Private verification of access on medical data: An initial study

Thaís Bardini Idalino, Dayana Spagnuelo, Jean Everson Martina

Research output: Chapter in Book / Report / Conference proceedingChapterAcademicpeer-review

Abstract

© Springer International Publishing AG 2017. Patient-centered medical systems promote empowerment of patients, who can decide on the accesses and usage of their personal data. To inspire a sense of trust and encourage the adoption of such systems, it is desired to allow one to verify whether the system has acted in accordance with the patients’ preferences. However, it is argued that even audit logs and usage policies, normally used when verifying such property, may already be enough for one to learn sensitive information, e.g., the medical specialists a given patient has visited in the past. This is not only damaging for the patients, but is also against the interests of the medical system, which may lose back the trust earned and gain a bad reputation. Verifiability should not come at the expense of patients’ privacy. It is, therefore, imperative that these systems take necessary precautions towards patient’s information when providing means for verifiability. In this work we study how to realize that. In particular, we explore how searchable encryption techniques could be applied to allow the verification of systems in a private fashion, providing no information on patient’s sensitive data.
Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer Verlag
Pages86-103
Number of pages18
ISBN (Print)9783319678153
DOIs
Publication statusPublished - 2017

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10436 LNCS

Keywords

  • Audit
  • Compliance
  • Patient-centered medical systems
  • Privacy
  • Searchable encryption
  • Verifiability

Fingerprint Dive into the research topics of 'Private verification of access on medical data: An initial study'. Together they form a unique fingerprint.

Cite this