Patient controlled encryption: ensuring privacy of electronic medical records
Citations
1,333 citations
1,057 citations
Cites methods from "Patient controlled encryption: ensu..."
...Index Terms—Personal health records, cloud computing, data privacy, fine-grained access control, attribute-based encryption Ç...
[...]
...Recently, Narayan et al. proposed an attribute-based infrastructure for EHR systems, where each patient’s EHR files are encrypted using a broadcast variant of CP-ABE [16] that allows direct revocation....
[...]
1,053 citations
724 citations
Cites background from "Patient controlled encryption: ensu..."
...One answer to these problems can be to allow the study subjects and patients to retain control over their raw sensor data throughout its life cycle: its capture, sharing, retention, and reuse [ 7 ], [66]....
[...]
526 citations
Cites background or methods from "Patient controlled encryption: ensu..."
...Of these, 25 articles indicate that the patient should grant access permissions [5,9,27,31,33–36,39,40,44,45,51–56,60,62,69–71,78,79]....
[...]
...A total of 33 studies deal with EHR data access [5,9,27,31,33– 40,44,45,47,51–56,58,60–62,67,69–71,74,75,78,79]....
[...]
...Other access mechanisms presented in the studies are: username/password [5,27,32,35,50,62,74], login/password combinedwith a digital certificate [27,62,63,67,68], password and PIN [51–53], a smart card and its PIN [32,54–56,67,75], a smart card, its PIN and a fingerprint [36] and access policy spaces [40]....
[...]
...In general, public key operations are slower than symmetric key primitives, and when searchability or hidden labels are required they appear to have inherent privacy weaknesses [5]....
[...]
...In February 2009, the US President signed The American Recovery and Reinvestment Act, which included the investment of 19,000 million dollars in the digitalisation of medical records in the USA [5]....
[...]
References
6,902 citations
4,257 citations
"Patient controlled encryption: ensu..." refers background in this paper
...Finally, recent work on attributebased encryption [15, 12] enables encryption-based access...
[...]
3,610 citations
3,128 citations
3,024 citations
"Patient controlled encryption: ensu..." refers background in this paper
...(This is true in the basic PEKS of Boneh et al [6], and seems to be inherent in the public key setting....
[...]
...For this, we propose using a scheme developed by Boneh et al. referred to as PEKS [6]....
[...]
...(This is true in the basic PEKS of Boneh et al [6], and seems to be inherent in the public key setting.)...
[...]