Secure Sharing Scheme of Sensitive Data in the Precision Medicine System

被引:3
作者
Kim, Deukhun [1 ]
Kim, Heejin [2 ]
Kwak, Jin [3 ]
机构
[1] Ajou Univ, Dept Comp Engn, ISAA Lab, Suwon 16499, South Korea
[2] Korea Orphan & Essential Drug Ctr, Seoul 04523, South Korea
[3] Ajou Univ, Dept Cyber Secur, Suwon 16499, South Korea
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2020年 / 64卷 / 03期
关键词
Precision medicine; sensitive data; keyless signature infrastructure; data sharing; BIG DATA; ETHICS FRAMEWORK; HEALTH; AUTHENTICATION;
D O I
10.32604/cmc.2020.010535
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Numerous industries, especially the medical industry, are likely to exhibit significant developments in the future. Ever since the announcement of the precision medicine initiative by the United States in 2015, interest in the field has considerably increased. The techniques of precision medicine are employed to provide optimal treatment and medical services to patients, in addition to the prevention and management of diseases via the collection and analysis of big data related to their individual genetic characteristics, occupation, living environment, and dietary habits. As this involves the accumulation and utilization of sensitive information, such as patient history, DNA, and personal details, its implementation is difficult if the data are inaccurate, exposed, or forged, and there is also a concern for privacy, as massive amount of data are collected; hence, ensuring the security of information is essential. Therefore, it is necessary to develop methods of securely sharing sensitive data for the establishment of a precision medicine system. An authentication and data sharing scheme is presented in this study on the basis of an analysis of sensitive data. The proposed scheme securely shares sensitive data of each entity in the precision medicine system according to its architecture and data flow.
引用
收藏
页码:1527 / 1553
页数:27
相关论文
共 24 条
[1]   Protecting privacy to protect mental health: the new ethical imperative [J].
Aboujaoude, Elias .
JOURNAL OF MEDICAL ETHICS, 2019, 45 (09) :604-607
[2]  
[Anonymous], 2015, PRECISION MED INITIA
[3]   Long-term integrity protection of genomic data [J].
Buchmann, Johannes ;
Geihs, Matthias ;
Hamacher, Kay ;
Katzenbeisser, Stefan ;
Stammler, Sebastian .
EURASIP JOURNAL ON INFORMATION SECURITY, 2019, 2019 (01)
[4]  
Buldas A., 2013, KEYLESS SIGNATURES I
[5]   Perfectly Secure and Efficient Two-Party Electronic-Health-Record Linkage [J].
Chen, Feng ;
Jiang, Xiaoqian ;
Wang, Shuang ;
Schilling, Lisa M. ;
Meeker, Daniella ;
Ong, Toan ;
Matheny, Michael E. ;
Doctor, Jason N. ;
Ohno-Machado, Lucila ;
Vaidya, Jaideep .
IEEE INTERNET COMPUTING, 2018, 22 (02) :32-41
[6]  
Desmond-Hellmann Susan., 2011, PREC MED BUILD KNOWL
[7]  
Ferryman K., 2018, PRECISION MED NATL A, DOI [10.1109/TDC.2018.8440380, DOI 10.1109/TDC.2018.8440380]
[8]   Location Data Record Privacy Protection Based on Differential Privacy Mechanism [J].
Gu, Ke ;
Yang, Lihao ;
Yin, Bo .
INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (04) :639-654
[9]   PPNC: Privacy Preserving Scheme for Random Linear Network Coding in Smart Grid [J].
He, Shiming ;
Zeng, Weini ;
Xie, Kun ;
Yang, Hongming ;
Lai, Mingyong ;
Su, Xin .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (03) :1510-1532
[10]  
Klonoff David C, 2017, J Diabetes Sci Technol, V11, P220, DOI 10.1177/1932296816680006