Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption

被引:0
|
作者
Rodrigues, Bruno [1 ]
Amorim, Ivone [2 ]
Silva, Ivan [2 ]
Mendes, Alexandra [1 ,3 ]
机构
[1] Univ Porto, Fac Engn, Porto, Portugal
[2] Polytech Porto, PORTIC Porto Res Technol & Innovat Ctr, P-4200374 Porto, Portugal
[3] HASLab INESC TEC, Porto, Portugal
来源
COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, PT I | 2024年 / 14398卷
关键词
data-sovereignty; cryptography; PRE; access delegation; e-health; PHR; SECURITY; PRIVACY; RECORDS;
D O I
10.1007/978-3-031-54204-6_11
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The exponential growth in the digitisation of services implies the handling and storage of large volumes of data. Businesses and services see data sharing and crossing as an opportunity to improve and produce new business opportunities. The health sector is one area where this proves to be true, enabling better and more innovative treatments. Notwithstanding, this raises concerns regarding personal data being treated and processed. In this paper, we present a patient-centric platform for the secure sharing of health records by shifting the control over the data to the patient, therefore, providing a step further towards data sovereignty. Data sharing is performed only with the consent of the patient, allowing it to revoke access at any given time. Furthermore, we also provide a break-glass approach, resorting to Proxy Re-encryption (PRE) and the concept of a centralised trusted entity that possesses instant access to patients' medical records. Lastly, an analysis is made to assess the performance of the platform's key operations, and the impact that a PRE scheme has on those operations.
引用
收藏
页码:199 / 215
页数:17
相关论文
共 50 条
  • [41] Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain
    Manzoor, Ahsan
    Braeken, An
    Kanhere, Salil S.
    Ylianttila, Mika
    Liyanage, Madhsanka
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 176
  • [42] Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
    Hu, Huidan
    Cao, Zhenfu
    Dong, Xiaolei
    IEEE ACCESS, 2022, 10 : 87322 - 87332
  • [43] Proxy re-encryption for privacy enhancement in Blockchain: Carpooling use case
    Zonda, Damien
    Meddeb, Maroua
    2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020), 2020, : 482 - 489
  • [44] A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Baek, Joonsang
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2907 - 2919
  • [45] Encrypted data processing with Homomorphic Re-Encryption
    Ding, Wenxiu
    Yan, Zheng
    Deng, Robert H.
    INFORMATION SCIENCES, 2017, 409 : 35 - 55
  • [46] A Verifiable proxy re-encryption with keyword search without Random Oracle
    Guo, Lifeng
    Lu, Bo
    Li, Xiangyu
    Xu, He
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 474 - 478
  • [47] A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud
    Chen, Zhanwen
    Chen, Jiageng
    Meng, Weizhi
    2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 569 - 576
  • [48] GROSE: Optimal group size estimation for broadcast proxy re-encryption
    Maiti, Sumana
    Misra, Sudip
    COMPUTER COMMUNICATIONS, 2020, 157 : 369 - 380
  • [49] Heterogeneous signcryption with proxy re-encryption and its application in EHR systems
    Ahene, Emmanuel
    Walker, Joojo
    Gyening, Rose-mary Owusuaa Mensah
    Abdul-Salaam, Gaddafi
    Ben Hayfron-Acquah, James
    TELECOMMUNICATION SYSTEMS, 2022, 80 (01) : 59 - 75
  • [50] IoT Data Blockchain-Based Transaction Model Using Zero-Knowledge Proofs and Proxy Re-encryption
    Guo, Hao
    Cheng, Jieren
    Wang, Janghao
    Chen, Tao
    Yuan, Yuming
    Li, Hui
    Sheng, Victor S.
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT II, 2022, 13339 : 573 - 586