Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
Secret shares to protect health records in Cloud-based infrastructures
Buchanan, William J; Ukwandu, Elochukwu; van Deursen, Nicole; Fan, Lu; Russell, Gordon; Lo, Owen; Thuemmler, Christoph
Authors
Elochukwu Ukwandu
Nicole van Deursen
Lu Fan
Dr Gordon Russell G.Russell@napier.ac.uk
Associate Professor
Dr Owen Lo O.Lo@napier.ac.uk
Senior Research Fellow
Christoph Thuemmler
Abstract
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This paper outlines a novel Cloud-based architecture (SECRET) which supports keyless encryption methods and which can be used for the storage of patient information, along with supporting failover and a break-glass policy.
Citation
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016). Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom). https://doi.org/10.1109/HealthCom.2015.7454589
Conference Name | BCS Health Informatics 2015 |
---|---|
Start Date | Oct 7, 2015 |
End Date | Oct 8, 2015 |
Acceptance Date | Oct 7, 2015 |
Online Publication Date | Apr 19, 2016 |
Publication Date | Apr 19, 2016 |
Deposit Date | Aug 28, 2015 |
Publicly Available Date | Mar 30, 2017 |
Publisher | Institute of Electrical and Electronics Engineers |
Peer Reviewed | Not Peer Reviewed |
Book Title | 2015 17th International Conference on E-health Networking, Application & Services (HealthCom) |
ISBN | 9781467383257 |
DOI | https://doi.org/10.1109/HealthCom.2015.7454589 |
Keywords | Health records; cybersecurity; privacy; cloud-based systems; SECRET; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/9032 |
Files
Secret shares to protect health records in Cloud-based infrastructures
(5 Mb)
PDF
Copyright Statement
© © 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works
You might also like
Mitigating Disaster using Secure Threshold-Cloud Architecture
(2018)
Journal Article
Performance Evaluation of a Fragmented Secret Share System
(2017)
Conference Proceeding
RESCUE: Resilient Secret Sharing Cloud-based Architecture.
(2015)
Conference Proceeding
A comparative review of information security risk assessment methodologies for health care.
(2011)
Presentation / Conference
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search