A break-glass protocol based on ciphertext-policy attribute-based encryption to access medical records in the cloud

被引:0
作者
Marcela T. de Oliveira
Alexandros Bakas
Eugene Frimpong
Adrien E. D. Groot
Henk A. Marquering
Antonis Michalas
Silvia D. Olabarriaga
机构
[1] University of Amsterdam,Amsterdam University Medical Centers
[2] Tampere University,undefined
来源
Annals of Telecommunications | 2020年 / 75卷
关键词
Ciphertext-policy attribute-based encryption; e-health privacy; Access control; Electronic medical records; Emergency care; Secure cloud storage; Break-glass access;
D O I
暂无
中图分类号
学科分类号
摘要
In emergency care, fast and efficient treatment is vital. The availability of Electronic Medical Records (EMR) allows healthcare professionals to access a patient’s data promptly, which facilitates the decision-making process and saves time by not repeating medical procedures. Unfortunately, the complete EMR of a patient is often not available during an emergency situation to all treatment teams. Cloud services emerge as a promising solution to this problem by allowing ubiquitous access to information. However, EMR storage and sharing through clouds raise several concerns about security and privacy. To this end, we propose a protocol through which all treatment teams involved in the emergency care can securely decrypt relevant data from the patient’s EMR and add new information about the patient’s status. Furthermore, our protocol ensures that treatment teams will only access the patient’s EMR for the period during which the patient is under their care. Finally, we present a formal security analysis of our protocol and some initial experimental results.
引用
收藏
页码:103 / 119
页数:16
相关论文
共 20 条
[1]  
Hillestad R(2005)Can electronic medical record systems transform health care? Potential health benefits, savings, and costs Health Aff 24 1103-1117
[2]  
Bigelow J(2014)A review on the state-of-the-art privacy-preserving approaches in the e-health clouds IEEE J Biomed Health Inform 18 1431-1441
[3]  
Bower A(2006)Time is brain-quantified Stroke 37 263-266
[4]  
Girosi F(2019)Privacy-preserving smart iot-based healthcare big data storage and self-adaptive access control system Inf Sci 479 567-592
[5]  
Meili R(2003)A survey of key management for secure group communication ACM Comput Surv (CSUR) 35 309-329
[6]  
Scoville R(2017)Providing user security guarantees in public infrastructure clouds IEEE Trans Cloud Comput 5 405-419
[7]  
Taylor R(undefined)undefined undefined undefined undefined-undefined
[8]  
Abbas A(undefined)undefined undefined undefined undefined-undefined
[9]  
Khan SU(undefined)undefined undefined undefined undefined-undefined
[10]  
Saver JL(undefined)undefined undefined undefined undefined-undefined