Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption

被引:0
|
作者
Rodrigues, Bruno [1 ]
Amorim, Ivone [2 ]
Silva, Ivan [2 ]
Mendes, Alexandra [1 ,3 ]
机构
[1] Univ Porto, Fac Engn, Porto, Portugal
[2] Polytech Porto, PORTIC Porto Res Technol & Innovat Ctr, P-4200374 Porto, Portugal
[3] HASLab INESC TEC, Porto, Portugal
来源
COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, PT I | 2024年 / 14398卷
关键词
data-sovereignty; cryptography; PRE; access delegation; e-health; PHR; SECURITY; PRIVACY; RECORDS;
D O I
10.1007/978-3-031-54204-6_11
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The exponential growth in the digitisation of services implies the handling and storage of large volumes of data. Businesses and services see data sharing and crossing as an opportunity to improve and produce new business opportunities. The health sector is one area where this proves to be true, enabling better and more innovative treatments. Notwithstanding, this raises concerns regarding personal data being treated and processed. In this paper, we present a patient-centric platform for the secure sharing of health records by shifting the control over the data to the patient, therefore, providing a step further towards data sovereignty. Data sharing is performed only with the consent of the patient, allowing it to revoke access at any given time. Furthermore, we also provide a break-glass approach, resorting to Proxy Re-encryption (PRE) and the concept of a centralised trusted entity that possesses instant access to patients' medical records. Lastly, an analysis is made to assess the performance of the platform's key operations, and the impact that a PRE scheme has on those operations.
引用
收藏
页码:199 / 215
页数:17
相关论文
共 50 条
  • [1] A Pre-Authentication Approach to Proxy Re-Encryption in Big Data Context
    Wang, Kun
    Yu, Jiahui
    Liu, Xiulong
    Guo, Song
    IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) : 657 - 667
  • [2] On the Use of Proxy Re-Encryption to Control Access to Sensitive Data on Information Centric Networking
    da Silva, Roan Simoes
    Zorzo, Sergio Donizetti
    2016 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2016, : 7 - 12
  • [3] A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain
    Agyekum, Kwame Opuni-Boachie Obour
    Xia, Qi
    Sifah, Emmanuel Boateng
    Cobblah, Christian Nii Aflah
    Xia, Hu
    Gao, Jianbin
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1685 - 1696
  • [4] Accountable Proxy Re-Encryption for Secure Data Sharing
    Guo, Hui
    Zhang, Zhenfeng
    Xu, Jing
    An, Ningyu
    Lan, Xiao
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 145 - 159
  • [5] Data sharing using proxy re-encryption based on DNA computing
    Elhadad, Ahmed
    SOFT COMPUTING, 2020, 24 (03) : 2101 - 2108
  • [6] Data sharing using proxy re-encryption based on DNA computing
    Ahmed Elhadad
    Soft Computing, 2020, 24 : 2101 - 2108
  • [7] An identity-based proxy re-encryption for data deduplication in cloud
    Kan, Ge
    Jin, Chunhua
    Zhu, Huihui
    Xu, Yongliang
    Liu, Nian
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 121
  • [8] Proxy Re-Encryption in Access Control Framework of Information-Centric Networks
    Wang, Qiang
    Li, Wenchao
    Qin, Zhiguang
    IEEE ACCESS, 2019, 7 : 48417 - 48429
  • [9] Efficient Unidirectional Proxy Re-Encryption
    Chow, Sherman S. M.
    Weng, Jian
    Yang, Yanjiang
    Deng, Robert H.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 316 - +
  • [10] Enhanced Timing Enabled Proxy Re-Encryption Model for E-Health Data in the Public Cloud
    Bhateja, Richa
    Saxena, Naman
    Acharjya, Debi Prasanna
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 2040 - 2044