Securely Sharing Encrypted Medical Information

Arnab Deb Gupta, Yuriy Polyakov, Kurt Rohloff, Gerard Ryan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Modern medical data information systems must collect and present data to authorized users. Distributed longterm medical data storage requires an effective security model for delegating data access. An effective delegation model must keep data encrypted at all times and avoid the need to share decryption keys. We present a secure information architecture for implementing such a model with end-to-end data encryption that restricts data access to designated recipients. Our architecture uses recent Proxy Re-Encryption (PRE) advances in a publish-subscribe design pattern that can be used to securely share medical data. The architecture would lower medical data storage costs by using commodity cloud hosting while reducing vulnerability to attacks that compromise confidentiality of sensitive medical records.

Original languageEnglish (US)
Title of host publicationProceedings - 2016 IEEE 1st International Conference on Connected Health
Subtitle of host publicationApplications, Systems and Engineering Technologies, CHASE 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages330-331
Number of pages2
ISBN (Electronic)9781509009435
DOIs
StatePublished - Aug 16 2016
Event1st IEEE International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2016 - Washington, United States
Duration: Jun 27 2016Jun 29 2016

Publication series

NameProceedings - 2016 IEEE 1st International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2016

Other

Other1st IEEE International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2016
Country/TerritoryUnited States
CityWashington
Period6/27/166/29/16

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Information Systems and Management
  • Biomedical Engineering
  • Computer Networks and Communications
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Securely Sharing Encrypted Medical Information'. Together they form a unique fingerprint.

Cite this