A homomorphic encryption-based system for securely managing personal health metrics data

被引:22
作者
Bocu, R. [1 ]
Costache, C. [2 ]
机构
[1] Transilvania Univ Brasov, Dept Math & Comp Sci, Brasov 500091, Romania
[2] IBM Romania, Brasov 500152, Romania
关键词
CLOUD DATA; AGGREGATION; EFFICIENT; INTEGERS; SEARCH;
D O I
10.1147/JRD.2017.2755524
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware and software solutions for the collection of personal health information continue to evolve. Me reliable gathering of personal health information, previously usually possible only in dedicated medical settings, has recently become possible through wearable specialized medical devices. Among other drawbacks, these devices usually do not store the data locally and offer, at best, limited basic data processing features and few advanced processing capabilities for the collected personal health data. In this paper, we describe an integrated personal health information system that allows secure storage and processing of medical data in the cloud by using a comprehensive homomorphic encryption model to preserve data privacy. The system collects the user data through a client application module, typically installed on the user's smartphone or smartwatch, and securely transports the data to the cloud backend powered by IBM Bluemix. The data are stored by the IBM Cloudant infrastructure, while the homomorphic processing of the encrypted data is performed using the Apache Spark service, which is also made available by the IBM Bluemix platform. The event-based handlers are triggered by the IBM Open Whisk programming service. The initial prototype has been tested using a real-world use case, which is described.
引用
收藏
页数:10
相关论文
共 33 条
[1]  
[Anonymous], 2009, STANFORD U
[2]  
Bazett H. C., 1997, ANN NONINVAS ELECTRO, V2, P177, DOI DOI 10.1111/J.1542-474X.1997.TB00325.X
[3]  
Benabbas S, 2011, LECT NOTES COMPUT SC, V6841, P111, DOI 10.1007/978-3-642-22792-9_7
[4]  
Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13
[5]  
Brakerski Z., 2012, ACM T COMPUTATION TH, P309
[6]   Efficient Fully Homomorphic Encryption from (Standard) LWE [J].
Brakerski, Zvika ;
Vaikuntanathan, Vinod .
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, :97-106
[7]   Life cycle and characteristics of services in the world of cloud computing [J].
Breiter, G. ;
Behrendt, M. .
IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (04)
[8]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[9]  
Coron JS, 2011, LECT NOTES COMPUT SC, V6841, P487, DOI 10.1007/978-3-642-22792-9_28
[10]  
Fiore D., 2012, P 2012 ACM C COMP CO, P501