Secure Cross-Border Exchange of Health Related Data: The KONFIDO Approach
- 409 Downloads
Abstract
This paper sets up the scene of the KONFIDO project in a clear way. In particular, it: (i) defines KONFIDO objectives and draws KONFIDO boundaries; (ii) identifies KONFIDO users and beneficiaries; (iii) describes the environment where KONFIDO is embedded; (iv) provides a bird’s eye view of the KONFIDO technologies and how they will be deployed in the pilot studies of the project; and (v) presents the approach that the KONFIDO consortium will take to prove that the proposed solutions work. KONFIDO addresses one of the top three priorities of the European Commission regarding the digital transformation of health and care in the Digital Single Market, i.e. citizens’ secure access to their health data, also across borders. To make sure that KONFIDO has a high-impact, its results are exposed to the wide public by developing three substantial pilots in three distinct European countries (namely Denmark, Italy, and Spain).
Keywords
eHealth OpenNCP Trusted computingNotes
Acknowledgements
The authors are grateful to the following people, for their valuable contributions to this paper: Salvatore D’Antonio and Giovanni Mazzeo (CINI), Pantelis Natsiavas (CERTH), Jesper Soederberg Knudsen (MEDCOM).
The research leading to these results has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 727528 (KONFIDO - Secure and Trusted Paradigm for Interoperable eHealth Services). This paper reflects only the authors’ views and the Commission is not liable for any use that may be made of the information contained therein.
References
- 1.European Commission: Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions on enabling the digital transformation of health and care in the Digital Single Market; empowering citizens and building a healthier society, Brussels, 25.4.2018 COM (2018) 233 final. http://ec.europa.eu/newsroom/dae/document.cfm?doc_id=51628
- 2.Theodouli, A., Arakliotis, S., Moschou, K., Votis, K., Tzovaras, D.: On the design of a Blockchain-based system to facilitate healthcare data sharing. In: Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 1374–1379 (2018)Google Scholar
- 3.Mesaritakis, C., et al.: Physical unclonable function based on a multi-mode optical waveguide. Sci. Rep. 8(1), 9653 (2018). https://doi.org/10.1038/s41598-018-28008-6CrossRefGoogle Scholar
- 4.Carpov, S., Tortech, T.: Secure top most significant genome variants search: iDASH 2017 competition. BMC Med. Genomics 11(Suppl 4), 82 (2018). https://doi.org/10.1186/s12920-018-0399-xCrossRefGoogle Scholar
- 5.Coppolino, L., D’Antonio, S., Mazzeo, G., Romano, L., Sgaglione, L.: Exploiting new CPU extensions for secure exchange of eHealth data at the EU level. In: 14th European Dependable Computing Conference (EDCC2018) (2018). https://doi.org/10.1109/EDCC.2018.00015
- 6.Natsiavas, P., et al.: Comprehensive user requirements engineering methodology for secure and interoperable health data exchange. BMC Med. Inform. Decis. Mak. 18(1), 85 (2018). https://doi.org/10.1186/s12911-018-0664-0CrossRefGoogle Scholar
- 7.Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance) ELI. http://data.europa.eu/eli/reg/2016/679/2016-05-04
- 8.Staffa, M., et al.: An OpenNCP-based solution for secure ehealth data exchange. J. Netw. Comput. Appl. 116, 65–85 (2018). https://doi.org/10.1016/j.jnca.2018.05.012. ISSN 1084-8045CrossRefGoogle Scholar
- 9.Gelenbe, E., et al.: Security in Computer and Information Sciences. First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26–27, 2018, Revised Selected Papers. Lecture Notes, Vol. CCIS 821, Springer, Berlin (2018). https://link.springer.com/content/pdf/10.1007%2F978-3-319-95189-8.pdf
- 10.
- 11.Coppolino, L., D’Antonio, S., Mazzeo, G., Romano, L.: A comparative analysis of emerging approaches for securing java software with Intel SGX. Future Gener. Comput. Syst. 97, 620–633 (2019). https://doi.org/10.1016/j.future.2019.03.018. ISSN 0167-739XCrossRefGoogle Scholar