Privacy in commercial medical storage systems

Mehmet Tahir SandIkkaya*, Bart De Decker, Vincent Naessens

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Citations (Scopus)

Abstract

Today, people grow older than some decades ago. This inevitably leads to an increasing number of commercial players in the healthcare domain. Privacy is a major concern in many eHealth application, especially when sensitive personal data is stored in databases. This paper presents a secure, fair and privacy-preserving solution to enforce the patient's privacy preferences on his or her personal medical records. The proposed cryptographic tools and protocols are thoroughly explained. Moreover, a prototype implementation validates the concept. Finally, it is shown that a convenient, modular and generic system based on lightweight cryptographic primitives can be realized as proposed.

Original languageEnglish
Title of host publicationElectronic Healthcare - Third International Conference, eHealth 2010, Revised Selected Papers
Pages247-258
Number of pages12
DOIs
Publication statusPublished - 2011
Event3rd International ICST Conference on Electronic Healthcare, eHealth 2010, Co-located with the 5th International Workshop on Personalization for eHealth, Pers4eHealth2010, and the 6th Workshop on Agents Applied in Healthcare, A2HC2010 - Casablanca, Morocco
Duration: 13 Dec 201015 Dec 2010

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Volume69 LNICST
ISSN (Print)1867-8211

Conference

Conference3rd International ICST Conference on Electronic Healthcare, eHealth 2010, Co-located with the 5th International Workshop on Personalization for eHealth, Pers4eHealth2010, and the 6th Workshop on Agents Applied in Healthcare, A2HC2010
Country/TerritoryMorocco
CityCasablanca
Period13/12/1015/12/10

Fingerprint

Dive into the research topics of 'Privacy in commercial medical storage systems'. Together they form a unique fingerprint.

Cite this