Advertisement

Towards Reliable Remote Healthcare Applications Using Combined Fuzzy Extraction

  • Jorge GuajardoEmail author
  • Muhammad Asim
  • Milan Petković
Chapter
Part of the Information Security and Cryptography book series (ISC)

Abstract

There are several important trends in healthcare that call for the deployment of remote healthcare applications. It is expected that people will live longer and that chronic diseases, such as hypertension and diabetes, will become more prevalent among older adults.

Keywords

Personal Health Record Physical Unclonable Function Biometric Measurement Helper Data Privacy Amplification 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgments

This work has been funded in part by the European Community’s Sixth Framework Programme under grant number 034238, SPEED project – Signal Processing in the Encrypted Domain. The work reported reflects only the authors views; the European Community is not liable for any use that may be made of the information contained herein.

References

  1. 1.
    M. Bellare, C. Namprempre, Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. in Advances in Cryptology — ASIACRYPT 2000, ed. by T. Okamoto. Lecture Notes in Computer Science, vol. 1976 (Springer-Verlag, Berlin, Heidelberg, New York, NY, 3–7 Dec 2000), pp. 531–545CrossRefGoogle Scholar
  2. 2.
    M. Bellare, P. Rogaway, Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography. in Advances in Cryptology — ASIACRYPT 2000, ed. by T. Okamoto. Lecture Notes in Computer Science, vol. 1976 (Springer-Verlag, Berlin, Heidelberg, New York, NY, 3–7 Dec 2000), pp. 317–330CrossRefGoogle Scholar
  3. 3.
    X. Boyen, Reusable cryptographic fuzzy extractors. in ACM Conference on Computer and Communications Security — ACM CCS 2004, ed. by V. Atluri, B. Pfitzmann, P.D. McDaniel. (ACM, New York, NY, 25–29 Oct 2004), pp. 82–91Google Scholar
  4. 4.
    X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, A. Smith, Secure remote authentication using biometric data. in Advances in Cryptology — Eurocrypt 2005, ed. by R. Cramer. Lecture Notes in Computer Science, vol. 3494 (Springer-Verlag, Berlin, Heidelberg, New York, NY, 2005), pp. 147–163CrossRefGoogle Scholar
  5. 5.
    I. Buhan, J. Breebart, J. Guajardo, E. Kelkboom, K. de Groot, T. Akkermans, A quantitative analysis of indistinguishability for a continuous domain biometric cryptosystem. in Data Privacy Management and Autonomous Spontaneous Security — DPM 2009, ed. by J. Garcia-Alfaro, G. Navarro-Arribas, N. Cuppens-Boulahia, Y. Roudier. Lecture Notes in Computer Science, vol. 5939 (Springer, St. Malo, France, 24–25 Sept 2009), pp. 78–92. Revised Papers.Google Scholar
  6. 6.
    I. Buhan, J. Doumen, P. H. Hartel, R.N.J. Veldhuis, Fuzzy extractors for continuous distributions. in ACM Symposium on Information, Computer and Communications Security — ASIACCS 2007, ed. by F. Bao, S. Miller. (ACM, New York, NY, 20–22 Mar 2007), pp. 353–355Google Scholar
  7. 7.
    J. Lawrence Carter, M.N. Wegman, Universal classes of hash functions. J. Computer Syst. Sci. 18(2), 143–154 (1979)zbMATHCrossRefGoogle Scholar
  8. 8.
    Continua health alliance.Accessed December 2009. Available at http://www. continuaalliance.org
  9. 9.
    Y. Dodis, M. Reyzin, A. Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. in Advances in Cryptology —- EUROCRYPT 2004, ed. by C. Cachin, J. Camenisch. Lecture Notes in Computer Science, vol. 3027 (Springer, Heidelberg, 2004), pp. 523–540CrossRefGoogle Scholar
  10. 10.
    D. Dolev, C. Dwork, M. Naor, in Non-Malleable Cryptography (Extended Abstract). ACM Symposium on Theory of Computing — STOC’91 (ACM, New York, NY, 6–8 May 1991), pp. 542–552Google Scholar
  11. 11.
    B. Gassend, Physical Random Functions, Master’s thesis, Computer Science and Artificial Intelligence Laboratory, MIT, February 2003. Computation Structures Group Memo 458Google Scholar
  12. 12.
    B. Gassend, D.E. Clarke, M. van Dijk, S. Devadas, Silicon physical unknown functions. in ACM Conference on Computer and Communications Security — CCS 2002, ed. by V. Atluri. (ACM, New York, NY, Nov 2002), pp. 148–160Google Scholar
  13. 13.
    S. Goldwasser, S. Micali, Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270–299 (1984)MathSciNetzbMATHCrossRefGoogle Scholar
  14. 14.
    J. Guajardo, S.S. Kumar, G.-J. Schrijen, P. Tuyls, FPGA intrinsic PUFs and their use for IP protection. in Cryptographic Hardware and Embedded Systems — CHES 2007, ed. by P. Paillier, I. Verbauwhede. Lecture Notes in Computer Science, vol. 4727 (Springer, Berlin, Heidelberg, 10–13 Sept 2007), pp. 63–80CrossRefGoogle Scholar
  15. 15.
    J. Guajardo, S. S. Kumar, G.-J. Schrijen, P. Tuyls, in Physical Unclonable Functions and Public Key Crypto for FPGA IP Protection. International Conference on Field Programmable Logic and Applications — FPL 2007 (IEEE Computer Security, 27–30 Aug 2007), pp. 189–195Google Scholar
  16. 16.
    D. Halperin, T.S. Heydt-Benjamin, K. Fu, T. Kohno, W.H. Maisel, Security and privacy for implantable medical devices. IEEE Pervasive Comput. 7(1), 30–39 (2008)CrossRefGoogle Scholar
  17. 17.
    HL7 EHR System Functional Model: A Major Development Towards Consensus on Electronic Health Record System Functionality, 2004. Available at http://www.sanita. forumpa.it/documenti/0/100/140/148/EHR-SWhitePaper.pdf. Accessed Nov 2009
  18. 18.
    A. Juels, M. Wattenberg, A fuzzy commitment scheme. in ACM Conference on Computer and Communications Security — ACM CCS ’99, ed. by J. Motiwalla, G. Tsudik. (ACM, New York, NY, 1–4 Nov 1999), pp. 28–36CrossRefGoogle Scholar
  19. 19.
    J.-P. Kaps, K. Yüksel, B. Sunar, Energy scalable universal hashing. IEEE Trans. Comput. 54(12), 1484–1495 (2005)CrossRefGoogle Scholar
  20. 20.
    H. Krawczyk, LFSR-based hashing and authentication. in Advances in Cryptology – CRYPTO ’94, ed. by Y. Desmedt. Lecture Notes in Computer Science, vol. 839 (Springer, London, 21–25 Aug 1994), pp. 129–139Google Scholar
  21. 21.
    S.S. Kumar, J. Guajardo, R. Maes, G.-J. Schrijen, P. Tuyls, in The Butterfly PUF: Protecting IP on every FPGA. ed. by M. Tehranipoor, J. Plusquellic. IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, Anaheim, CA, USA, 9 June 2008. Proceedings. (IEEE Computer Society, Washington, DC, 2008), pp. 67–70..Google Scholar
  22. 22.
    Lifesensor.Accessed Dec 2009. Available at https://www.lifesensor.com/en/us/
  23. 23.
    J.-P.M.G. Linnartz, P. Tuyls, New shielding functions to enhance privacy and prevent misuse of biometric templates. in Audio-and Video-Based Biometrie Person Authentication — AVBPA 2003, ed. by J. Kittler, M.S. Nixon. Lecture Notes in Computer Science, vol. 2688 (Springer, Heidelberg, 9–11 June 2003), pp. 393–402CrossRefGoogle Scholar
  24. 24.
    Medkey personal health records system. Accessed Dec 2009. Available at http://www. medkey.com/
  25. 25.
    Metavante’s healthmanager. Accessed Dec 2009. Available at http://www.phrforme.com/ index.asp
  26. 26.
    Microsoft, healthvault. Accessed Dec 2009. Available at http://search.healthvault.com/
  27. 27.
    W. Nevelsteen, B. Preneel, Software performance of universal hash functions. in Advances in Cryptology – EUROCRYPT’99, ed. by J. Stern. Lecture Notes in Computer Science, vol. 1592 (Springer, Berlin, 2–6 May 1999), pp. 24–41Google Scholar
  28. 28.
    R. S. Pappu, Physical One-Way Functions. Ph.D. thesis, Massachusetts Institute of Technology, Mar 2001. Available at http://pubs.media.mit.edu/pubs/papers/ 01.03.pappuphd.powf.pdf
  29. 29.
    R. S. Pappu, B. Recht, J. Taylor, N. Gershenfeld, Physical one-way functions. Science 297(6), 2026–2030 (2002) Available at http://web.media.mit.edu/brecht/papers/02.PapEA.powf.pdf CrossRefGoogle Scholar
  30. 30.
    V. Shoup, On fast and provably secure message authentication based on universal hashing. in Advances in Cryptology – CRYPTO ’96, ed. by N. Koblitz. Lecture Notes in Computer Science, vol. 1109 (Springer, Berlin, Heidelberg, 18–22 Aug 1996), pp. 313–328Google Scholar
  31. 31.
    K. Simoens, P. Tuyls, and B. Preneel. in Privacy Weaknesses in Biometric Sketches. IEEE Symposium on Security and Privacy — S&P 2009, (IEEE Computer Society, Washington, DC, 17–20 May 2009), pp. 188–203Google Scholar
  32. 32.
    P. Tuyls, A.H.M. Akkermans, T.A.M. Kevenaar, G.-J. Schrijen, A.M. Bazen, R.N.J. Veldhuis, Practical biometric authentication with template protection. in Audio- and Video-Based Biometric Person Authentication — AVBPA 2005, ed. by T. Kanade, A.K. Jain, N.K. Ratha. Lecture Notes in Computer Science, vol. 3546 (Springer, Heidelberg, 20–22 July 2005), pp. 436–446CrossRefGoogle Scholar
  33. 33.
    P. Tuyls, G.-J. Schrijen, B. Škorić, J. van Geloven, N. Verhaegh, R. Wolters, Read-proof hardware from protective coatings. in Cryptographic Hardware and Embedded Systems — CHES 2006, ed. by L. Goubin, M. Matsui. Lecture Notes in Computer Science, vol. 4249 (Springer, Heidelberg, 10–13 Oct 2006), pp. 369–383CrossRefGoogle Scholar
  34. 34.
    P. Tuyls, B. Škorić, T. Kevenaar, (eds.), Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting (Springer-Verlag New York, Inc., Secaucus, NJ, 2007)zbMATHGoogle Scholar
  35. 35.
    B. Škorić, P. Tuyls, W. Ophey, Robust key extraction from physical uncloneable functions. in Applied Cryptography and Network Security — ACNS 2005, ed. by J. Ioannidis, A.D. Keromytis, M. Yung. Lecture Notes in Computer Science, vol. 3531 (Springer, Heidelberg, 7–10 June 2005), pp. 407–422Google Scholar
  36. 36.
    U.S. Department of Health and Human Services,Remote Monitoring Detailed Use Case, March 2008. Available at http://www.himss.org/content/files/RMON_Use_Case.pdf. Accessed Nov 2009
  37. 37.
    Webmd. Accessed Dec 2009. Available at http://www.webmd.com/

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Jorge Guajardo
    • 1
    Email author
  • Muhammad Asim
    • 1
  • Milan Petković
    • 1
  1. 1.Philips Research EindhovenInformation and System Security GroupEindhovenThe Netherlands

Personalised recommendations