Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption

被引:0
|
作者
Rodrigues, Bruno [1 ]
Amorim, Ivone [2 ]
Silva, Ivan [2 ]
Mendes, Alexandra [1 ,3 ]
机构
[1] Univ Porto, Fac Engn, Porto, Portugal
[2] Polytech Porto, PORTIC Porto Res Technol & Innovat Ctr, P-4200374 Porto, Portugal
[3] HASLab INESC TEC, Porto, Portugal
来源
COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, PT I | 2024年 / 14398卷
关键词
data-sovereignty; cryptography; PRE; access delegation; e-health; PHR; SECURITY; PRIVACY; RECORDS;
D O I
10.1007/978-3-031-54204-6_11
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The exponential growth in the digitisation of services implies the handling and storage of large volumes of data. Businesses and services see data sharing and crossing as an opportunity to improve and produce new business opportunities. The health sector is one area where this proves to be true, enabling better and more innovative treatments. Notwithstanding, this raises concerns regarding personal data being treated and processed. In this paper, we present a patient-centric platform for the secure sharing of health records by shifting the control over the data to the patient, therefore, providing a step further towards data sovereignty. Data sharing is performed only with the consent of the patient, allowing it to revoke access at any given time. Furthermore, we also provide a break-glass approach, resorting to Proxy Re-encryption (PRE) and the concept of a centralised trusted entity that possesses instant access to patients' medical records. Lastly, an analysis is made to assess the performance of the platform's key operations, and the impact that a PRE scheme has on those operations.
引用
收藏
页码:199 / 215
页数:17
相关论文
共 50 条
  • [21] Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing
    Manzoor, Ahsan
    Liyanage, Madhsanka
    Braeken, An
    Kanhere, Salil S.
    Ylianttila, Mika
    2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2019, : 99 - 103
  • [22] Proxy Re-Encryption for Secure Data Sharing with Blockchain in Internet of Medical Things
    Pei, Hongmei
    Yang, Peng
    Li, Weihao
    Du, Miao
    Hu, Zhongjian
    COMPUTER NETWORKS, 2024, 245
  • [23] On the Insecurity of an Identity Based Proxy Re-encryption Scheme
    Wang, Xu An
    Yang, Xiaoyuan
    FUNDAMENTA INFORMATICAE, 2010, 98 (2-3) : 277 - 281
  • [24] Hybrid Proxy Re-encryption Between IBE And CBE
    Zhang, Jindan
    Wang, Xu An
    Yang, Xiaoyuan
    JOURNAL OF COMPUTERS, 2013, 8 (07) : 1873 - 1881
  • [25] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Madani, Sajjad A.
    Ali, Mazhar
    Khan, Atta Ur Rehman
    Shamshirband, Shahaboddin
    JOURNAL OF SUPERCOMPUTING, 2014, 68 (02) : 624 - 651
  • [26] Proxy Re-Encryption Scheme Supporting a Selection of Delegatees
    Devigne, Julien
    Guerrini, Eleonora
    Laguillaumie, Fabien
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 13 - 30
  • [27] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Abdul Nasir Khan
    M. L. Mat Kiah
    Sajjad A. Madani
    Mazhar Ali
    Atta ur Rehman Khan
    Shahaboddin Shamshirband
    The Journal of Supercomputing, 2014, 68 : 624 - 651
  • [28] Certificate-Based Conditional Proxy Re-Encryption
    Li, Jiguo
    Zhao, Xuexia
    Zhang, Yichen
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 299 - 310
  • [29] Secure Outsourced Blockchain-Based Medical Data Sharing System Using Proxy Re-Encryption
    Park, Young-Hoon
    Kim, Yejin
    Lee, Shin-Ok
    Ko, Kwangman
    APPLIED SCIENCES-BASEL, 2021, 11 (20):
  • [30] PREVENTION OF UNAUTHORISED CONTENT SHARING USING WATERMARKING AND PROXY RE-ENCRYPTION IN CLOUD
    Muthusundari, S.
    Bindu, Damisetty Hima
    Menon, AishwaryaVinod
    Harshini, S.
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (02) : 3206 - 3213