Privacy-preserving Distributed Access Control for Medical Data

Christian Maulany, Majid Nateghizad, Bart Mennink, Zekeriya Erkin

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review


The availability of wearable devices such as smartwatches and fitness trackers are a recent development. Among other things, these devices can measure the activity and vital signs of their wearers. As the types of data these devices are able to gather increases the potential for them to be used as a source of data grows. This calls for a secure method of controlling the digital exchange of medical data between wearables and healthcare providers, and healthcare providers in general. By enforcing the exchange of data to go through a central authority, a patient can be given more control over who is able to access his medical data. This central authority is then given the task of monitoring access and ensuring that all access requirements are met. Though effective, this solution relies on a highly trusted central authority. In this work, we propose a scheme using Polymorphic Encryption and Pseudonomysation and Secret Sharing to provide anonymous data storage and data exchange. Our propos al removes the need for a central authority, and instead uses a group of authorities, of which a quorum is needed to facilitate the exchange of data.
Original languageEnglish
Title of host publicationProceedings of the 15th International Joint Conference on e-Business and Telecommunications
EditorsP. Samarati, M.S. Obaisat
Number of pages10
Volume1: SECRYPT
ISBN (Print)978-989-758-319-3
Publication statusPublished - 2018
EventICETE 2018: The15th International Joint Conference on e-Business and Telecommunications - Porto, Portugal
Duration: 26 Jul 201828 Jul 2018
Conference number: 15


ConferenceICETE 2018


  • Medical Data
  • Privacy
  • Secret Sharing
  • Polymorphic Encryption and Pseudonomysation


Dive into the research topics of 'Privacy-preserving Distributed Access Control for Medical Data'. Together they form a unique fingerprint.

Cite this