Abstract
In this paper, we address the problem of building an anonymized medical database from multiple sources. Our proposed solution defines how to achieve data integration in a heterogeneous network of many clinical institutions, while preserving data utility and patients’ privacy. The contribution of the paper is twofold: Firstly, we propose a secure and scalable cloud eHealth architecture to store and exchange patients’ data for the treatment. Secondly, we present an algorithm for efficient aggregation of the health data for the research purposes from multiple sources independently.
Chapter PDF
Similar content being viewed by others
References
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)
Baig, M.M., Li, J., Liu, J., Wang, H.: Cloning for privacy protection in multiple independent data publications. In: Proceedings of the 20th ACM International Conference on Information and knowledge Management, CIKM 2011, p. 885 (2011)
Benoist, E., Sliwa, J.: How to Collect Consent for an Anonymous Medical Database. HEALTHINF (2014)
Blake, I., Seroussi, G., Smart, N., Cassels, J.W.S.: Advances in Elliptic Curve Cryptography. Cambridge University Press, New York (2005)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)
Clifton, C., Jiang, W.: CERIAS Tech Report 2005–134 Information Assurance and Security Privacy-Preserving Distributed k -Anonymity (2005)
Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)
Dubovitskaya, A., Urovi, V., Vasirani, M., Aberer, K., Fuchs, A., Buclin, T., Thoma, Y., Schumacher, M.: Privacy preserving interoperability for personalized medicine. Swiss Medical Informatics (September 2014)
Elger, B.S., Iavindrasana, J., Lo Lacono, L., Müller, H., Roduit, N., Summers, P., Wright, J.: Strategies for health data exchange for secondary, cross-institutional clinical research. Computer Methods and Programs in Biomedicine 99, 230–251 (2010)
Gkoulalas-Divanis, A., Loukides, G.: Anonymization of Electronic Medical Records to Support Clinical Analysis. Springer Briefs in Electrical and Computer Engineering (2013)
Gkoulalas-Divanis, A., Loukides, G., Sun, J.: Publishing data from electronic health records while preserving privacy: A survey of algorithms. Journal of Biomedical Informatics 50, 4–19 (2014)
Gotta, V., Widmer, N., Montemurro, M., Leyvraz, S., Haouala, A., Decosterd, L.A., Csajka, C., Buclin, T.: Therapeutic drug monitoring of imatinib. Clinical Pharmacokinetics 51(3), 187–201 (2012)
Helfer, J., Valdez, S., Popa, R.A., Stark, E., Zeldovich, N., Frans Kaashoek, M., Balakrishnan, H.: Building web applications on top of encrypted data using Mylar. In: Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation, pp. 157–172 (2014)
Ibraimi, L., Asim, M., Petko, M.: Secure Management of Personal Health Records by Applying Attribute-Based Encryption. In: 6th International Workshop on Wearable Micro and Nano Technologies for Personalized Health (pHealth) (2009)
Li, M., Yu, S., Ren, K., Lou, W.: Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 89–106. Springer, Heidelberg (2010)
Li, M., Yu, S., Zheng, Y.: Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. IEEE Tranyactions on Parallel and Distributed Systems 24(1), 131–143 (2013)
Li, Z.-R., Chang, E.-C., Huang, K.-H., Lai, F.: A secure electronic medical record sharing mechanism in the cloud computing platform. In: 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE), pp. 98–103, June 2011
Lo Iacono, L.: Multi-centric universal pseudonymisation for secondary use of the EHR. Studies in Health Technology and Informatics 126, 239–247 (2007)
Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y.: Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management. In: Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, pp. 248–252 (2013)
Popa, R.A., Zeldovich, N.: Multi-key searchable encryption. Cryptology ePrint Archive, Report 2013/508 (2013)
Poulis, G., Loukides, G., Gkoulalas-Divanis, A., Skiadopoulos, S.: Anonymizing Data with Relational and Transaction Attributes. In: Blockeel, H., Kersting, K., Nijssen, S., Železný, F. (eds.) ECML PKDD 2013, Part III. LNCS, vol. 8190, pp. 353–369. Springer, Heidelberg (2013)
Solanas, A., Martinez-Balleste, A., Mateo-Sanz, J.: Distributed architecture with double-phase microaggregation for the private sharing of biomedical data in mobile health. IEEE Transactions onInformation Forensics and Security (2013)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy (2000)
Sweeney, L.: K-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)
Urovi, V., Olivieri, A.C., Brugués de la Torre, A., Bromuri, S., Fornara, N., Schumacher, M.: Secure P2P cross-community health record exchange in IHE compatible systems. International Journal on Artificial Intelligence Tools 23(1) (2014)
Xu, L., Cremers, A.B.: A Decentralized Pseudonym Scheme for Cloud-based eHealth Systems. HEALTHINF (2014)
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. In: INFOCOM. IEEE (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 IFIP International Federation for Information Processing
About this paper
Cite this paper
Dubovitskaya, A., Urovi, V., Vasirani, M., Aberer, K., Schumacher, M.I. (2015). A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration. In: Federrath, H., Gollmann, D. (eds) ICT Systems Security and Privacy Protection. SEC 2015. IFIP Advances in Information and Communication Technology, vol 455. Springer, Cham. https://doi.org/10.1007/978-3-319-18467-8_39
Download citation
DOI: https://doi.org/10.1007/978-3-319-18467-8_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18466-1
Online ISBN: 978-3-319-18467-8
eBook Packages: Computer ScienceComputer Science (R0)