SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
Privacy Preserving Back-up and
 Recovery of Emergency Data

    Seminar on System Security for Master
                  SS2010
             Zdravko Danailov
Privacy Preserving Back-up and Recovery of Emergency Data                      2

                                                            Zdravko Danailov

                                         Outline

        Introduction
           The Telematics infrastructure
           Electronic Health Card
           Health Professional Card
           Hardware Security Module
           Emergency data
        Existing/ proposed solution for Back-up/Recovery of
        emergency data
           Existing/proposed solution
           Disadvantages
              Renewing of the eHC (lost, defect or expired)
              Recovery of emergency data on the eHC
        Krawczyk’s Secret Sharing Scheme
        Our proposal solution
        Conclusion
Privacy Preserving Back-up and Recovery of Emergency Data                      3

                                                            Zdravko Danailov

                          Basics: The Telematics infrastructure


        Overview of the entire architecture




        Primary systems architecture
Privacy Preserving Back-up and Recovery of Emergency Data                      4

                                                            Zdravko Danailov

                          Basics: Electronic Health Card (eHC)


          eHC
            Solution design by the Fraunhofer Institute
            Chip card (HSM)
            Content (emergency data, ePrescription)
Privacy Preserving Back-up and Recovery of Emergency Data                      5

                                                            Zdravko Danailov

                         Basics: Health Professional Card (HPC)


          HPC
            Solution design by “Elektronischer Arztausweis”-work
            group
            individually programmed access authorization card for
            health professionals (e.g. doctors, pharmacists)
            Doctor-to-doctor Method (D2D)
            Creation of medicament documentation via the web-
            based software star.net®
Privacy Preserving Back-up and Recovery of Emergency Data                      6

                                                            Zdravko Danailov

                        Basics: Hardware Security Module (HSM)


          HSM
            Use as card (eHC, HPC) or eHC chip card terminal
            Connection via USB-port or serial interface
Privacy Preserving Back-up and Recovery of Emergency Data                      7

                                                            Zdravko Danailov

                                 Basics: Emergency data


          Emergency data                        Emergency data
            relevant diagnoses,                       declaration for
            medication or                             organs’ spending
            allergy/ intolerance
Privacy Preserving Back-up and Recovery of Emergency Data                      8

                                                            Zdravko Danailov

                                         Outline

        Introduction
           The Telematics infrastructure
           Electronic Health Card
           Health Professional Card
           Hardware Security Module
           Emergency data
        Existing/ proposed solution for Back-up/Recovery
        of emergency data
           Existing/proposed solution
           Disadvantages
              Renewing of the eHC (lost, defect or expired)
              Recovery of emergency data on the eHC
        Krawczyk’s Secret Sharing Scheme
        Our proposal solution
        Conclusion
Privacy Preserving Back-up and Recovery of Emergency Data                      9

                                                            Zdravko Danailov

                         Existing/ proposed solution: Overview

        Overview
           Person involved: patient, doctor, paramedic
           HSM: chip cards – eHC, HPC; chip card terminal;
           Processing emergency data: Back-up, Recovery, Update
Privacy Preserving Back-up and Recovery of Emergency Data                      10

                                                            Zdravko Danailov

                         Existing/ proposed solution by gematik



                                                Authentication

                                                Processing of emergency
                                                data

                                                Creating Back-up (on A4
                                                paper or in local database)

                                                Recovery of emergency data
                                                on eHC
Privacy Preserving Back-up and Recovery of Emergency Data                           11

                                                            Zdravko Danailov

      Disadvantages of the solution: Renewing of the eHC(lost, defect or expired)

        Renewing of the eHC (lost, defect or expired)
           Obtaining the emergency data from A4 paper
              Creation of A4 paper with emergency data – optional
              A4 paper – lost, stolen or deleted
              Exposing of private data
           Obtaining the emergency data from primary system’s database
              Temporary Back-up may be: 1.deleted 2.not accessible
Privacy Preserving Back-up and Recovery of Emergency Data                      12

                                                            Zdravko Danailov

        Disadvantages of the solution: Recovery of emergency data on the eHC

        Recovery of emergency data on the eHC
           Obtaining the emergency data from A4 paper
              Creation of A4 paper with emergency data – optional
              A4 paper – lost, stolen or deleted
              Exposing of private data
           Obtaining the emergency data from primary system’s database
              Temporary Back-up may be: 1.deleted 2.not accessible
Privacy Preserving Back-up and Recovery of Emergency Data                      13

                                                            Zdravko Danailov

                                         Outline

        Introduction
           The Telematics infrastructure
           Electronic Health Card
           Health Professional Card
           Hardware Security Module
           Emergency data
        Existing/ proposed solution for Back-up/Recovery of
        emergency data
           Existing/proposed solution
           Disadvantages
              Renewing of the eHC (lost, defect or expired)
              Recovery of emergency data on the eHC
        Krawczyk’s Secret Sharing Scheme
        Our proposal solution
        Conclusion
Privacy Preserving Back-up and Recovery of Emergency Data                          14

                                                            Zdravko Danailov

                               Secret Sharing Scheme (SS)

        Secret Sharing Scheme (n,m)
           Invented by both Adi Shamir and George Blackley independently of each
           other in 1979




        Method for distribution of a secret S among a group of n-
        participants

        Reconstruction is possible only when a sufficient number
        of shares are combined together
Privacy Preserving Back-up and Recovery of Emergency Data                              15

                                                            Zdravko Danailov

                             Shamir’s Secret Sharing Scheme

         Shamir’s Secret Sharing Scheme (n,t)
            Based on polynomial interpolation




            Distribution
                polynomial of degree t-1, secret S = k0, coefficients kt-1,…,k1 picked at
                random
                n points on the curve; n participants
            Reconstruction
                at least t out of the n players reveal their points
                sufficient information
                secret S
            information-theoretically secure
            storage efficient
                Size of shares = size of secret |S|
Privacy Preserving Back-up and Recovery of Emergency Data                      16

                                                            Zdravko Danailov

                           Information Dispersal Scheme (IDS)

        Information Dispersal Scheme (n,m)
           Based on error correcting codes (e.g. Reed-Solomon Code)




        Method for distribution of information F among a group of
        n-participants
        Reconstruction is possible when sufficient number of
        fragments (≥m) are combined together
        Secrecy is not important
        size of fragments =
Privacy Preserving Back-up and Recovery of Emergency Data                      17

                                                            Zdravko Danailov

                           Krawczyk’s Secret Sharing Scheme


         Krawczyk’s Secret Sharing Scheme (n,m)
            Combination of SS and IDS




         computationally secure
         less storage and bandwidth in comparison to Shamir’s SS
         size of shares = |si| <|S|
Privacy Preserving Back-up and Recovery of Emergency Data                      18

                                                            Zdravko Danailov

                                         Outline

        Introduction
           The Telematics infrastructure
           Electronic Health Card
           Health Professional Card
           Hardware Security Module
           Emergency data
        Existing/ proposed solution for Back-up/Recovery of
        emergency data
           Existing/proposed solution
           Disadvantages
              Renewing of the eHC (lost, defect or expired)
              Recovery of emergency data on the eHC
        Krawczyk’s Secret Sharing Scheme
        Our proposal solution
        Conclusion
Privacy Preserving Back-up and Recovery of Emergency Data                      19

                                                            Zdravko Danailov

                             Our proposal solution: Overview

        Overview
           Person involved: patient, doctor, paramedic
           HSM: chip cards – eHC, HPC; chip card terminal;




        Properties
           tolerate no non-availability
           preserve privacy
           no encryption but secret sharing
Privacy Preserving Back-up and Recovery of Emergency Data                             20

                                                             Zdravko Danailov

                               Our proposal solution: Back-up

        Back-up of emergency data
           Authentication (via e.g. ID-patient/ ID-doctor, ID-eHC/ID-HPC,
           Fingerprints, different types of digital signatures, PIN, etc.)
           Complete the form for emergency data and/ or form for organs’ donation
           Confirmation of the data, e.g. via fingerprint by the patient and doctor
           Back-up
              using Krawczyk’s SS – executed online via e.g. VPN
              using a portable device (e.g. USB-Stick) – executed offline
Privacy Preserving Back-up and Recovery of Emergency Data                              21

                                                            Zdravko Danailov

                              Our proposal solution: Recovery

        Recovery of emergency data
           Authentication (via e.g. ID-patient/ ID-doctor, ID-eHC/ID-HPC,
           Fingerprints, different types of digital signatures, PIN) on HSM
           Recovery of emergency data is possible
              using Krawczyk’s SS – executed online via e.g. VPN, from every “true”/
              authorized doctor or medical person
              using a portable device (e.g. USB-Stick) – executed offline
Privacy Preserving Back-up and Recovery of Emergency Data                      22

                                                            Zdravko Danailov

                                         Outline

        Introduction
           The Telematics infrastructure
           Electronic Health Card
           Health Professional Card
           Hardware Security Module
           Emergency data
        Existing/ proposed solution for Back-up/Recovery of
        emergency data
           Existing/proposed solution
           Disadvantages
              Renewing of the eHC (lost, defect or expired)
              Recovery of emergency data on the eHC
        Krawczyk’s Secret Sharing Scheme
        Our proposal solution
        Conclusion
Privacy Preserving Back-up and Recovery of Emergency Data                      23

                                                            Zdravko Danailov

                                        Conclusion

        Our proposal solution

           minimizes the exposition of privite data

           tolerates no non-availability

           offers better alternatives for back-up and recovery of
           emergency data

           uses no encryption but secret sharing

           computationally secure

           information-theoretically unsecure
Privacy Preserving Back-up and Recovery of Emergency Data                      24

                                                            Zdravko Danailov




                         Thank You!

Weitere ähnliche Inhalte

Kürzlich hochgeladen

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Kürzlich hochgeladen (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Empfohlen

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Empfohlen (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Privacy Preserving Back-up and Recovery of Emergency Data

  • 1. Privacy Preserving Back-up and Recovery of Emergency Data Seminar on System Security for Master SS2010 Zdravko Danailov
  • 2. Privacy Preserving Back-up and Recovery of Emergency Data 2 Zdravko Danailov Outline Introduction The Telematics infrastructure Electronic Health Card Health Professional Card Hardware Security Module Emergency data Existing/ proposed solution for Back-up/Recovery of emergency data Existing/proposed solution Disadvantages Renewing of the eHC (lost, defect or expired) Recovery of emergency data on the eHC Krawczyk’s Secret Sharing Scheme Our proposal solution Conclusion
  • 3. Privacy Preserving Back-up and Recovery of Emergency Data 3 Zdravko Danailov Basics: The Telematics infrastructure Overview of the entire architecture Primary systems architecture
  • 4. Privacy Preserving Back-up and Recovery of Emergency Data 4 Zdravko Danailov Basics: Electronic Health Card (eHC) eHC Solution design by the Fraunhofer Institute Chip card (HSM) Content (emergency data, ePrescription)
  • 5. Privacy Preserving Back-up and Recovery of Emergency Data 5 Zdravko Danailov Basics: Health Professional Card (HPC) HPC Solution design by “Elektronischer Arztausweis”-work group individually programmed access authorization card for health professionals (e.g. doctors, pharmacists) Doctor-to-doctor Method (D2D) Creation of medicament documentation via the web- based software star.net®
  • 6. Privacy Preserving Back-up and Recovery of Emergency Data 6 Zdravko Danailov Basics: Hardware Security Module (HSM) HSM Use as card (eHC, HPC) or eHC chip card terminal Connection via USB-port or serial interface
  • 7. Privacy Preserving Back-up and Recovery of Emergency Data 7 Zdravko Danailov Basics: Emergency data Emergency data Emergency data relevant diagnoses, declaration for medication or organs’ spending allergy/ intolerance
  • 8. Privacy Preserving Back-up and Recovery of Emergency Data 8 Zdravko Danailov Outline Introduction The Telematics infrastructure Electronic Health Card Health Professional Card Hardware Security Module Emergency data Existing/ proposed solution for Back-up/Recovery of emergency data Existing/proposed solution Disadvantages Renewing of the eHC (lost, defect or expired) Recovery of emergency data on the eHC Krawczyk’s Secret Sharing Scheme Our proposal solution Conclusion
  • 9. Privacy Preserving Back-up and Recovery of Emergency Data 9 Zdravko Danailov Existing/ proposed solution: Overview Overview Person involved: patient, doctor, paramedic HSM: chip cards – eHC, HPC; chip card terminal; Processing emergency data: Back-up, Recovery, Update
  • 10. Privacy Preserving Back-up and Recovery of Emergency Data 10 Zdravko Danailov Existing/ proposed solution by gematik Authentication Processing of emergency data Creating Back-up (on A4 paper or in local database) Recovery of emergency data on eHC
  • 11. Privacy Preserving Back-up and Recovery of Emergency Data 11 Zdravko Danailov Disadvantages of the solution: Renewing of the eHC(lost, defect or expired) Renewing of the eHC (lost, defect or expired) Obtaining the emergency data from A4 paper Creation of A4 paper with emergency data – optional A4 paper – lost, stolen or deleted Exposing of private data Obtaining the emergency data from primary system’s database Temporary Back-up may be: 1.deleted 2.not accessible
  • 12. Privacy Preserving Back-up and Recovery of Emergency Data 12 Zdravko Danailov Disadvantages of the solution: Recovery of emergency data on the eHC Recovery of emergency data on the eHC Obtaining the emergency data from A4 paper Creation of A4 paper with emergency data – optional A4 paper – lost, stolen or deleted Exposing of private data Obtaining the emergency data from primary system’s database Temporary Back-up may be: 1.deleted 2.not accessible
  • 13. Privacy Preserving Back-up and Recovery of Emergency Data 13 Zdravko Danailov Outline Introduction The Telematics infrastructure Electronic Health Card Health Professional Card Hardware Security Module Emergency data Existing/ proposed solution for Back-up/Recovery of emergency data Existing/proposed solution Disadvantages Renewing of the eHC (lost, defect or expired) Recovery of emergency data on the eHC Krawczyk’s Secret Sharing Scheme Our proposal solution Conclusion
  • 14. Privacy Preserving Back-up and Recovery of Emergency Data 14 Zdravko Danailov Secret Sharing Scheme (SS) Secret Sharing Scheme (n,m) Invented by both Adi Shamir and George Blackley independently of each other in 1979 Method for distribution of a secret S among a group of n- participants Reconstruction is possible only when a sufficient number of shares are combined together
  • 15. Privacy Preserving Back-up and Recovery of Emergency Data 15 Zdravko Danailov Shamir’s Secret Sharing Scheme Shamir’s Secret Sharing Scheme (n,t) Based on polynomial interpolation Distribution polynomial of degree t-1, secret S = k0, coefficients kt-1,…,k1 picked at random n points on the curve; n participants Reconstruction at least t out of the n players reveal their points sufficient information secret S information-theoretically secure storage efficient Size of shares = size of secret |S|
  • 16. Privacy Preserving Back-up and Recovery of Emergency Data 16 Zdravko Danailov Information Dispersal Scheme (IDS) Information Dispersal Scheme (n,m) Based on error correcting codes (e.g. Reed-Solomon Code) Method for distribution of information F among a group of n-participants Reconstruction is possible when sufficient number of fragments (≥m) are combined together Secrecy is not important size of fragments =
  • 17. Privacy Preserving Back-up and Recovery of Emergency Data 17 Zdravko Danailov Krawczyk’s Secret Sharing Scheme Krawczyk’s Secret Sharing Scheme (n,m) Combination of SS and IDS computationally secure less storage and bandwidth in comparison to Shamir’s SS size of shares = |si| <|S|
  • 18. Privacy Preserving Back-up and Recovery of Emergency Data 18 Zdravko Danailov Outline Introduction The Telematics infrastructure Electronic Health Card Health Professional Card Hardware Security Module Emergency data Existing/ proposed solution for Back-up/Recovery of emergency data Existing/proposed solution Disadvantages Renewing of the eHC (lost, defect or expired) Recovery of emergency data on the eHC Krawczyk’s Secret Sharing Scheme Our proposal solution Conclusion
  • 19. Privacy Preserving Back-up and Recovery of Emergency Data 19 Zdravko Danailov Our proposal solution: Overview Overview Person involved: patient, doctor, paramedic HSM: chip cards – eHC, HPC; chip card terminal; Properties tolerate no non-availability preserve privacy no encryption but secret sharing
  • 20. Privacy Preserving Back-up and Recovery of Emergency Data 20 Zdravko Danailov Our proposal solution: Back-up Back-up of emergency data Authentication (via e.g. ID-patient/ ID-doctor, ID-eHC/ID-HPC, Fingerprints, different types of digital signatures, PIN, etc.) Complete the form for emergency data and/ or form for organs’ donation Confirmation of the data, e.g. via fingerprint by the patient and doctor Back-up using Krawczyk’s SS – executed online via e.g. VPN using a portable device (e.g. USB-Stick) – executed offline
  • 21. Privacy Preserving Back-up and Recovery of Emergency Data 21 Zdravko Danailov Our proposal solution: Recovery Recovery of emergency data Authentication (via e.g. ID-patient/ ID-doctor, ID-eHC/ID-HPC, Fingerprints, different types of digital signatures, PIN) on HSM Recovery of emergency data is possible using Krawczyk’s SS – executed online via e.g. VPN, from every “true”/ authorized doctor or medical person using a portable device (e.g. USB-Stick) – executed offline
  • 22. Privacy Preserving Back-up and Recovery of Emergency Data 22 Zdravko Danailov Outline Introduction The Telematics infrastructure Electronic Health Card Health Professional Card Hardware Security Module Emergency data Existing/ proposed solution for Back-up/Recovery of emergency data Existing/proposed solution Disadvantages Renewing of the eHC (lost, defect or expired) Recovery of emergency data on the eHC Krawczyk’s Secret Sharing Scheme Our proposal solution Conclusion
  • 23. Privacy Preserving Back-up and Recovery of Emergency Data 23 Zdravko Danailov Conclusion Our proposal solution minimizes the exposition of privite data tolerates no non-availability offers better alternatives for back-up and recovery of emergency data uses no encryption but secret sharing computationally secure information-theoretically unsecure
  • 24. Privacy Preserving Back-up and Recovery of Emergency Data 24 Zdravko Danailov Thank You!