Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
Elochukwu Ukwandu
Nicole van Deursen
Lu Fan
Dr Gordon Russell G.Russell@napier.ac.uk
Associate Professor
Dr Owen Lo O.Lo@napier.ac.uk
Senior Research Fellow
Prof Christoph Thuemmler C.Thuemmler@napier.ac.uk
Professor
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This paper outlines a novel Cloud-based architecture (SECRET) which supports keyless encryption methods and which can be used for the storage of patient information, along with supporting failover and a break-glass policy.
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016). Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom). https://doi.org/10.1109/HealthCom.2015.7454589
Conference Name | BCS Health Informatics 2015 |
---|---|
Start Date | Oct 7, 2015 |
End Date | Oct 8, 2015 |
Acceptance Date | Oct 7, 2015 |
Online Publication Date | Apr 19, 2016 |
Publication Date | Apr 19, 2016 |
Deposit Date | Aug 28, 2015 |
Publicly Available Date | Mar 30, 2017 |
Publisher | Institute of Electrical and Electronics Engineers |
Peer Reviewed | Not Peer Reviewed |
Book Title | 2015 17th International Conference on E-health Networking, Application & Services (HealthCom) |
ISBN | 9781467383257 |
DOI | https://doi.org/10.1109/HealthCom.2015.7454589 |
Keywords | Health records; cybersecurity; privacy; cloud-based systems; SECRET; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/9032 |
Secret shares to protect health records in Cloud-based infrastructures
(<nobr>5 Mb</nobr>)
PDF
Copyright Statement
A framework for live host-based Bitcoin wallet forensics and triage
(2022)
Journal Article
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder
(2022)
Journal Article
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification
(2022)
Journal Article
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions
(2022)
Journal Article
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Advanced Search