Abstract
In the converged Information and Communication Technology (ICT) era, medical data sharing has emerged as an important element in the healthcare industry. Hospitals within a Telemedicine system would like to share their private local databases with other hospitals. However, they do not agree to keep a copy of their database into a central server. The central repository (data warehouse) model is not secure because too much control will be granted to the central site. In order to fully utilize the distributed and heterogeneous resources, a secure and privacy preserved model should be used to reach the balance between knowledge discovery and data privacy protection at the same time. We proposed a privacy preserved model to securely share the data for Telemedicine system.
This work was supported by the Soongsil University Research Fund.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agrawal, R., Evfimievski, A., Srikant, R.: Information Sharing across Private Databases. In: 22nd ACM SIGMOD International Conference on Management of Data, pp. 86–97. ACM Press, New York (2003)
Agrawal, R., Terzi, E.: On honesty in sovereign information sharing. In: Ioannidis, Y., Scholl, M.H., Schmidt, J.W., Matthes, F., Hatzopoulos, M., Böhm, K., Kemper, A., Grust, T., Böhm, C. (eds.) EDBT 2006. LNCS, vol. 3896, pp. 240–256. Springer, Heidelberg (2006)
Ajmani, S., Morris, R., Liskov, B.: A trusted third-party computation service. Technical Report, MIT-LCS-TR-847, MIT (2001)
Brickel, J., Shmatikov, V.: Privacy-preserving graph algorithms in the semi-honest model. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 236–252. Springer, Heidelberg (2005)
Clifton, C., Kantarcioglu, M., Doan, A., Schadow, G., Vaidya, J., Elmagarmid, A.K., Suciu, D.: Privacy preserving data integration and sharing. In: 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge, Paris, pp. 19–26 (2004)
Dayal, U., Hwang, H.Y.: View definition and generalization for database integration in a multidatabase system. IEEE Transaction 10(6), 628–645 (1984)
Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: PODS 2003: Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pp. 211–222. ACM Press, New York (2003)
Freedman, M., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004)
Goldreich, O.: The foundations of cryptography, vol. 2. Cambridge University Press, Cambridge (2004)
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: 19th ACM Conference on Theory of computing, pp. 218–229. ACM Press, New York (1987)
Huberman, B., Franklin, M., Hogg, T.: Enhancing privacy and trust in electronic communities. In: Proceedings of the 1st ACM conference on Electronic commerce, pp. 78–86. ACM Press, New York (1999)
Jefferies, N., Mitchell, C., Walker, M.: A proposed architecture for trusted third party services. In: Dawson, E.P., Golić, J.D. (eds.) Cryptography: Policy and Algorithms 1995. LNCS, vol. 1029, pp. 98–104. Springer, Heidelberg (1996)
Keefe, O., Yung, M., Gu, L., Baxter, R.: Privacy-preserving data linkage protocols. In: Proceedings of the 2004 ACM workshop on Privacy in the electronic society, pp. 94–102. ACM Press, New York (2004)
Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241–257. Springer, Heidelberg (2005)
Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: 31st ACM Symposium on Theory of Computing, Atlanta, pp. 245–254 (1999)
Stefan, B., Sebastian, O.: Secure set union and bag union computation for guaranteeing anonymity of distrustful participants. Journal of Software 3(1), 9–17 (2008)
Wiederhold, G.: Intelligent integration of information. In: ACM SIGMOD Conference on Management of Data, Washington, pp. 434–437 (1993)
Yao, A.C.: How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of computer science, pp. 162–167. IEEE Press, Los Alamitos (1986)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kok Seng, W., Kim, M.H., Besar, R., Salleh, F. (2009). A Privacy Preserved Model for Medical Data Sharing in Telemedicine. In: Kim, Th., Yang, L.T., Park, J.H., Chang, A.CC., Vasilakos, T., Yeo, SS. (eds) Advances in Communication and Networking. FGCN 2008. Communications in Computer and Information Science, vol 27. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10236-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-10236-3_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10235-6
Online ISBN: 978-3-642-10236-3
eBook Packages: Computer ScienceComputer Science (R0)