PERiMETER – pseudonymization and personal metadata encryption for privacy-preserving searchable documents

Informa UK Limited - Tập 1 - Trang 46-57 - 2012
Johannes Heurix1, Michael Karlinger2, Thomas Neubauer3
1SBA Research, Vienna, Austria
2Johannes Kepler University Linz, Austria
3Vienna University of Technology, Vienna, Austria

Tóm tắt

The average costs of data leakage are steadily on the rise. Especially in healthcare, the disclosure of sensitive information may have unfavorable consequences for the patient. As a consequence, several data security and access control mechanisms have been introduced, ranging from data encryption to intrusion detection or role-based access control, doing a great work in protecting sensitive information. However, the majority of these concepts are centrally controlled by administrators who are a major threat to the patients’ privacy. Apart from administrators, other internal persons, such as hospital staff members, may exploit their access rights to snoop around in private health data. This work presents PERiMETER, a security protocol for data privacy that is strictly controlled by the data owner. It integrates pseudonymization and encryption to create a methodology that uses pseudonyms as access control mechanism, protects secret cryptographic keys by a layer-based security model, and provides privacy-preserving querying.

Tài liệu tham khảo

Bouchard S (2011) Three of top 6 data breaches of 2011 were in healthcare. Healthcare Finance News, 19 December.

Carr J (2002) Strategies and issues: thwarting insider attacks. Network Magazine, September 5.

Cunningham H, Maynard D and Bontcheva K (2011) Text Processing with GATE. Gateway Press, California.

Eggers WD (2007) Government 2.0: Using Technology to Improve Education, Cut Red Tape, Reduce Gridlock, and Enhance Democracy. Rowman and Littlefield, Lanham, MD.

Horowitz BT (2011) Patients sue Sutter health over data breach involving 4.24 million people. Health Care IT News, 30 November.

IHE (2010) IHE IT infrastructure (ITI) technical framework 7.0.

NEMA (2008) Digital imaging and communications in medicine. Standard, National Electrical Manufacturers Association, Rosslyn, VA.

OASIS (2010) eXtensible access control markup language (XACML) version 3.0. Committee Specification 01.

Ponemon Institute (2011) Second annual benchmark study on patient privacy & data security. Research Report.

RØstad L and Edsberg O (2006) A study of access control for healthcare systems based on audit trails from audit logs. In Proceedings of the 22nd Annual Computer Security Applications Conference, Miami Beach, pp 175–186.

Sweeney L (2002) k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10 (5), 557–570.

Thielscher C, Gottfried M, Umbreit S, Boegner F, Haack J and Schroeders N (2005) Patent: data processing system for patient data. Int. Patent, WO 03/034294 A2.