The SERUMS tool-chain: Ensuring Security and Privacy of Medical Data in Smart Patient-Centric Healthcare Systems

被引:0
作者
Janjic, V. [1 ]
Bowles, J. K. F. [1 ]
Vermeulen, A. F. [1 ]
Silvina, A. [1 ]
Belk, M. [2 ]
Fidas, C. [2 ]
Pitsillides, A. [2 ]
Kumar, M. [3 ]
Rossbory, M. [3 ]
Vinov, M. [4 ]
Given-Wilson, T. [5 ]
Legay, A. [5 ]
Blackledge, E. [6 ]
Arredouani, R. [7 ]
Stylianou, G. [7 ]
Huang, W. [7 ]
机构
[1] Univ St Andrews, Sch Comp Sci, St Andrews, Fife, Scotland
[2] Univ Cyprus, Dept Comp Sci, Nicosia, Cyprus
[3] Software Competence Ctr Hagenberg, Data Anal Syst, Hagenberg, Austria
[4] IBM Res Lab, Haifa, Israel
[5] Catholic Univ Louvain, Louvain La Neuve, Belgium
[6] Sopra Steria, Edinburgh, Midlothian, Scotland
[7] Accenture BV, Amsterdam, Netherlands
来源
2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA) | 2019年
基金
欧盟地平线“2020”;
关键词
Medical data; Smart Healthcare; Data Sharing; Privacy; Security; Personalised Medicine;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Future-generation healthcare systems will be highly distributed, combining centralised hospital systems with decentralised home-, work- and environment-based monitoring and diagnostics systems. These will reduce costs and injury-related risks whilst both improving quality of service, and reducing the response time for diagnostics and treatments made available to patients. To make this vision possible, medical data must be accessed and shared over a variety of mediums including untrusted networks. In this paper, we present the design and initial implementation of the SERUMS tool-chain for accessing, storing, communicating and analysing highly confidential medical data in a safe, secure and privacy-preserving way. In addition, we describe a data fabrication framework for generating large volumes of synthetic but realistic data, that is used in the design and evaluation of the tool-chain. We demonstrate the present version of our technique on a use case derived from the Edinburgh Cancer Centre, NHS Lothian, where information about the effects of chemotherapy treatments on cancer patients is collected from different distributed databases, analysed and adapted to improve ongoing treatments.
引用
收藏
页码:2726 / 2735
页数:10
相关论文
共 25 条
[11]   Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures [J].
Fredrikson, Matt ;
Jha, Somesh ;
Ristenpart, Thomas .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1322-1333
[12]  
Hadjidemetriou G., 2019, CHI 2019
[13]  
Heifetz A, 2017, IEEE INT CONF BIG DA, P1033, DOI 10.1109/BigData.2017.8258027
[14]  
Inmon W H., 2015, Data Architecture: A Primer for the Data Scientist: Big Data, Data Warehouse, Data Vault
[15]  
Li S., 2016, GEOSPATIAL BIG DATA
[16]  
Linstedt D., 2012, DATA VAULT 2 0 BEING
[17]  
Linstedt D., 2016, DATA VAULT 2 0
[18]   Investigating User Behavior for Authentication Methods: A Comparison between Individuals with Down Syndrome and Neurotypical Users [J].
Ma, Yao ;
Feng, Jinjuan ;
Kumin, Libby ;
Lazar, Jonathan .
ACM TRANSACTIONS ON ACCESSIBLE COMPUTING, 2013, 4 (04)
[19]  
Phan N, 2016, AAAI CONF ARTIF INTE, P1309
[20]  
Nicholson BP, 2013, AGE-RELATED MACULAR DEGENERATION, 3RD EDITION, P323