1
|
Bonomi L, Gousheh S, Fan L. Enabling Health Data Sharing with Fine-Grained Privacy. PROCEEDINGS OF THE ... ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT. ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT 2023; 2023:131-141. [PMID: 37906633 PMCID: PMC10601092 DOI: 10.1145/3583780.3614864] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/02/2023]
Abstract
Sharing health data is vital in advancing medical research and transforming knowledge into clinical practice. Meanwhile, protecting the privacy of data contributors is of paramount importance. To that end, several privacy approaches have been proposed to protect individual data contributors in data sharing, including data anonymization and data synthesis techniques. These approaches have shown promising results in providing privacy protection at the dataset level. In this work, we study the privacy challenges in enabling fine-grained privacy in health data sharing. Our work is motivated by recent research findings, in which patients and healthcare providers may have different privacy preferences and policies that need to be addressed. Specifically, we propose a novel and effective privacy solution that enables data curators (e.g., healthcare providers) to protect sensitive data elements while preserving data usefulness. Our solution builds on randomized techniques to provide rigorous privacy protection for sensitive elements and leverages graphical models to mitigate privacy leakage due to dependent elements. To enhance the usefulness of the shared data, our randomized mechanism incorporates domain knowledge to preserve semantic similarity and adopts a block-structured design to minimize utility loss. Evaluations with real-world health data demonstrate the effectiveness of our approach and the usefulness of the shared data for health applications.
Collapse
Affiliation(s)
- Luca Bonomi
- Vanderbilt University Medical Center, Nashville, TN, USA
| | - Sepand Gousheh
- University of North Carolina at Charlotte, Charlotte, NC, USA
| | - Liyue Fan
- University of North Carolina at Charlotte, Charlotte, NC, USA
| |
Collapse
|
2
|
Ge YF, Yu WJ, Cao J, Wang H, Zhan ZH, Zhang Y, Zhang J. Distributed Memetic Algorithm for Outsourced Database Fragmentation. IEEE TRANSACTIONS ON CYBERNETICS 2021; 51:4808-4821. [PMID: 33147158 DOI: 10.1109/tcyb.2020.3027962] [Citation(s) in RCA: 9] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
Data privacy and utility are two essential requirements in outsourced data storage. Traditional techniques for sensitive data protection, such as data encryption, affect the efficiency of data query and evaluation. By splitting attributes of sensitive associations, database fragmentation techniques can help protect data privacy and improve data utility. In this article, a distributed memetic algorithm (DMA) is proposed for enhancing database privacy and utility. A balanced best random distributed framework is designed to achieve high optimization efficiency. In order to enhance global search, a dynamic grouping recombination operator is proposed to aggregate and utilize evolutionary elements; two mutation operators, namely, merge and split, are designed to help arrange and create evolutionary elements; a two-dimension selection approach is designed based on the priority of privacy and utility. Furthermore, a splicing-driven local search strategy is embedded to introduce rare utility elements without violating constraints. Extensive experiments are carried out to verify the performance of the proposed DMA. Furthermore, the effectiveness of the proposed distributed framework and novel operators is verified.
Collapse
|
3
|
Khan F, Khan S, Tahir S, Ahmad J, Tahir H, Shah SA. Granular Data Access Control with a Patient-Centric Policy Update for Healthcare. SENSORS 2021; 21:s21103556. [PMID: 34065312 PMCID: PMC8161120 DOI: 10.3390/s21103556] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/30/2021] [Revised: 05/12/2021] [Accepted: 05/13/2021] [Indexed: 11/30/2022]
Abstract
Healthcare is a multi-actor environment that requires independent actors to have a different view of the same data, hence leading to different access rights. Ciphertext Policy-Attribute-based Encryption (CP-ABE) provides a one-to-many access control mechanism by defining an attribute’s policy over ciphertext. Although, all users satisfying the policy are given access to the same data, this limits its usage in the provision of hierarchical access control and in situations where different users/actors need to have granular access of the data. Moreover, most of the existing CP-ABE schemes either provide static access control or in certain cases the policy update is computationally intensive involving all non-revoked users to actively participate. Aiming to tackle both the challenges, this paper proposes a patient-centric multi message CP-ABE scheme with efficient policy update. Firstly, a general overview of the system architecture implementing the proposed access control mechanism is presented. Thereafter, for enforcing access control a concrete cryptographic construction is proposed and implemented/tested over the physiological data gathered from a healthcare sensor: shimmer sensor. The experiment results reveal that the proposed construction has constant computational cost in both encryption and decryption operations and generates constant size ciphertext for both the original policy and its update parameters. Moreover, the scheme is proven to be selectively secure in the random oracle model under the q-Bilinear Diffie Hellman Exponent (q-BDHE) assumption. Performance analysis of the scheme depicts promising results for practical real-world healthcare applications.
Collapse
Affiliation(s)
- Fawad Khan
- Department of Information Security, National University of Sciences and Technology, Sector H-12, Islamabad 44000, Pakistan; (S.T.); (H.T.)
- Correspondence:
| | - Saad Khan
- Department of Computer Science & IT, Sarhad University of Science and Information Technology, Peshawar 25000, Pakistan;
| | - Shahzaib Tahir
- Department of Information Security, National University of Sciences and Technology, Sector H-12, Islamabad 44000, Pakistan; (S.T.); (H.T.)
| | - Jawad Ahmad
- School of Computing, Edinburgh Napier University, Edinburgh EH11 4BN, UK;
| | - Hasan Tahir
- Department of Information Security, National University of Sciences and Technology, Sector H-12, Islamabad 44000, Pakistan; (S.T.); (H.T.)
| | - Syed Aziz Shah
- Faculty Research Centre for Intelligent Healthcare, Coventry University, Coventry CV1 5FB, UK;
| |
Collapse
|
4
|
Bibal Benifa J, Venifa Mini G, Krishnan S. Blockchain-based health care monitoring for privacy preservation of COVID-19 medical records. BLOCKCHAIN FOR SMART CITIES 2021. [PMCID: PMC8409222 DOI: 10.1016/b978-0-12-824446-3.00005-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Indexed: 12/15/2022]
Abstract
The explosion and unpredictable global spread of COVID-19 has revealed the shortcomings of conventional health care systems in dealing with public health emergencies in a timely manner. The health care system enabled by the Internet of Things (IoT) is competent for tracking COVID-19 patients efficiently through an integrated network. The popular technologies in digital health care monitoring pose serious risks in terms of privacy and security issues such as data transfer and data transaction logging. Such medical data confidentiality and privacy issues could result in a delay in the advancement of treatment, thus endangering the patient's life. This chapter aims to assist infected people online by smart devices using IoT and Blockchain technologies. IoT-based health care smart devices gather valuable information and provide additional perceptions into symptoms and behaviors. Blockchain facilitates the secure exchange of information concerning patient health and it controls the medical delivery network. Blockchains are computationally expensive and require a high bandwidth with extra computing power, and therefore they are not completely suitable for most resource-constrained IoT devices intended for smart cities. Here, a customized blockchain model framework is proposed that is appropriate for the dispersed IoT devices, which are added with enhanced network confidentiality characteristics. Here, proxy reencryption and advanced cryptographic primitives are used to satisfy the additional privacy and security properties. This study provides a structure for COVID-19 infectious disease patients, and discusses electronic medical record issues and diagnostics. The work also highlights the data and transactions over a blockchain-based network that is more secure and anonymous. A widespread security analysis demonstrates that the model being introduced is certifiably successful for ensuring the privacy and resistance to intrusion. Finally, the performance assessment signifies that the projected model realizes superior overall efficiency as compared to other techniques.
Collapse
|
5
|
Mandal M. Privacy-preserving fully anonymous ciphertext policy attribute-based broadcast encryption with constant-size secret keys and fast decryption. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2020. [DOI: 10.1016/j.jisa.2020.102666] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
|
6
|
Mamta, Gupta B. An attribute-based keyword search for m-Health networks. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES 2020. [DOI: 10.1007/s11416-020-00361-z] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
7
|
|
8
|
A dual privacy-preservation scheme for cloud-based eHealth systems. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2019. [DOI: 10.1016/j.jisa.2019.04.010] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
|
9
|
An Adaptive Biomedical Data Managing Scheme Based on the Blockchain Technique. APPLIED SCIENCES-BASEL 2019. [DOI: 10.3390/app9122494] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
A crucial role is played by personal biomedical data when it comes to maintaining proficient access to health records by patients as well as health professionals. However, it is difficult to get a unified view pertaining to health data that have been scattered across various health centers/hospital sections. To be specific, health records are distributed across many places and cannot be integrated easily. In recent years, blockchain has arisen as a promising solution that helps to achieve the sharing of individual biomedical information in a secure way, whilst also having the benefit of privacy preservation because of its immutability. This research puts forward a blockchain-based managing scheme that helps to establish interpretation improvements pertaining to electronic biomedical systems. In this scheme, two blockchains were employed to construct the base, whereby the second blockchain algorithm was used to generate a secure sequence for the hash key that was generated in first blockchain algorithm. This adaptive feature enables the algorithm to use multiple data types and also combines various biomedical images and text records. All data, including keywords, digital records, and the identity of patients, are private key encrypted with a keyword searching function so as to maintain data privacy, access control, and a protected search function. The obtained results, which show a low latency (less than 750 ms) at 400 requests/second, indicate the possibility of its use within several health care units such as hospitals and clinics.
Collapse
|
10
|
Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage. PLoS One 2018; 13:e0206126. [PMID: 30383840 PMCID: PMC6211670 DOI: 10.1371/journal.pone.0206126] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/14/2018] [Accepted: 10/08/2018] [Indexed: 11/30/2022] Open
Abstract
With the development of outsourcing data services, data security has become an urgent problem that needs to be solved. Attribute-based encryption is a valid solution to data security in cloud storage. There is no existing scheme that can guarantee the privacy of access structures and achieve attribute-based encryption with keyword search and attribute revocation. In this article, we propose a new searchable and revocable multi-data owner attribute-based encryption scheme with a hidden policy in cloud storage. In the new scheme, the same access policy is used in both the keyword index and message encryption. The advantage of keyword index with access policy is that as long as a user’s attributes satisfy the access policy, the searched ciphertext can be correctly decrypted. This property improves the accuracy of the search results. The hidden policy is used in both the ciphertext and the keyword index to protect users’ privacy. The new scheme contains attribute revocation, which is suitable for the actual situation that a user’s attributes maybe changed over time. In the general bilinear group model, the security of the scheme is demonstrated, and the efficiency of the scheme is analyzed.
Collapse
|
11
|
Li W, Liu BM, Liu D, Liu RP, Wang P, Luo S, Ni W. Unified Fine-Grained Access Control for Personal Health Records in Cloud Computing. IEEE J Biomed Health Inform 2018; 23:1278-1289. [PMID: 29994490 DOI: 10.1109/jbhi.2018.2850304] [Citation(s) in RCA: 19] [Impact Index Per Article: 3.2] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
Abstract
Attribute-based encryption has been a promising encryption technology to secure personal health records (PHRs) sharing in cloud computing. PHRs consist of the patient data often collected from various sources including hospitals and general practice centres. Different patients' access policies have a common access sub-policy. In this paper, we propose a novel attribute-based encryption scheme for fine-grained and flexible access control to PHRs data in cloud computing. The scheme generates shared information by the common access sub-policy, which is based on different patients' access policies. Then, the scheme combines the encryption of PHRs from different patients. Therefore, both time consumption of encryption and decryption can be reduced. Medical staff require varying levels of access to PHRs. The proposed scheme can also support multi-privilege access control so that medical staff can access the required level of information while maximizing patient privacy. Through implementation and simulation, we demonstrate that the proposed scheme is efficient in terms of time. Moreover, we prove the security of the proposed scheme based on security of the ciphertext-policy attribute-based encryption scheme.
Collapse
|
12
|
Das AK, Wazid M, Kumar N, Khan MK, Choo KKR, Park Y. Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment. IEEE J Biomed Health Inform 2018; 22:1310-1322. [DOI: 10.1109/jbhi.2017.2753464] [Citation(s) in RCA: 110] [Impact Index Per Article: 18.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/10/2022]
|
13
|
|
14
|
Greene E, Proctor P, Kotz D. Secure Sharing of mHealth Data Streams through Cryptographically-Enforced Access Control. ACTA ACUST UNITED AC 2018; 12:49-65. [PMID: 31598544 DOI: 10.1016/j.smhl.2018.01.003] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
Abstract
Owners of mobile-health apps and devices often want to share their mHealth data with others, such as physicians, therapists, coaches, and caregivers. For privacy reasons, however, they typically want to share a limited subset of their information with each recipient according to their preferences. In this paper, we introduce ShareHealth, a scalable, usable, and practical system that allows mHealth-data owners to specify access-control policies and to cryptographically enforce those policies so that only parties with the proper corresponding permissions are able to decrypt data. The design and prototype implementation of this system make three contributions: (1) they apply cryptographically-enforced access-control measures to stream-based (specifically mHealth) data, (2) they recognize the temporal nature of mHealth data streams and support revocation of access to part or all of a data stream, and (3) they depart from the vendor- and device-specific silos of mHealth data by implementing a secure end-to-end system that can be applied to data collected from a variety of mHealth apps and devices.
Collapse
Affiliation(s)
- Emily Greene
- 6211 Sudikoff Lab, Dartmouth College, Hanover NH 03755-3510
| | | | - David Kotz
- 6211 Sudikoff Lab, Dartmouth College, Hanover NH 03755-3510
| |
Collapse
|
15
|
Anjum A, Malik SUR, Choo KKR, Khan A, Haroon A, Khan S, Khan SU, Ahmad N, Raza B. An efficient privacy mechanism for electronic health records. Comput Secur 2018. [DOI: 10.1016/j.cose.2017.09.014] [Citation(s) in RCA: 23] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
|
16
|
|