Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption

被引:0
|
作者
Rodrigues, Bruno [1 ]
Amorim, Ivone [2 ]
Silva, Ivan [2 ]
Mendes, Alexandra [1 ,3 ]
机构
[1] Univ Porto, Fac Engn, Porto, Portugal
[2] Polytech Porto, PORTIC Porto Res Technol & Innovat Ctr, P-4200374 Porto, Portugal
[3] HASLab INESC TEC, Porto, Portugal
关键词
data-sovereignty; cryptography; PRE; access delegation; e-health; PHR; SECURITY; PRIVACY; RECORDS;
D O I
10.1007/978-3-031-54204-6_11
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The exponential growth in the digitisation of services implies the handling and storage of large volumes of data. Businesses and services see data sharing and crossing as an opportunity to improve and produce new business opportunities. The health sector is one area where this proves to be true, enabling better and more innovative treatments. Notwithstanding, this raises concerns regarding personal data being treated and processed. In this paper, we present a patient-centric platform for the secure sharing of health records by shifting the control over the data to the patient, therefore, providing a step further towards data sovereignty. Data sharing is performed only with the consent of the patient, allowing it to revoke access at any given time. Furthermore, we also provide a break-glass approach, resorting to Proxy Re-encryption (PRE) and the concept of a centralised trusted entity that possesses instant access to patients' medical records. Lastly, an analysis is made to assess the performance of the platform's key operations, and the impact that a PRE scheme has on those operations.
引用
收藏
页码:199 / 215
页数:17
相关论文
共 50 条
  • [1] Proxy Re-encryption with Unforgeable Re-encryption Keys
    Guo, Hui
    Zhang, Zhenfeng
    Zhang, Jiang
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 20 - 33
  • [2] On the Use of Proxy Re-Encryption to Control Access to Sensitive Data on Information Centric Networking
    da Silva, Roan Simoes
    Zorzo, Sergio Donizetti
    2016 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2016, : 7 - 12
  • [3] Combined Proxy Re-encryption
    Canard, Sebastien
    Devigne, Julien
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 49 - 66
  • [4] Anonymous proxy re-encryption
    Shao, Jun
    Liu, Peng
    Wei, Guiyi
    Ling, Yun
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 439 - 449
  • [5] Data sharing using proxy re-encryption based on DNA computing
    Ahmed Elhadad
    Soft Computing, 2020, 24 : 2101 - 2108
  • [6] Data sharing using proxy re-encryption based on DNA computing
    Elhadad, Ahmed
    SOFT COMPUTING, 2020, 24 (03) : 2101 - 2108
  • [7] Accountable Proxy Re-Encryption for Secure Data Sharing
    Guo, Hui
    Zhang, Zhenfeng
    Xu, Jing
    An, Ningyu
    Lan, Xiao
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 145 - 159
  • [8] A proxy broadcast re-encryption for cloud data sharing
    Sun, Maosheng
    Ge, Chunpeng
    Fang, Liming
    Wang, Jiandong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 10455 - 10469
  • [9] A proxy broadcast re-encryption for cloud data sharing
    Maosheng Sun
    Chunpeng Ge
    Liming Fang
    Jiandong Wang
    Multimedia Tools and Applications, 2018, 77 : 10455 - 10469
  • [10] A Pre-Authentication Approach to Proxy Re-Encryption in Big Data Context
    Wang, Kun
    Yu, Jiahui
    Liu, Xiulong
    Guo, Song
    IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) : 657 - 667