS C,

GOUYON J.-B., ALLAERT F.-A. (2004). Which are the best identifiers for record linkage? Medical Informatics and the Internet Medicine, 29 (3-4), 221-227.

29. QUANTIN C, BINQUET C, ALLAERT F.-A., GOUYON B., PATTISINA R., TEUFF G.,

FERDYNUS C, GOUYON J.-B. (2005). Decision analysis for the assessment of a record linkage procedure: application to a perinatal network. Methods of Information in Medicine, 44, 72-79.

RIVEST R.L., SHAMIR A., ADLEMAN L. (1978). A method for obtaining digital signatures and public key cryptosystems, CACM, 2, 120.

30. SUGARMAN J.-R., HOLLIDAY M., Ross A. et al. (1996). Improving American Indian cancer data in the Washington state using Indian health services and t ribal records. American Cancer Society, 78 (7suppl), 1564-8.

31. SWEENEY L. (1998). Three Computational Systems for Disclosing Medical Data in the Year 1999. MEDINFO 98, IMIA, B. Cesnik, A. McCray, J.-R. Scherrer (Eds). IOS Press, Amsterdam, 1124-1129.

32. THIRION X., SAMBUC R., SAN MARCO J.-L. (1988). Epidemiology and anonymity: a new method. Journal of Pidemiology and Public Health, 36, 36-42.

33. TROUESSIN G., ALLAERT F.-A. (1997). HAY: a nominative information occultation function. MIE, 3, 196-200.

34. TROUESSIN G. "Diagnostic and Therapeutic Quality in Cancer" report: communication of multimedia

information in a multidisciplinary secure network. Security of medical information in telemedicine ", study of the Ministry of Research.

35. VuiLLET-TAVERNlER S. (2000). Reflection on anonymity in the processing of health data. Medicine and Law, 40, 1-4.

36. WLLLLENBORG L.C.R.J., WALL A.G., KELLER W.J (1995). Some Methodologies! Issues in

Statistical Disclosure Control. Statistics Netherlands, Department of Statistical Methods. Second Cathy Marsh Memorial Seminar, November 7, London.

37. ZIMMERMANN P. (1986). A proposed standard format for RSA cryptosystems, Boulder Software Engineering, Computer, 9, 21.

Downloads

Published

30.06.2020

How to Cite

malik, A. (2020). Methodology for sequencing sensitive data encryption methods are improved using the applied mathematics model. International Journal of Psychosocial Rehabilitation, 24(6), 18-34. https://doi.org/10.61841/3m798z46