SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
Privacy Preserving Back-up and
 Recovery of Emergency Data

    Seminar on System Security for Master
                  SS2010
             Zdravko Danailov
Privacy Preserving Back-up and Recovery of Emergency Data                      2

                                                            Zdravko Danailov

                                         Outline

        Introduction
           The Telematics infrastructure
           Electronic Health Card
           Health Professional Card
           Hardware Security Module
           Emergency data
        Existing/ proposed solution for Back-up/Recovery of
        emergency data
           Existing/proposed solution
           Disadvantages
              Renewing of the eHC (lost, defect or expired)
              Recovery of emergency data on the eHC
        Krawczyk’s Secret Sharing Scheme
        Our proposal solution
        Conclusion
Privacy Preserving Back-up and Recovery of Emergency Data                      3

                                                            Zdravko Danailov

                          Basics: The Telematics infrastructure


        Overview of the entire architecture




        Primary systems architecture
Privacy Preserving Back-up and Recovery of Emergency Data                      4

                                                            Zdravko Danailov

                          Basics: Electronic Health Card (eHC)


          eHC
            Solution design by the Fraunhofer Institute
            Chip card (HSM)
            Content (emergency data, ePrescription)
Privacy Preserving Back-up and Recovery of Emergency Data                      5

                                                            Zdravko Danailov

                         Basics: Health Professional Card (HPC)


          HPC
            Solution design by “Elektronischer Arztausweis”-work
            group
            individually programmed access authorization card for
            health professionals (e.g. doctors, pharmacists)
            Doctor-to-doctor Method (D2D)
            Creation of medicament documentation via the web-
            based software star.net®
Privacy Preserving Back-up and Recovery of Emergency Data                      6

                                                            Zdravko Danailov

                        Basics: Hardware Security Module (HSM)


          HSM
            Use as card (eHC, HPC) or eHC chip card terminal
            Connection via USB-port or serial interface
Privacy Preserving Back-up and Recovery of Emergency Data                      7

                                                            Zdravko Danailov

                                 Basics: Emergency data


          Emergency data                        Emergency data
            relevant diagnoses,                       declaration for
            medication or                             organs’ spending
            allergy/ intolerance
Privacy Preserving Back-up and Recovery of Emergency Data                      8

                                                            Zdravko Danailov

                                         Outline

        Introduction
           The Telematics infrastructure
           Electronic Health Card
           Health Professional Card
           Hardware Security Module
           Emergency data
        Existing/ proposed solution for Back-up/Recovery
        of emergency data
           Existing/proposed solution
           Disadvantages
              Renewing of the eHC (lost, defect or expired)
              Recovery of emergency data on the eHC
        Krawczyk’s Secret Sharing Scheme
        Our proposal solution
        Conclusion
Privacy Preserving Back-up and Recovery of Emergency Data                      9

                                                            Zdravko Danailov

                         Existing/ proposed solution: Overview

        Overview
           Person involved: patient, doctor, paramedic
           HSM: chip cards – eHC, HPC; chip card terminal;
           Processing emergency data: Back-up, Recovery, Update
Privacy Preserving Back-up and Recovery of Emergency Data                      10

                                                            Zdravko Danailov

                         Existing/ proposed solution by gematik



                                                Authentication

                                                Processing of emergency
                                                data

                                                Creating Back-up (on A4
                                                paper or in local database)

                                                Recovery of emergency data
                                                on eHC
Privacy Preserving Back-up and Recovery of Emergency Data                           11

                                                            Zdravko Danailov

      Disadvantages of the solution: Renewing of the eHC(lost, defect or expired)

        Renewing of the eHC (lost, defect or expired)
           Obtaining the emergency data from A4 paper
              Creation of A4 paper with emergency data – optional
              A4 paper – lost, stolen or deleted
              Exposing of private data
           Obtaining the emergency data from primary system’s database
              Temporary Back-up may be: 1.deleted 2.not accessible
Privacy Preserving Back-up and Recovery of Emergency Data                      12

                                                            Zdravko Danailov

        Disadvantages of the solution: Recovery of emergency data on the eHC

        Recovery of emergency data on the eHC
           Obtaining the emergency data from A4 paper
              Creation of A4 paper with emergency data – optional
              A4 paper – lost, stolen or deleted
              Exposing of private data
           Obtaining the emergency data from primary system’s database
              Temporary Back-up may be: 1.deleted 2.not accessible
Privacy Preserving Back-up and Recovery of Emergency Data                      13

                                                            Zdravko Danailov

                                         Outline

        Introduction
           The Telematics infrastructure
           Electronic Health Card
           Health Professional Card
           Hardware Security Module
           Emergency data
        Existing/ proposed solution for Back-up/Recovery of
        emergency data
           Existing/proposed solution
           Disadvantages
              Renewing of the eHC (lost, defect or expired)
              Recovery of emergency data on the eHC
        Krawczyk’s Secret Sharing Scheme
        Our proposal solution
        Conclusion
Privacy Preserving Back-up and Recovery of Emergency Data                          14

                                                            Zdravko Danailov

                               Secret Sharing Scheme (SS)

        Secret Sharing Scheme (n,m)
           Invented by both Adi Shamir and George Blackley independently of each
           other in 1979




        Method for distribution of a secret S among a group of n-
        participants

        Reconstruction is possible only when a sufficient number
        of shares are combined together
Privacy Preserving Back-up and Recovery of Emergency Data                              15

                                                            Zdravko Danailov

                             Shamir’s Secret Sharing Scheme

         Shamir’s Secret Sharing Scheme (n,t)
            Based on polynomial interpolation




            Distribution
                polynomial of degree t-1, secret S = k0, coefficients kt-1,…,k1 picked at
                random
                n points on the curve; n participants
            Reconstruction
                at least t out of the n players reveal their points
                sufficient information
                secret S
            information-theoretically secure
            storage efficient
                Size of shares = size of secret |S|
Privacy Preserving Back-up and Recovery of Emergency Data                      16

                                                            Zdravko Danailov

                           Information Dispersal Scheme (IDS)

        Information Dispersal Scheme (n,m)
           Based on error correcting codes (e.g. Reed-Solomon Code)




        Method for distribution of information F among a group of
        n-participants
        Reconstruction is possible when sufficient number of
        fragments (≥m) are combined together
        Secrecy is not important
        size of fragments =
Privacy Preserving Back-up and Recovery of Emergency Data                      17

                                                            Zdravko Danailov

                           Krawczyk’s Secret Sharing Scheme


         Krawczyk’s Secret Sharing Scheme (n,m)
            Combination of SS and IDS




         computationally secure
         less storage and bandwidth in comparison to Shamir’s SS
         size of shares = |si| <|S|
Privacy Preserving Back-up and Recovery of Emergency Data                      18

                                                            Zdravko Danailov

                                         Outline

        Introduction
           The Telematics infrastructure
           Electronic Health Card
           Health Professional Card
           Hardware Security Module
           Emergency data
        Existing/ proposed solution for Back-up/Recovery of
        emergency data
           Existing/proposed solution
           Disadvantages
              Renewing of the eHC (lost, defect or expired)
              Recovery of emergency data on the eHC
        Krawczyk’s Secret Sharing Scheme
        Our proposal solution
        Conclusion
Privacy Preserving Back-up and Recovery of Emergency Data                      19

                                                            Zdravko Danailov

                             Our proposal solution: Overview

        Overview
           Person involved: patient, doctor, paramedic
           HSM: chip cards – eHC, HPC; chip card terminal;




        Properties
           tolerate no non-availability
           preserve privacy
           no encryption but secret sharing
Privacy Preserving Back-up and Recovery of Emergency Data                             20

                                                             Zdravko Danailov

                               Our proposal solution: Back-up

        Back-up of emergency data
           Authentication (via e.g. ID-patient/ ID-doctor, ID-eHC/ID-HPC,
           Fingerprints, different types of digital signatures, PIN, etc.)
           Complete the form for emergency data and/ or form for organs’ donation
           Confirmation of the data, e.g. via fingerprint by the patient and doctor
           Back-up
              using Krawczyk’s SS – executed online via e.g. VPN
              using a portable device (e.g. USB-Stick) – executed offline
Privacy Preserving Back-up and Recovery of Emergency Data                              21

                                                            Zdravko Danailov

                              Our proposal solution: Recovery

        Recovery of emergency data
           Authentication (via e.g. ID-patient/ ID-doctor, ID-eHC/ID-HPC,
           Fingerprints, different types of digital signatures, PIN) on HSM
           Recovery of emergency data is possible
              using Krawczyk’s SS – executed online via e.g. VPN, from every “true”/
              authorized doctor or medical person
              using a portable device (e.g. USB-Stick) – executed offline
Privacy Preserving Back-up and Recovery of Emergency Data                      22

                                                            Zdravko Danailov

                                         Outline

        Introduction
           The Telematics infrastructure
           Electronic Health Card
           Health Professional Card
           Hardware Security Module
           Emergency data
        Existing/ proposed solution for Back-up/Recovery of
        emergency data
           Existing/proposed solution
           Disadvantages
              Renewing of the eHC (lost, defect or expired)
              Recovery of emergency data on the eHC
        Krawczyk’s Secret Sharing Scheme
        Our proposal solution
        Conclusion
Privacy Preserving Back-up and Recovery of Emergency Data                      23

                                                            Zdravko Danailov

                                        Conclusion

        Our proposal solution

           minimizes the exposition of privite data

           tolerates no non-availability

           offers better alternatives for back-up and recovery of
           emergency data

           uses no encryption but secret sharing

           computationally secure

           information-theoretically unsecure
Privacy Preserving Back-up and Recovery of Emergency Data                      24

                                                            Zdravko Danailov




                         Thank You!

Mais conteúdo relacionado

Último

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 

Último (20)

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Destaque

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destaque (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Privacy Preserving Back-up and Recovery of Emergency Data

  • 1. Privacy Preserving Back-up and Recovery of Emergency Data Seminar on System Security for Master SS2010 Zdravko Danailov
  • 2. Privacy Preserving Back-up and Recovery of Emergency Data 2 Zdravko Danailov Outline Introduction The Telematics infrastructure Electronic Health Card Health Professional Card Hardware Security Module Emergency data Existing/ proposed solution for Back-up/Recovery of emergency data Existing/proposed solution Disadvantages Renewing of the eHC (lost, defect or expired) Recovery of emergency data on the eHC Krawczyk’s Secret Sharing Scheme Our proposal solution Conclusion
  • 3. Privacy Preserving Back-up and Recovery of Emergency Data 3 Zdravko Danailov Basics: The Telematics infrastructure Overview of the entire architecture Primary systems architecture
  • 4. Privacy Preserving Back-up and Recovery of Emergency Data 4 Zdravko Danailov Basics: Electronic Health Card (eHC) eHC Solution design by the Fraunhofer Institute Chip card (HSM) Content (emergency data, ePrescription)
  • 5. Privacy Preserving Back-up and Recovery of Emergency Data 5 Zdravko Danailov Basics: Health Professional Card (HPC) HPC Solution design by “Elektronischer Arztausweis”-work group individually programmed access authorization card for health professionals (e.g. doctors, pharmacists) Doctor-to-doctor Method (D2D) Creation of medicament documentation via the web- based software star.net®
  • 6. Privacy Preserving Back-up and Recovery of Emergency Data 6 Zdravko Danailov Basics: Hardware Security Module (HSM) HSM Use as card (eHC, HPC) or eHC chip card terminal Connection via USB-port or serial interface
  • 7. Privacy Preserving Back-up and Recovery of Emergency Data 7 Zdravko Danailov Basics: Emergency data Emergency data Emergency data relevant diagnoses, declaration for medication or organs’ spending allergy/ intolerance
  • 8. Privacy Preserving Back-up and Recovery of Emergency Data 8 Zdravko Danailov Outline Introduction The Telematics infrastructure Electronic Health Card Health Professional Card Hardware Security Module Emergency data Existing/ proposed solution for Back-up/Recovery of emergency data Existing/proposed solution Disadvantages Renewing of the eHC (lost, defect or expired) Recovery of emergency data on the eHC Krawczyk’s Secret Sharing Scheme Our proposal solution Conclusion
  • 9. Privacy Preserving Back-up and Recovery of Emergency Data 9 Zdravko Danailov Existing/ proposed solution: Overview Overview Person involved: patient, doctor, paramedic HSM: chip cards – eHC, HPC; chip card terminal; Processing emergency data: Back-up, Recovery, Update
  • 10. Privacy Preserving Back-up and Recovery of Emergency Data 10 Zdravko Danailov Existing/ proposed solution by gematik Authentication Processing of emergency data Creating Back-up (on A4 paper or in local database) Recovery of emergency data on eHC
  • 11. Privacy Preserving Back-up and Recovery of Emergency Data 11 Zdravko Danailov Disadvantages of the solution: Renewing of the eHC(lost, defect or expired) Renewing of the eHC (lost, defect or expired) Obtaining the emergency data from A4 paper Creation of A4 paper with emergency data – optional A4 paper – lost, stolen or deleted Exposing of private data Obtaining the emergency data from primary system’s database Temporary Back-up may be: 1.deleted 2.not accessible
  • 12. Privacy Preserving Back-up and Recovery of Emergency Data 12 Zdravko Danailov Disadvantages of the solution: Recovery of emergency data on the eHC Recovery of emergency data on the eHC Obtaining the emergency data from A4 paper Creation of A4 paper with emergency data – optional A4 paper – lost, stolen or deleted Exposing of private data Obtaining the emergency data from primary system’s database Temporary Back-up may be: 1.deleted 2.not accessible
  • 13. Privacy Preserving Back-up and Recovery of Emergency Data 13 Zdravko Danailov Outline Introduction The Telematics infrastructure Electronic Health Card Health Professional Card Hardware Security Module Emergency data Existing/ proposed solution for Back-up/Recovery of emergency data Existing/proposed solution Disadvantages Renewing of the eHC (lost, defect or expired) Recovery of emergency data on the eHC Krawczyk’s Secret Sharing Scheme Our proposal solution Conclusion
  • 14. Privacy Preserving Back-up and Recovery of Emergency Data 14 Zdravko Danailov Secret Sharing Scheme (SS) Secret Sharing Scheme (n,m) Invented by both Adi Shamir and George Blackley independently of each other in 1979 Method for distribution of a secret S among a group of n- participants Reconstruction is possible only when a sufficient number of shares are combined together
  • 15. Privacy Preserving Back-up and Recovery of Emergency Data 15 Zdravko Danailov Shamir’s Secret Sharing Scheme Shamir’s Secret Sharing Scheme (n,t) Based on polynomial interpolation Distribution polynomial of degree t-1, secret S = k0, coefficients kt-1,…,k1 picked at random n points on the curve; n participants Reconstruction at least t out of the n players reveal their points sufficient information secret S information-theoretically secure storage efficient Size of shares = size of secret |S|
  • 16. Privacy Preserving Back-up and Recovery of Emergency Data 16 Zdravko Danailov Information Dispersal Scheme (IDS) Information Dispersal Scheme (n,m) Based on error correcting codes (e.g. Reed-Solomon Code) Method for distribution of information F among a group of n-participants Reconstruction is possible when sufficient number of fragments (≥m) are combined together Secrecy is not important size of fragments =
  • 17. Privacy Preserving Back-up and Recovery of Emergency Data 17 Zdravko Danailov Krawczyk’s Secret Sharing Scheme Krawczyk’s Secret Sharing Scheme (n,m) Combination of SS and IDS computationally secure less storage and bandwidth in comparison to Shamir’s SS size of shares = |si| <|S|
  • 18. Privacy Preserving Back-up and Recovery of Emergency Data 18 Zdravko Danailov Outline Introduction The Telematics infrastructure Electronic Health Card Health Professional Card Hardware Security Module Emergency data Existing/ proposed solution for Back-up/Recovery of emergency data Existing/proposed solution Disadvantages Renewing of the eHC (lost, defect or expired) Recovery of emergency data on the eHC Krawczyk’s Secret Sharing Scheme Our proposal solution Conclusion
  • 19. Privacy Preserving Back-up and Recovery of Emergency Data 19 Zdravko Danailov Our proposal solution: Overview Overview Person involved: patient, doctor, paramedic HSM: chip cards – eHC, HPC; chip card terminal; Properties tolerate no non-availability preserve privacy no encryption but secret sharing
  • 20. Privacy Preserving Back-up and Recovery of Emergency Data 20 Zdravko Danailov Our proposal solution: Back-up Back-up of emergency data Authentication (via e.g. ID-patient/ ID-doctor, ID-eHC/ID-HPC, Fingerprints, different types of digital signatures, PIN, etc.) Complete the form for emergency data and/ or form for organs’ donation Confirmation of the data, e.g. via fingerprint by the patient and doctor Back-up using Krawczyk’s SS – executed online via e.g. VPN using a portable device (e.g. USB-Stick) – executed offline
  • 21. Privacy Preserving Back-up and Recovery of Emergency Data 21 Zdravko Danailov Our proposal solution: Recovery Recovery of emergency data Authentication (via e.g. ID-patient/ ID-doctor, ID-eHC/ID-HPC, Fingerprints, different types of digital signatures, PIN) on HSM Recovery of emergency data is possible using Krawczyk’s SS – executed online via e.g. VPN, from every “true”/ authorized doctor or medical person using a portable device (e.g. USB-Stick) – executed offline
  • 22. Privacy Preserving Back-up and Recovery of Emergency Data 22 Zdravko Danailov Outline Introduction The Telematics infrastructure Electronic Health Card Health Professional Card Hardware Security Module Emergency data Existing/ proposed solution for Back-up/Recovery of emergency data Existing/proposed solution Disadvantages Renewing of the eHC (lost, defect or expired) Recovery of emergency data on the eHC Krawczyk’s Secret Sharing Scheme Our proposal solution Conclusion
  • 23. Privacy Preserving Back-up and Recovery of Emergency Data 23 Zdravko Danailov Conclusion Our proposal solution minimizes the exposition of privite data tolerates no non-availability offers better alternatives for back-up and recovery of emergency data uses no encryption but secret sharing computationally secure information-theoretically unsecure
  • 24. Privacy Preserving Back-up and Recovery of Emergency Data 24 Zdravko Danailov Thank You!