A Proposed Access Control-Based Privacy Preservation Model to Share
Healthcare Data in Cloud
- URL: http://arxiv.org/abs/2007.13850v1
- Date: Mon, 27 Jul 2020 20:32:51 GMT
- Title: A Proposed Access Control-Based Privacy Preservation Model to Share
Healthcare Data in Cloud
- Authors: Pankaj Khatiwada, Hari Bhusal, Ayan Chatterjee, Martin W. Gerdess
- Abstract summary: This paper presents the concept of an access control-based (AC) privacy preservation model for the mutual authentication of users and data owners.
The proposed model offers a high-security guarantee and high efficiency.
The proposed model outperforms other methods with a maximal genuine data rate of 0.91.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Healthcare data in cloud computing facilitates the treatment of patients
efficiently by sharing information about personal health data between the
healthcare providers for medical consultation. Furthermore, retaining the
confidentiality of data and patients' identity is a another challenging task.
This paper presents the concept of an access control-based (AC) privacy
preservation model for the mutual authentication of users and data owners in
the proposed digital system. The proposed model offers a high-security
guarantee and high efficiency. The proposed digital system consists of four
different entities, user, data owner, cloud server, and key generation center
(KGC). This approach makes the system more robust and highly secure, which has
been verified with multiple scenarios. Besides, the proposed model consisted of
the setup phase, key generation phase, encryption phase, validation phase,
access control phase, and data sharing phase. The setup phases are run by the
data owner, which takes input as a security parameter and generates the system
master key and security parameter. Then, in the key generation phase, the
private key is generated by KGC and is stored in the cloud server. After that,
the generated private key is encrypted. Then, the session key is generated by
KGC and granted to the user and cloud server for storing, and then, the results
are verified in the validation phase using validation messages. Finally, the
data is shared with the user and decrypted at the user-end. The proposed model
outperforms other methods with a maximal genuine data rate of 0.91.
Related papers
- A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization [1.6000462052866455]
This paper introduces a novel decentralized, privacy-preserving architecture that handles heterogeneous personal information.<n>Unlike traditional models, our system grants users complete data ownership and control, allowing them to selectively share information without compromising privacy.
arXiv Detail & Related papers (2025-06-27T20:05:46Z) - Decentralized COVID-19 Health System Leveraging Blockchain [0.8225825738565354]
This paper takes the most common COVID-19 as the application scenario and designs a COVID-19 health system based on blockchain.<n>Considering that the public and transparent nature of blockchain violates the privacy requirements of some health data, in the system design stage, the data is divided into public data and private data.<n>In the system implementation part, based on the Hyperledger Fabric architecture, some functions of the system design are realized, including data upload, retrieval of the latest data and historical data.
arXiv Detail & Related papers (2025-06-03T09:19:47Z) - hChain 4.0: A Secure and Scalable Permissioned Blockchain for EHR Management in Smart Healthcare [0.0]
hChain 4.0 employs a permissioned blockchain to provide a secure and scalable data infrastructure.<n>The proposed framework enables anonymized health data sharing for medical research by pseudonymizing patient identity.<n> Experimental assessments indicate that the proposed approach achieves higher scalability, cost-effectiveness, and validated security.
arXiv Detail & Related papers (2025-05-20T03:13:48Z) - Privacy-Preserving Federated Embedding Learning for Localized Retrieval-Augmented Generation [60.81109086640437]
We propose a novel framework called Federated Retrieval-Augmented Generation (FedE4RAG)
FedE4RAG facilitates collaborative training of client-side RAG retrieval models.
We apply homomorphic encryption within federated learning to safeguard model parameters.
arXiv Detail & Related papers (2025-04-27T04:26:02Z) - Empower Healthcare through a Self-Sovereign Identity Infrastructure for Secure Electronic Health Data Access [1.444899524297657]
We propose an open-source health data management framework, that follows a patient-centric approach.
The framework uses technology to provide immutability, verifiable data registry, and auditability.
We discuss the differences and novelties of this framework, which includes the patient-centric approach also for data storage, the designed recovery and emergency plan, the defined backup procedure, and the selected blockchain platform.
arXiv Detail & Related papers (2025-01-21T15:52:26Z) - Self-Sovereign Identity for Consented and Content-Based Access to Medical Records using Blockchain [1.118478900782898]
We propose a blockchain-based solution enabling secure exchange of EHRs between different parties powered by a self-sovereign identity wallet and decentralized identifiers.
We grant users full control over their medical data, and enable them to securely share it in total confidentiality over secure communication channels.
arXiv Detail & Related papers (2024-07-31T12:27:31Z) - Mind the Privacy Unit! User-Level Differential Privacy for Language Model Fine-Tuning [62.224804688233]
differential privacy (DP) offers a promising solution by ensuring models are 'almost indistinguishable' with or without any particular privacy unit.
We study user-level DP motivated by applications where it necessary to ensure uniform privacy protection across users.
arXiv Detail & Related papers (2024-06-20T13:54:32Z) - Enc2DB: A Hybrid and Adaptive Encrypted Query Processing Framework [47.11111145443189]
We introduce Enc2DB, a novel secure database system following a hybrid strategy on and openGauss.
We present a micro-benchmarking test and self-adaptive mode switch strategy that can choose the best execution path (cryptography or TEE) to answer a given query.
We also design and implement a ciphertext index compatible with native cost model and querys to accelerate query processing.
arXiv Detail & Related papers (2024-04-10T08:11:12Z) - Diff-Privacy: Diffusion-based Face Privacy Protection [58.1021066224765]
In this paper, we propose a novel face privacy protection method based on diffusion models, dubbed Diff-Privacy.
Specifically, we train our proposed multi-scale image inversion module (MSI) to obtain a set of SDM format conditional embeddings of the original image.
Based on the conditional embeddings, we design corresponding embedding scheduling strategies and construct different energy functions during the denoising process to achieve anonymization and visual identity information hiding.
arXiv Detail & Related papers (2023-09-11T09:26:07Z) - Blockchain-enabled Data Governance for Privacy-Preserved Sharing of Confidential Data [1.6006586061577806]
We propose a blockchain-based data governance system that employs attribute-based encryption to prevent privacy leakage and credential misuse.
First, our ABE encryption system can handle multi-authority use cases while protecting identity privacy and hiding access policy.
Second, applying the Advanced Encryption Standard (AES) for data encryption makes the whole system efficient and responsive to real-world conditions.
arXiv Detail & Related papers (2023-09-08T05:01:59Z) - Blockchain-empowered Federated Learning for Healthcare Metaverses:
User-centric Incentive Mechanism with Optimal Data Freshness [66.3982155172418]
We first design a user-centric privacy-preserving framework based on decentralized Federated Learning (FL) for healthcare metaverses.
We then utilize Age of Information (AoI) as an effective data-freshness metric and propose an AoI-based contract theory model under Prospect Theory (PT) to motivate sensing data sharing.
arXiv Detail & Related papers (2023-07-29T12:54:03Z) - Towards Blockchain-Assisted Privacy-Aware Data Sharing For Edge
Intelligence: A Smart Healthcare Perspective [19.208368632576153]
Linkage attack is a type of dominant attack in the privacy domain.
adversaries launch poisoning attacks to falsify the health data, which leads to misdiagnosing or even physical damage.
To protect private health data, we propose a personalized differential privacy model based on the trust levels among users.
arXiv Detail & Related papers (2023-06-29T02:06:04Z) - A Randomized Approach for Tight Privacy Accounting [63.67296945525791]
We propose a new differential privacy paradigm called estimate-verify-release (EVR)
EVR paradigm first estimates the privacy parameter of a mechanism, then verifies whether it meets this guarantee, and finally releases the query output.
Our empirical evaluation shows the newly proposed EVR paradigm improves the utility-privacy tradeoff for privacy-preserving machine learning.
arXiv Detail & Related papers (2023-04-17T00:38:01Z) - Long-term secure distributed storage using quantum key distribution
network with third-party verification [8.523357169329339]
Quantum key distribution network with Vernam's One Time Pad encryption and secret sharing are powerful security tools.
In this paper, we propose an ITS integrity protection scheme employing a third-party verification with time-stamp.
arXiv Detail & Related papers (2021-12-23T00:55:50Z) - A Review-based Taxonomy for Secure Health Care Monitoring: Wireless
Smart Cameras [9.4545147165828]
This research focuses on the secure storage of patient and medical records in the healthcare sector.
A potential solution comes from biometrics, although their use may be time-consuming and can slow down data retrieval.
This research aims to overcome these challenges and enhance data access control in the healthcare sector through the addition of biometrics in the form of fingerprints.
arXiv Detail & Related papers (2021-07-05T11:59:10Z) - Hide-and-Seek Privacy Challenge [88.49671206936259]
The NeurIPS 2020 Hide-and-Seek Privacy Challenge is a novel two-tracked competition to accelerate progress in tackling both problems.
In our head-to-head format, participants in the synthetic data generation track (i.e. "hiders") and the patient re-identification track (i.e. "seekers") are directly pitted against each other by way of a new, high-quality intensive care time-series dataset.
arXiv Detail & Related papers (2020-07-23T15:50:59Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.