The machine giveth and the machine taketh away: a parrot attack on clinical text deidentified with hiding in plain sight

Author:

Carrell David S1ORCID,Cronkite David J1,Li Muqun (Rachel)2,Nyemba Steve3,Malin Bradley A345,Aberdeen John S6,Hirschman Lynette6

Affiliation:

1. Kaiser Permanente Washington Health Research Institute, Seattle, Washington, USA

2. Privacy Analytics Inc, Ottawa, Ontario, Canada

3. Department of Biomedical Informatics, Vanderbilt University Medical Center, Nashville, Tennessee, USA

4. Department of Biostatistics, Vanderbilt University Medical Center, Nashville, Tennessee, USA

5. Department of Electrical Engineering and Computer Science, Vanderbilt University, Nashville, Tennessee, USA

6. The MITRE Corp, Bedford, Massachusetts, USA

Abstract

Abstract Objective Clinical corpora can be deidentified using a combination of machine-learned automated taggers and hiding in plain sight (HIPS) resynthesis. The latter replaces detected personally identifiable information (PII) with random surrogates, allowing leaked PII to blend in or “hide in plain sight.” We evaluated the extent to which a malicious attacker could expose leaked PII in such a corpus. Materials and Methods We modeled a scenario where an institution (the defender) externally shared an 800-note corpus of actual outpatient clinical encounter notes from a large, integrated health care delivery system in Washington State. These notes were deidentified by a machine-learned PII tagger and HIPS resynthesis. A malicious attacker obtained and performed a parrot attack intending to expose leaked PII in this corpus. Specifically, the attacker mimicked the defender’s process by manually annotating all PII-like content in half of the released corpus, training a PII tagger on these data, and using the trained model to tag the remaining encounter notes. The attacker hypothesized that untagged identifiers would be leaked PII, discoverable by manual review. We evaluated the attacker’s success using measures of leak-detection rate and accuracy. Results The attacker correctly hypothesized that 211 (68%) of 310 actual PII leaks in the corpus were leaks, and wrongly hypothesized that 191 resynthesized PII instances were also leaks. One-third of actual leaks remained undetected. Discussion and Conclusion A malicious parrot attack to reveal leaked PII in clinical text deidentified by machine-learned HIPS resynthesis can attenuate but not eliminate the protective effect of HIPS deidentification.

Funder

National Library of Medicine

Publisher

Oxford University Press (OUP)

Subject

Health Informatics

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3