Skip to main content

A Privacy Preserved Model for Medical Data Sharing in Telemedicine

  • Conference paper
Advances in Communication and Networking (FGCN 2008)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 27))

  • 297 Accesses

Abstract

In the converged Information and Communication Technology (ICT) era, medical data sharing has emerged as an important element in the healthcare industry. Hospitals within a Telemedicine system would like to share their private local databases with other hospitals. However, they do not agree to keep a copy of their database into a central server. The central repository (data warehouse) model is not secure because too much control will be granted to the central site. In order to fully utilize the distributed and heterogeneous resources, a secure and privacy preserved model should be used to reach the balance between knowledge discovery and data privacy protection at the same time. We proposed a privacy preserved model to securely share the data for Telemedicine system.

This work was supported by the Soongsil University Research Fund.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Evfimievski, A., Srikant, R.: Information Sharing across Private Databases. In: 22nd ACM SIGMOD International Conference on Management of Data, pp. 86–97. ACM Press, New York (2003)

    Google Scholar 

  2. Agrawal, R., Terzi, E.: On honesty in sovereign information sharing. In: Ioannidis, Y., Scholl, M.H., Schmidt, J.W., Matthes, F., Hatzopoulos, M., Böhm, K., Kemper, A., Grust, T., Böhm, C. (eds.) EDBT 2006. LNCS, vol. 3896, pp. 240–256. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Ajmani, S., Morris, R., Liskov, B.: A trusted third-party computation service. Technical Report, MIT-LCS-TR-847, MIT (2001)

    Google Scholar 

  4. Brickel, J., Shmatikov, V.: Privacy-preserving graph algorithms in the semi-honest model. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 236–252. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Clifton, C., Kantarcioglu, M., Doan, A., Schadow, G., Vaidya, J., Elmagarmid, A.K., Suciu, D.: Privacy preserving data integration and sharing. In: 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge, Paris, pp. 19–26 (2004)

    Google Scholar 

  6. Dayal, U., Hwang, H.Y.: View definition and generalization for database integration in a multidatabase system. IEEE Transaction 10(6), 628–645 (1984)

    Google Scholar 

  7. Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: PODS 2003: Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pp. 211–222. ACM Press, New York (2003)

    Chapter  Google Scholar 

  8. Freedman, M., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004)

    Google Scholar 

  9. Goldreich, O.: The foundations of cryptography, vol. 2. Cambridge University Press, Cambridge (2004)

    Google Scholar 

  10. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: 19th ACM Conference on Theory of computing, pp. 218–229. ACM Press, New York (1987)

    Google Scholar 

  11. Huberman, B., Franklin, M., Hogg, T.: Enhancing privacy and trust in electronic communities. In: Proceedings of the 1st ACM conference on Electronic commerce, pp. 78–86. ACM Press, New York (1999)

    Chapter  Google Scholar 

  12. Jefferies, N., Mitchell, C., Walker, M.: A proposed architecture for trusted third party services. In: Dawson, E.P., Golić, J.D. (eds.) Cryptography: Policy and Algorithms 1995. LNCS, vol. 1029, pp. 98–104. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  13. Keefe, O., Yung, M., Gu, L., Baxter, R.: Privacy-preserving data linkage protocols. In: Proceedings of the 2004 ACM workshop on Privacy in the electronic society, pp. 94–102. ACM Press, New York (2004)

    Chapter  Google Scholar 

  14. Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241–257. Springer, Heidelberg (2005)

    Google Scholar 

  15. Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: 31st ACM Symposium on Theory of Computing, Atlanta, pp. 245–254 (1999)

    Google Scholar 

  16. Stefan, B., Sebastian, O.: Secure set union and bag union computation for guaranteeing anonymity of distrustful participants. Journal of Software 3(1), 9–17 (2008)

    Google Scholar 

  17. Wiederhold, G.: Intelligent integration of information. In: ACM SIGMOD Conference on Management of Data, Washington, pp. 434–437 (1993)

    Google Scholar 

  18. Yao, A.C.: How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of computer science, pp. 162–167. IEEE Press, Los Alamitos (1986)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kok Seng, W., Kim, M.H., Besar, R., Salleh, F. (2009). A Privacy Preserved Model for Medical Data Sharing in Telemedicine. In: Kim, Th., Yang, L.T., Park, J.H., Chang, A.CC., Vasilakos, T., Yeo, SS. (eds) Advances in Communication and Networking. FGCN 2008. Communications in Computer and Information Science, vol 27. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10236-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10236-3_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10235-6

  • Online ISBN: 978-3-642-10236-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics