Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records



Similar documents
Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records

Security System in Cloud Computing for Medical Data Usage

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

CPSC 467b: Cryptography and Computer Security

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Privacy and Verifiability for Data Storage in Cloud Computing. Melek Ӧnen August 17, 2015 IFIP Summer School, Edinburgh

Multi Layered Securing of Health Records using Public and Private Model in Cloud

An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud

Privacy Patterns in Public Clouds

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

Network Security Protocols

7 Key Management and PKIs

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Database Security. The Need for Database Security

TELE 301 Network Management. Lecture 18: Network Security

Secure Sharing of Health Records in Cloud Using ABE

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

ADVANCE SECURITY TO CLOUD DATA STORAGE

Secure cloud access system using JAR ABSTRACT:

Data management using Virtualization in Cloud Computing

Monitoring Data Integrity while using TPA in Cloud Environment

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

What Are Certificates?

WHITE PAPER

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure

Categorical Heuristic for Attribute Based Encryption in the Cloud Server

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

A Secure Decentralized Access Control Scheme for Data stored in Clouds

Princeton University Computer Science COS 432: Information Security (Fall 2013)

Role Based Encryption with Efficient Access Control in Cloud Storage

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

COSC 472 Network Security

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

Associate Prof. Dr. Victor Onomza Waziri

Secure Computation Martin Beck

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment Based on RSA Signature Assumption

Verifiable Outsourced Computations Outsourcing Computations to Untrusted Servers

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

White Paper: Multi-Factor Authentication Platform

Secure Cross Border File Protection & Sharing for Enterprise Product Brief CRYPTOMILL INC

Comments on "public integrity auditing for dynamic data sharing with multi-user modification"

Message Authentication Codes

CRYPTOGRAPHY AS A SERVICE

Content Teaching Academy at James Madison University

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

CSE/EE 461 Lecture 23

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Keywords : audit, cloud, integrity, station to station protocol, SHA-2, third party auditor, XOR. GJCST-B Classification : C.2.4, H.2.

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

Dispatch: A Unique Security Solution

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University

CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

Lecture 17: Re-encryption

Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control

IGI Portal architecture and interaction with a CA- online

Information Security

Why Johnny Can't Encrypt: A Usability Study of PGP

Highly Secure Data Sharing in Cloud Storage using Key-Pair Cryptosystem

Tutorial 3. June 8, 2015

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Module 7 Security CS655! 7-1!

Scalable and secure sharing of data in cloud computing using attribute based encryption

Multi-User Searchable Encryption in the Cloud. Cédric Van Rompay, Refik Molva, and Melek Önen ISC 2015 September 10, 2015 Trondheim, Norway

Attribute Based Encryption with Privacy Preserving In Clouds

Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

CNT Computer and Network Security Review/Wrapup

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

Security of Cloud Storage: - Deduplication vs. Privacy

Transcription:

Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records Melissa Chase (MSR) Joint work with Josh Benaloh, Kristin Lauter, and Eric Horvitz

Medical Records Traditionally, health providers kept paper files Transferring data very cumbersome Visiting a new doctor requires paperwork Emergency care often cannot access record

Electronic Medical Records Movement to: Digitize records Make accessible to network of providers Patients records will be accessible to any provider who treats them Advantages Better care Reduce costs President Obama: all medical records computerized within 5 years ARR Act: $19 billion

Privacy concerns Also dangerous Much easier to steal digital records Much easier to attack remotely accessible system Large system is very vulnerable to abuse ARR Act: Specific objectives: Secure communications Ensure appropriate authorization Encryption

Privacy Concerns Why are we concerned about privacy? Want patients to be honest Discrimination Insurance Employment Social stigma (friends/coworkers) Medical Identity Theft

Standard Approach to Security: Provider Managed + Access Control Patient Bob patient records Doctor Alice Upload health info Health Record Server Permission? s Log File Must Audit Logs Sensitive information Celebrity records

Privacy Concerns Wide access All or nothing permissions Even more in large network scenario Roughly 150 people have access to a patient s record in a hospitalization Patient Controlled Record grant access only to appropriate part of record allow patient to identify providers who treat him

Privacy Concerns Wide access All or nothing permissions Even more in large network scenario Roughly 150 people have access to a patient s record in a hospitalization Access control Theft Attack Patient must trust owner/administrator of data for physical and electronic security For privacy (Insider attacks)

Create Account Upload health info Search record Patient Bob New Approach: Encryption Health Record Server Bob s record Permission s

Using Cryptography Who holds the key? Server Key can be stolen/compromised along with data Third party Somewhat more secure How to maintain functionality? Patient? What we will look at

Using Cryptography Must have key backup Hide from server = hides from hackers, thieves, etc Patient Bob Create Account Upload health info Bob s record Search record Health Record Server Permission s

Search Search record record Create Account Upload health info Search record Patient Bob Doctor Alice Using Cryptography Pharmacist Charles How do we allow patient to grant partial access? Health Record Server Bob s record Permission s Upload health info Upload health info Grant Grant partial partial access access

How to grant partial access? Two approaches Hierarchical record sharing: Patient Controlled Encryption [BCHL09] Assumes hierarchical health record Based on standard, efficient primitives (hash functions, block ciphers) Also consider how to incorporate searchability Re encryption based sharing: Functional Re Encryption [CCV12] Easier to revoke users / add revocation date Easier key management More complex constructions Based on bilinear pairing

Hierarchical Record Sharing Joint work with Eric Horvitz, Kristin Lauter, and Josh Benaloh

Hierarchical Record Sharing Grant partial access Assumption on types of delegation Arrange the record in a hierarchy Allowable delegations: rights to a category

Ex: Hierarchical Health Records Give Doctor access to entire record

Ex: Hierarchical Health Records Give Doctor access to entire record Give Exercise info to cousin

Ex: Hierarchical Health Records Give Doctor access to entire record Give Exercise info to cousin

Ex: Hierarchical Health Records Give Doctor access to entire record Give Exercise info to cousin Give Eyeglass Prescription to Retailer

Ex: Hierarchical Health Records Give Doctor access to entire record Give Exercise info to cousin Give Eyeglass Prescription to Retailer

Ex: Hierarchical Health Records Give Doctor access to entire record Give Exercise info to cousin Give Eyeglass Prescription to Retailer Give Dental Information and Allergies and Medications to Dentist

Ex: Hierarchical Health Records Give Doctor access to entire record Give Exercise info to cousin Give Eyeglass Prescription to Retailer Give Dental Information and Allergies and Medications to Dentist

Security Hierarchical Encryption Symmetric Key [AT83, S88, ] Public Key: HIBE[GS02, ] only have access if an appropriate key was given KeyDer KeyDer

Patient Controlled Encryption Create Account Patient Bob Upload health info Search record Health Record Server Bob s record Permission s

Patient Controlled Encryption Create Account Patient Bob Upload health info Search record Doctor Alice Health Record Server Bob s record Permission s Upload health info Upload health info

Patient Controlled Encryption Grant Grant partial partial access access Pharmacist Charles Search Search record record Create Account Patient Bob Upload health info Search record Doctor Alice Health Record Server Bob s record Permission s Upload health info Upload health info

Patient Controlled Encryption

Re Encryption based Sharing Joint work with Nishanth Chandran and Vinod Vaikuntanathan

An example: Cloud storage for patient health records Bob s health record Doctor Medications Medications Cardiology Pharmacist X Rays Research Center Sister Patient Bob Access

Encrypted Cloud Storage Encrypt files Medications Bob s health record Medications Cardiology Doctor Pharmacist X Rays Research Center Sister Patient Bob Access

Encrypted Cloud Storage Encrypt files Medications Bob s health record Medications Cardiology Doctor Pharmacist X Rays Research Center Sister Patient Bob Access

Encrypted Cloud Storage Encrypt files Medications Bob s health record Medications Cardiology Doctor Pharmacist X Rays Research Center Patient Bob Access Sister How to implement access policy??

Access control for encrypted data How can we implement access control when data is encrypted? Our goal: Allow server to perform access control on encrypted data Server will: take files encrypted for Bob transform them into files encrypted for appropriate recipient without decrypting anything. Server cannot decrypt!

Access control for encrypted data: Our approach Encrypt files Medications Bob s health record Medications Cardiology Doctor Pharmacist X Rays Research Center Patient Bob Generate policy token Access token Sister

Access control for encrypted data: Our approach Encrypt files Medications Bob s health record Medications Cardiology X Rays + + + token token token Doctor Pharmacist Research Center Patient Bob Generate policy token Access token Sister

Access control for encrypted data: Our approach Encrypt files Medications Bob s health record Medications Cardiology X Rays + + + token token token Correct recipients retrieve and decrypt Doctor Pharmacist Research Center Patient Bob Generate policy token Access token Sister

Access control for encrypted data: Our approach Encrypt files Medications Bob s health record Medications Cardiology X Rays + + + token token token Correct recipients retrieve and decrypt Doctor Pharmacist Research Center Patient Bob Generate policy token Access Sister Server can: Transform encrypted files into files readable by appropriate recipients Cannot decrypt or read token any files (Strong notion of security vs collusion, etc)

Private Access Control Want private cloud, where sensitive data is hidden even from cloud operator Previous scenario: server can implement policy but cannot decrypt any ciphertexts But sometimes the policy itself is private! E.g.: Whether patient has chosen to participate in research project for mental health records May want to give access to one family member without revealing that fact to others Question: Can we allow the same functionality, but without revealing the policy, even to the cloud provider?

Access control for encrypted data: Our approach Encrypt files Medications Bob s health record Medications Cardiology X Rays + + + token token token Correct recipients retrieve and decrypt Doctor Pharmacist Research Center Patient Bob Generate policy token Access token Sister

Access control for encrypted data: Our approach Encrypt files Medications Bob s health record + Medications + Cardiology X Rays + token token token Correct recipients retrieve and decrypt Doctor Pharmacist Research Center Patient Bob Generate policy token Access token Sister

Access control for encrypted data: Our approach Encrypt files Medications Bob s health record + Medications + Cardiology X Rays + token token token Correct recipients retrieve and decrypt Doctor Pharmacist Research Center Patient Bob Generate policy token Access token Sister

Access control for encrypted data: Our approach Encrypt files Medications Bob s health record + Medications + Cardiology X Rays + token token token Correct recipients retrieve and decrypt Doctor Pharmacist Research Center Patient Bob Generate policy token Access Sister Server can: Transform encrypted files into files readable by appropriate recipients Cannot decrypt or read token any files Cannot learn anything about policy (Strong notion of security vs collusion, etc)

Constructions Private access control on encrypted data Hides policy and tags For very simple policies Construction based on pairings Relatively mild assumptions about pairing curves Can also achieve more efficient constructions where and tags are not hidden Fairly general formulas Similar to work on outsourcing ABE decryption [GHW 2011]

Advantages Private data is hidden from server: Security against server compromise, theft, untrusted operators, etc As secure as patient downloading, decrypting, re encrypting Even if server colludes with recipients Patient only online to set/change policy Access control is invisible to recipients Decryptor s efficiency independent of policy is hidden from recipients Revocation is invisible for recipients

Conclusions and Future Work

Open Issues Additional privacy concerns Key backup Identification Usability?

Conclusions Electronic Medical Records present risks to privacy Access control is not sufficient Encryption + Patient Control is the right approach 2 approaches for partial access when files are encrypted Hierarchical sharing Re encryption based sharing

Questions