Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption

被引:0
|
作者
Rodrigues, Bruno [1 ]
Amorim, Ivone [2 ]
Silva, Ivan [2 ]
Mendes, Alexandra [1 ,3 ]
机构
[1] Univ Porto, Fac Engn, Porto, Portugal
[2] Polytech Porto, PORTIC Porto Res Technol & Innovat Ctr, P-4200374 Porto, Portugal
[3] HASLab INESC TEC, Porto, Portugal
来源
COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, PT I | 2024年 / 14398卷
关键词
data-sovereignty; cryptography; PRE; access delegation; e-health; PHR; SECURITY; PRIVACY; RECORDS;
D O I
10.1007/978-3-031-54204-6_11
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The exponential growth in the digitisation of services implies the handling and storage of large volumes of data. Businesses and services see data sharing and crossing as an opportunity to improve and produce new business opportunities. The health sector is one area where this proves to be true, enabling better and more innovative treatments. Notwithstanding, this raises concerns regarding personal data being treated and processed. In this paper, we present a patient-centric platform for the secure sharing of health records by shifting the control over the data to the patient, therefore, providing a step further towards data sovereignty. Data sharing is performed only with the consent of the patient, allowing it to revoke access at any given time. Furthermore, we also provide a break-glass approach, resorting to Proxy Re-encryption (PRE) and the concept of a centralised trusted entity that possesses instant access to patients' medical records. Lastly, an analysis is made to assess the performance of the platform's key operations, and the impact that a PRE scheme has on those operations.
引用
收藏
页码:199 / 215
页数:17
相关论文
共 50 条
  • [31] Identity based Proxy Re-Encryption using Forward Security in Cloud Framework
    Bankar, Jaitee
    Raghatwan, Jyoti
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [32] An improved proxy re-encryption scheme using resource optimization and authentication protocol
    Burra, Vijaya Babu
    Pachala, Sunitha
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023,
  • [33] Efficient Fine-Grained Data Sharing Based on Proxy Re-Encryption in IIoT
    Zhang, Qingyang
    Fu, Yujie
    Cui, Jie
    He, Debiao
    Zhong, Hong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5797 - 5809
  • [34] Conditional Identity-Based Broadcast Proxy Re-Encryption With Anonymity and Revocation
    Chen, Liqing
    Zhang, Meng
    Li, Jiguo
    IEEE TRANSACTIONS ON RELIABILITY, 2025,
  • [35] PRE+: dual of proxy re-encryption for secure cloud data sharing service
    Wang, Xu An
    Xhafa, Fatos
    Ma, Jianfeng
    Barolli, Leonard
    Ge, Yunlong
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 44 - 69
  • [36] Proxy re-encryption architect for storing and sharing of cloud contents
    Rawal, Bharat S.
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2020, 35 (03) : 219 - 235
  • [37] Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption
    Luo, Fucai
    Al-Kuwari, Saif
    Susilo, Willy
    Duong, Dung Hoang
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2398 - 2408
  • [38] Non-transferable proxy re-encryption for multiple groups
    Cho, Ei Mon
    San, Lwin
    Koshiba, Takeshi
    INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2018, 8 (01) : 20 - 29
  • [39] Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts
    Kawai, Yutaka
    Matsuda, Takahiro
    Hirano, Takato
    Koseki, Yoshihiro
    Hanaoka, Goichiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01): : 81 - 98
  • [40] A novel authorization delegation scheme for multimedia social networks by using proxy re-encryption
    Feng, Weining
    Zhang, Zhiyong
    Wang, Jian
    Han, Linqian
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) : 13995 - 14014