Privacy-preserving Distributed Access Control for Medical Data

Christian Maulany, Majid Nateghizad, Bart Mennink, Zekeriya Erkin

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Abstract

The availability of wearable devices such as smartwatches and fitness trackers are a recent development. Among other things, these devices can measure the activity and vital signs of their wearers. As the types of data these devices are able to gather increases the potential for them to be used as a source of data grows. This calls for a secure method of controlling the digital exchange of medical data between wearables and healthcare providers, and healthcare providers in general. By enforcing the exchange of data to go through a central authority, a patient can be given more control over who is able to access his medical data. This central authority is then given the task of monitoring access and ensuring that all access requirements are met. Though effective, this solution relies on a highly trusted central authority. In this work, we propose a scheme using Polymorphic Encryption and Pseudonomysation and Secret Sharing to provide anonymous data storage and data exchange. Our propos al removes the need for a central authority, and instead uses a group of authorities, of which a quorum is needed to facilitate the exchange of data.
Original languageEnglish
Title of host publicationProceedings of the 15th International Joint Conference on e-Business and Telecommunications
EditorsP. Samarati, M.S. Obaisat
PublisherSciTePress
Pages322-331
Number of pages10
Volume1: SECRYPT
ISBN (Print)978-989-758-319-3
DOIs
Publication statusPublished - 2018
EventICETE 2018: The15th International Joint Conference on e-Business and Telecommunications - Porto, Portugal
Duration: 26 Jul 201828 Jul 2018
Conference number: 15

Conference

ConferenceICETE 2018
CountryPortugal
CityPorto
Period26/07/1828/07/18

Keywords

  • Medical Data
  • Privacy
  • Secret Sharing
  • Polymorphic Encryption and Pseudonomysation

Fingerprint

Dive into the research topics of 'Privacy-preserving Distributed Access Control for Medical Data'. Together they form a unique fingerprint.

Cite this