Health Records and the Cloud Computing Paradigm from a Privacy Perspective

被引:6
作者
Stingl, Christian [1 ]
Slamanig, Daniel [1 ]
机构
[1] Carinthia Univ Appl Sci, Dept Med Informat Technol, A-9020 Klagenfurt, Austria
关键词
electronic health record; personal health record; cloud computing; privacy aspects; privacy protection; PROVABLY SECURE;
D O I
10.1260/2040-2295.2.4.487
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
With the advent of cloud computing, the realization of highly available electronic health records providing location-independent access seems to be very promising. However, cloud computing raises major security issues that need to be addressed particularly within the health care domain. The protection of the privacy of individuals often seems to be left on the sidelines. For instance, common protection against malicious insiders, i.e., non-disclosure agreements, is purely organizational. Clearly, such measures cannot prevent misuses but can at least discourage it. In this paper, we present an approach to storing highly sensitive health data in the cloud whereas the protection of patient's privacy is exclusively based on technical measures, so that users and providers of health records do not need to trust the cloud provider with privacy related issues. Our technical measures comprise anonymous communication and authentication, anonymous yet authorized transactions and pseudonymization of databases.
引用
收藏
页码:487 / 508
页数:22
相关论文
共 29 条
  • [1] Alhaqbani B, 2008, 2008 10TH IEEE INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES, P108, DOI 10.1109/HEALTH.2008.4600120
  • [2] Ateniese G, 2000, LECT NOTES COMPUT SC, V1880, P255
  • [3] Bellare M., 1994, P EUROCRYPT, P92, DOI DOI 10.1007/BFB0053428
  • [4] Bellare M, 2007, LECT NOTES COMPUT SC, V4622, P535
  • [5] Benaloh J. C., 1988, LECT NOTES COMPUTER, V403, P27, DOI DOI 10.1007/0-387-34799-2_3
  • [6] Short group signatures
    Boneh, D
    Boyen, X
    Shacham, H
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 41 - 55
  • [7] Caumanns J., 2006, INFORM SPEKTRUM, V29, P323
  • [8] Cramer R, 1998, LECT NOTES COMPUT SC, V1462, P13, DOI 10.1007/BFb0055717
  • [9] *CSI, 2007, COMP CRIM SEC SURV 2
  • [10] Danezis G., 2008, Tech. rep. Technical Report MSR-TR-2008-35