Skip to main content

A Data-Centric Security Analysis Of ICGrid

  • Chapter

The Data Grid is becoming a new paradigm for eHealth systems due to its enormous storage potential using decentralized resources managed by different organizations. The storage capabilities in these novel “Health Grids” are quite suitable for the requirements of systems like ICGrid, which captures, stores and manages data and metadata from Intensive Care Units. However, this paradigm depends on a widely distributed storage sites, therefore requiring new security mechanisms, able to avoid potential leaks to cope with modification and destruction of stored data under the presence of external or internal attacks. Particular emphasis must be put on the patient’s personal data, the protection of which is required by legislations in many countries of the European Union and the world in general. Taking into consideration underlying data protection legislations and technological data privacy mechanisms, in this paper we identify the security issues related with ICGrid’s data and metadata after applying an analysis framework extended from our previous research on the Data Grid’s storage services. Then, we present a privacy protocol that demonstrates the use of two basic approaches (encryption and fragmentation) to protect patients’ private data stored using the ICGrid system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. European Parliament. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities of 23 November 1995 No L. 281 p. 31., Octuber 1995.

    Google Scholar 

  2. Jesus Luna et al. An analysis of security services in grid storage systems. In CoreGRID Workshop on Grid Middleware 2007, June 2007.

    Google Scholar 

  3. K. Gjermundrod, M. Dikaiakos, D. Zeinalipour-Yazti, G. Panayi, and Th. Kyprianou. Icgrid: Enabling intensive care medical research on the EGEE grid. In From Genes to Personalized HealthCare: Grid Solutons for the Life Sciences. Proceedings of HealthGrid 2007, pages 248-257. IOS Press, 2007.

    Google Scholar 

  4. B. Hayes-Roth et al. Guardian: A prototype intelligent agent for intensive care monitoring. Artificial Intelligence in Medicine, 4:165-185, 1992.

    Article  Google Scholar 

  5. DL Sackett et al. Evidence-Based Medicine: How to Practice and Teach EBM. Churchill Livingstone, 2nd edition, 2000.

    Google Scholar 

  6. B.M. Dawant et al. Knowledge-based systems for intelligent patient monitoring and management in critical care environments. In Joseph D. Bronzino, editor, Biomedical Engineering Handbook. CRC Press Ltd, 2000.

    Google Scholar 

  7. Enabling Grids for E-SciencE project. http://www.eu-egee.org/.

  8. N. Santos and B. Koblitz. Distributed Metadata with the AMGA Metadata Catalog. In Workshop on Next-Generation Distributed Data Management HPDC-15, June 2006.

    Google Scholar 

  9. European Health Management Association. Legally eHealth - Deliverable 2. http://www.ehma.org/fileupload/Downloads/Legally eHealth-Del 02-Data Protection- v08(revised after submission).pdf, January 2006. Processing Medical data: data protection, confidentiallity and security.

  10. Federal Ministry of Health. The Electronic Health Card. http://www.die-gesundheitskarte.de/download/dokumente/broschuere elektronische gesundheitskarte engl. pdf, Octuber 2006. Public Relations Section. Berlin, Germany.

  11. Von Welch. Globus toolkit version 4 grid security infrastructure: A standards perspec- tive. http://www.globus.org/toolkit/docs/4.0/security/GT4-GSI-Overview.pdf, 2005. The Globus Security Team.

  12. R. Alfieri, R. Cecchini, V. Ciaschini, L. dellAgnello and A. Frohner, A. Gianoli,  K. Lorentey, and F. Spataro. VOMS, an Authorization System for Virtual Organizations. In First European Across Grids Conference, February 2003.

    Google Scholar 

  13. Erik Riedel, Mahesh Kallahalla, and Ram Swaminathan. A framework for evaluating storage system security. In Darrell D. E. Long, editor, FAST, pages 15-30. USENIX, 2002.

    Google Scholar 

  14. Michael O. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM, 36(2):335-348, 1989.

    MATH  MathSciNet  Google Scholar 

  15. Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, and Kaladhar Voruganti. Se- cure, archival storage with potshards. In FAST’07: Proceedings of the 5th conference on USENIX Conference on File and Storage Technologies, pages 11-11, Berkeley, CA, USA, 2007. USENIX Association.

    Google Scholar 

  16. Cleversafe. http://www.cleversafe.com, 2007.

  17. Atul Adya, William J. Bolosky, Miguel Castro, Gerald Cermak, Ronnie Chaiken, John R. Douceur, Jon Howell, Jacob R. Lorch, Marvin Theimer, and Roger Wattenhofer. Farsite: Federated, available, and reliable storage for an incompletely trusted environment. In OSDI, 2002.

    Google Scholar 

  18. Adam L. Beberg and Vijay S. Pande. Storage@home: Petascale distributed storage. In IPDPS, pages 1-6. IEEE, 2007.

    Google Scholar 

  19. John Kubiatowicz, David Bindel, Yan Chen, Steven E. Czerwinski, Patrick R. Eaton,  Dennis Geels, Ramakrishna Gummadi, Sean C. Rhea, Hakim Weatherspoon, Westley Weimer, Chris Wells, and Ben Y. Zhao. Oceanstore: An architecture for global-scale persistent storage. In ASPLOS, pages 190-201, 2000.

    Google Scholar 

  20. Encrypted Storage and Hydra. https://twiki.cern.ch/twiki/bin/view/EGEE/DMEDS, September 2007.

  21. Graeme A. Stewart, David Cameron, Greig A Cowan, and Gavin McCance. Storage and Data Management in EGEE. In 5th Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), January 2007.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Luna, J. et al. (2008). A Data-Centric Security Analysis Of ICGrid. In: Gorlatch, S., Fragopoulou, P., Priol, T. (eds) Grid Computing. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09457-1_17

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-09457-1_17

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-09456-4

  • Online ISBN: 978-0-387-09457-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics