Towards Privacy by Design in Personal e-Health Systems

CARRE project
CARRE projectCARRE project
This work was supported by the FP7-ICT project CARRE (No. 611140),
co-funded by the European Commission.
Towards Privacy by Design in Personal
e-Health Systems
George Drosatos1,
Pavlos S. Efraimidis2, Garrath Williams3 and Eleni Kaldoudi1
1School of Medicine, Democritus University of Thrace, Greece
2Dept. of Electric and Computer Engineering, Democritus University of Thrace, Greece
3University of Lancaster, UK
HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 2
First step towards privacy by design
‒ Analyze the personal e-Health systems
 Modeling their functionalities
‒ Identify the arising privacy issues
 Based on modeled system’s functionality
‒ Present some possible privacy-enhancing techniques
 e.g. encryption, anonymization, pseudonyms …
Next steps:
 Develop a methodology for engineering privacy
 Organize practical guidelines
G. Drosatos, Privacy by Design in Personal e-Health:
HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 3
CARRE Project
https://www.carre-project.eu
‒ It is a EU co-funded project in the area of cardiorenal with focus to
provide personalized health
‒ Personal data: Sensor data (e.g. activity and blood pressure), PHR and
patient’s intentions (travel, diet, diseases, etc)
G. Drosatos, Privacy by Design in Personal e-Health:
HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 4
Privacy principles and concerns
Privacy principles:
 Data minimization
 Data protection by design
 Data protection by default
Privacy concerns:
 User identification
 Personal data leakage
1. Directive 95/46/EC. In Official Journal L 281, 0031-0050 (1995)
2. Green Paper on Mobile Health (“mHealth”) (SWD(2014) 135 Final)
 Individual consent
 Individual control
Privacy  The right to
informational self-determination
G. Drosatos, Privacy by Design in Personal e-Health:
Data requirements for a personal e-Health system
personal
e-health system
intentions,
plans, etc.
cognitive
personal
health records
quantified
self
medical
electronic
health
records
health
insurance
financial
personal data in
personal systems
environmental
sensors
environmental
geolocation
data
personal data in
institutional systems
educational resources
for patients
medical evidence
public data on the web
HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 6
Basic personal e-Health systems functionalities
personal
data storage
personal data
processing
basic e-health system
user
interface
personal data
from
personal systems
institutional
systems
public data
from
public online
databases
private
announcements
to third parties
private
responses to
anonymous
individual
‘bulletin’ board
personal data
to
external services and data bases
(e.g. registries or statistical pooling)
G. Drosatos, Privacy by Design in Personal e-Health:
1
2
3
4
5
HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 7
(1) Personal data storage and processing
Privacy issues arise when these operations happens on
remote service
‒ Countermeasures of data storage:
 Cryptographic techniques
‒ Countermeasures of processing:
 There is not general solution
 Processing in encrypted data
require a lot of assumptions
 Pre-processing before encryption
 Computational cost
 Not possible to be applied to all cases
personal
data storage
personal
data
processing
basic e-Health system
user
interfaceG. Drosatos, Privacy by Design in Personal e-Health:
HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 8
(2) Personal data exchange with 3rd party systems
‒ Privacy issues:
 Linkability among the different user’s
accounts
 Linkability with the physical person (in case of
interaction with institutional systems)
 Increase privacy concerns when combine
partial personal data together
‒ Countermeasures:
 There is not direct measures to this problem
 An obvious solution involves building
dedicated middleware in the user-side that
will act as a proxy for all personal systems
personal
data storage
personal
data
processing
basic e-Health system
user
interface
personal data
from
personal systems
institutional systems
G. Drosatos, Privacy by Design in Personal e-Health:
HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 9
(3) Integration of personalized public data
‒ Privacy issues:
 Linking particular public data to specific user
 Revealing the user’s needs to public service
‒ Countermeasures:
 Altering (expanding or generalizing) the
initial request
 Cooperation of a group of users in the
system to conceal one another’s requests
 Using anonymous network technologies
(such as TOR)
personal
data storage
personal
data
processing
basic e-Health system
user
interface
public data
from
public online
databases
G. Drosatos, Privacy by Design in Personal e-Health:
HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 10
(4) Exporting personal data for public use
‒ Privacy issues:
 Medical registries: User identification of ‘critical
mass’ of pooled anonymized personal data
 Statistical data pooling: User identification if
number of participants is small
‒ Countermeasures:
 Medical registries: Minimizing and stripping all
the identifiable parts
 Statistical data pooling:
 Privacy preserving cryptographic techniques
 The appropriate technique depends on the location of
storage and the form of statistical processing
personal
data storage
personal
data
processing
basic e-Health system
user
interface
personal data
to
external services and data bases
(e.g. registries or statistical pooling)
G. Drosatos, Privacy by Design in Personal e-Health:
HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 11
(5) Exchange of private personal data messages
‒ Privacy issues:
 Conceal the user’s identity from the system and
(selectively) from the receiver of the message
 Conceal the actual message from the system
‒ Countermeasures:
 Anonymous credential techniques
 Cryptographic techniques
 Unlinkably exchanging messages personal
data storage
personal
data
processing
basic e-Health system
user
interface
‘bulletin’ board
private
announcements to
third parties
private responses to
anonymous
individual
G. Drosatos, Privacy by Design in Personal e-Health:
HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 12
Conclusions & Next steps
‒ Analyze the personal e-Health systems, identify the arising privacy
issues and present some possible privacy-enhancing techniques
‒ Based on the arising privacy issues and propose possible
countermeasures
 Develop a methodology for engineering privacy and present
practical guidelines
 Apply the developed methodology to CARRE
G. Drosatos, Privacy by Design in Personal e-Health:
HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 13
This work was supported by the FP7-ICT project CARRE (No. 611140),
co-funded by the European Commission.
CARRE Project: Personalized patient empowerment and shared
decision support for cardiorenal disease and comorbidities.
Acknowledgement
G. Drosatos, Privacy by Design in Personal e-Health:
1 of 13

Recommended

An Ontology based Scheme for Formal Care Plan Meta-Description by
An Ontology based Scheme for Formal Care Plan Meta-DescriptionAn Ontology based Scheme for Formal Care Plan Meta-Description
An Ontology based Scheme for Formal Care Plan Meta-DescriptionCARRE project
550 views11 slides
Investigating plant systems using data integration and network analysis by
Investigating plant systems using data integration and network analysisInvestigating plant systems using data integration and network analysis
Investigating plant systems using data integration and network analysisCatherine Canevet
3K views96 slides
Data Integration at the International Consortium of Proteome Biology in Cardi... by
Data Integration at the International Consortium of Proteome Biology in Cardi...Data Integration at the International Consortium of Proteome Biology in Cardi...
Data Integration at the International Consortium of Proteome Biology in Cardi...Rafael C. Jimenez
44 views24 slides
Pharmaco chemistry by
Pharmaco chemistryPharmaco chemistry
Pharmaco chemistryuniversity of education,Lahore
1.3K views21 slides
NY Prostate Cancer Conference - P.A. Fearn - Session 1: Data management for p... by
NY Prostate Cancer Conference - P.A. Fearn - Session 1: Data management for p...NY Prostate Cancer Conference - P.A. Fearn - Session 1: Data management for p...
NY Prostate Cancer Conference - P.A. Fearn - Session 1: Data management for p...European School of Oncology
609 views17 slides

More Related Content

What's hot

EMIF_tranSMART meeting Paris_7 November 2013 by
EMIF_tranSMART meeting Paris_7 November 2013EMIF_tranSMART meeting Paris_7 November 2013
EMIF_tranSMART meeting Paris_7 November 2013IMI-EMIF
477 views20 slides
BioInformatics Software by
BioInformatics SoftwareBioInformatics Software
BioInformatics Softwareuniversity of education,Lahore
1.2K views9 slides
Applied Bioinformatics & Chemoinformatics: Techniques, Tools, and Opportunities by
Applied Bioinformatics & Chemoinformatics: Techniques, Tools, and OpportunitiesApplied Bioinformatics & Chemoinformatics: Techniques, Tools, and Opportunities
Applied Bioinformatics & Chemoinformatics: Techniques, Tools, and OpportunitiesHezekiah Fatoki
1.2K views25 slides
When is a model FAIR – and why should we care? by
When is a model FAIR – and why should we care?When is a model FAIR – and why should we care?
When is a model FAIR – and why should we care?University Medicine Greifswald
145 views22 slides
Standards and tools for model management in biomedical research by
Standards and tools for model management in biomedical researchStandards and tools for model management in biomedical research
Standards and tools for model management in biomedical researchUniversity Medicine Greifswald
405 views22 slides
Model management tools for improved reproducibility in systems biology by
Model management tools for improved reproducibility in systems biologyModel management tools for improved reproducibility in systems biology
Model management tools for improved reproducibility in systems biologyUniversity Medicine Greifswald
731 views13 slides

What's hot(20)

EMIF_tranSMART meeting Paris_7 November 2013 by IMI-EMIF
EMIF_tranSMART meeting Paris_7 November 2013EMIF_tranSMART meeting Paris_7 November 2013
EMIF_tranSMART meeting Paris_7 November 2013
IMI-EMIF477 views
Applied Bioinformatics & Chemoinformatics: Techniques, Tools, and Opportunities by Hezekiah Fatoki
Applied Bioinformatics & Chemoinformatics: Techniques, Tools, and OpportunitiesApplied Bioinformatics & Chemoinformatics: Techniques, Tools, and Opportunities
Applied Bioinformatics & Chemoinformatics: Techniques, Tools, and Opportunities
Hezekiah Fatoki1.2K views
An Introduction to Chemoinformatics for the postgraduate students of Agriculture by Devakumar Jain
An Introduction to Chemoinformatics for the postgraduate students of AgricultureAn Introduction to Chemoinformatics for the postgraduate students of Agriculture
An Introduction to Chemoinformatics for the postgraduate students of Agriculture
Devakumar Jain5.1K views
2nd AMA-IEEE Describing Electronic Medical Record by Semantic Web Technology by YiJu Tseng
2nd AMA-IEEE Describing Electronic Medical Record by Semantic Web Technology2nd AMA-IEEE Describing Electronic Medical Record by Semantic Web Technology
2nd AMA-IEEE Describing Electronic Medical Record by Semantic Web Technology
YiJu Tseng432 views
Diagnostic criteria and clinical guidelines standardization to automate case ... by Melanie Courtot
Diagnostic criteria and clinical guidelines standardization to automate case ...Diagnostic criteria and clinical guidelines standardization to automate case ...
Diagnostic criteria and clinical guidelines standardization to automate case ...
Melanie Courtot1K views
Metid Match 2014 - SEEK for Science by ale93756
Metid Match 2014 - SEEK for ScienceMetid Match 2014 - SEEK for Science
Metid Match 2014 - SEEK for Science
ale93756463 views
bio data by 007dcp
bio databio data
bio data
007dcp94 views
FAIR sequencing data repository based on iRODS by Felipe Gutierrez
FAIR sequencing data repository based on iRODSFAIR sequencing data repository based on iRODS
FAIR sequencing data repository based on iRODS
Felipe Gutierrez89 views
Greene Bosc2008 by bosc_2008
Greene Bosc2008Greene Bosc2008
Greene Bosc2008
bosc_2008518 views
eTRIKS Data Harmonization Service Platform by ibemam
eTRIKS Data Harmonization Service PlatformeTRIKS Data Harmonization Service Platform
eTRIKS Data Harmonization Service Platform
ibemam828 views
Why ICT Fails in Healthcare: Software Maintenance and Maintainability by Koray Atalag
Why ICT Fails in Healthcare: Software Maintenance and MaintainabilityWhy ICT Fails in Healthcare: Software Maintenance and Maintainability
Why ICT Fails in Healthcare: Software Maintenance and Maintainability
Koray Atalag2.1K views

Similar to Towards Privacy by Design in Personal e-Health Systems

Extracting Intention from Web Queries– Application in eHealth Personalization by
Extracting Intention from Web Queries– Application in eHealth PersonalizationExtracting Intention from Web Queries– Application in eHealth Personalization
Extracting Intention from Web Queries– Application in eHealth PersonalizationCARRE project
404 views14 slides
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science by
Christopher Millard   Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard   Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard
540 views10 slides
An itinerary for FAIR and privacy respecting data-driven innovation and research by
An itinerary for FAIR and privacy respecting data-driven innovation and researchAn itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchMarlon Domingus
456 views37 slides
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig... by
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Kumar Goud
588 views5 slides
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin... by
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
32 views16 slides
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11 by
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11DaliaCulbertson719
2 views84 slides

Similar to Towards Privacy by Design in Personal e-Health Systems(20)

Extracting Intention from Web Queries– Application in eHealth Personalization by CARRE project
Extracting Intention from Web Queries– Application in eHealth PersonalizationExtracting Intention from Web Queries– Application in eHealth Personalization
Extracting Intention from Web Queries– Application in eHealth Personalization
CARRE project404 views
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science by Christopher Millard
Christopher Millard   Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard   Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
An itinerary for FAIR and privacy respecting data-driven innovation and research by Marlon Domingus
An itinerary for FAIR and privacy respecting data-driven innovation and researchAn itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and research
Marlon Domingus456 views
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig... by Kumar Goud
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Kumar Goud588 views
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin... by Konstantinos Demertzis
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11 by DaliaCulbertson719
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Privacy and Data Protection in Research by Marlon Domingus
Privacy and Data Protection in ResearchPrivacy and Data Protection in Research
Privacy and Data Protection in Research
Marlon Domingus322 views
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden... by PacificResearchPlatform
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIK_4. pengelolaan informasi_20161__rev by jackpopo
TIK_4. pengelolaan informasi_20161__revTIK_4. pengelolaan informasi_20161__rev
TIK_4. pengelolaan informasi_20161__rev
jackpopo476 views
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT by ijcisjournal
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
ijcisjournal3 views
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT by ijcisjournal
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
ijcisjournal23 views
Privacy protecting fitness trackers by iwhhu
Privacy protecting fitness trackersPrivacy protecting fitness trackers
Privacy protecting fitness trackers
iwhhu114 views
Data Transformation Technique for Protecting Private Information in Privacy P... by acijjournal
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
acijjournal62 views
CuttingEEG - Open Science, Open Data and BIDS for EEG by Radboud University
CuttingEEG - Open Science, Open Data and BIDS for EEGCuttingEEG - Open Science, Open Data and BIDS for EEG
CuttingEEG - Open Science, Open Data and BIDS for EEG
Radboud University1.1K views
BigInsight seminar on Practical Privacy-Preserving Distributed Statistical Co... by Statistisk sentralbyrå
BigInsight seminar on Practical Privacy-Preserving Distributed Statistical Co...BigInsight seminar on Practical Privacy-Preserving Distributed Statistical Co...
BigInsight seminar on Practical Privacy-Preserving Distributed Statistical Co...
Data safe havens: A future EOSC service? by EUDAT
Data safe havens: A future EOSC service?Data safe havens: A future EOSC service?
Data safe havens: A future EOSC service?
EUDAT89 views

More from CARRE project

CARRE Risk Factor Reference Repository by
CARRE Risk Factor Reference RepositoryCARRE Risk Factor Reference Repository
CARRE Risk Factor Reference RepositoryCARRE project
494 views29 slides
CARRE EU-FP7-ICT-61440 project presentation, Oct 2016 by
CARRE EU-FP7-ICT-61440 project presentation, Oct 2016CARRE EU-FP7-ICT-61440 project presentation, Oct 2016
CARRE EU-FP7-ICT-61440 project presentation, Oct 2016CARRE project
394 views43 slides
Photoplethysmography-Based System for Atrial Fibrillation Detection During He... by
Photoplethysmography-Based System for Atrial Fibrillation Detection During He...Photoplethysmography-Based System for Atrial Fibrillation Detection During He...
Photoplethysmography-Based System for Atrial Fibrillation Detection During He...CARRE project
1.3K views21 slides
Gender Balance in EU and a Case Report of an EU Funded Project by
Gender Balance in EU and a Case Report of an EU Funded ProjectGender Balance in EU and a Case Report of an EU Funded Project
Gender Balance in EU and a Case Report of an EU Funded ProjectCARRE project
310 views22 slides
CARRE: Personalized patient empowerment and shared decision support for car... by
CARRE: Personalized patient empowerment and shared decision support for car...CARRE: Personalized patient empowerment and shared decision support for car...
CARRE: Personalized patient empowerment and shared decision support for car...CARRE project
523 views56 slides
Governmental and private eHealth and telemedicine initiatives in Lithuania by
Governmental and private eHealth and telemedicine initiatives in LithuaniaGovernmental and private eHealth and telemedicine initiatives in Lithuania
Governmental and private eHealth and telemedicine initiatives in LithuaniaCARRE project
731 views25 slides

More from CARRE project(13)

CARRE Risk Factor Reference Repository by CARRE project
CARRE Risk Factor Reference RepositoryCARRE Risk Factor Reference Repository
CARRE Risk Factor Reference Repository
CARRE project494 views
CARRE EU-FP7-ICT-61440 project presentation, Oct 2016 by CARRE project
CARRE EU-FP7-ICT-61440 project presentation, Oct 2016CARRE EU-FP7-ICT-61440 project presentation, Oct 2016
CARRE EU-FP7-ICT-61440 project presentation, Oct 2016
CARRE project394 views
Photoplethysmography-Based System for Atrial Fibrillation Detection During He... by CARRE project
Photoplethysmography-Based System for Atrial Fibrillation Detection During He...Photoplethysmography-Based System for Atrial Fibrillation Detection During He...
Photoplethysmography-Based System for Atrial Fibrillation Detection During He...
CARRE project1.3K views
Gender Balance in EU and a Case Report of an EU Funded Project by CARRE project
Gender Balance in EU and a Case Report of an EU Funded ProjectGender Balance in EU and a Case Report of an EU Funded Project
Gender Balance in EU and a Case Report of an EU Funded Project
CARRE project310 views
CARRE: Personalized patient empowerment and shared decision support for car... by CARRE project
CARRE: Personalized patient empowerment and shared decision support for car...CARRE: Personalized patient empowerment and shared decision support for car...
CARRE: Personalized patient empowerment and shared decision support for car...
CARRE project523 views
Governmental and private eHealth and telemedicine initiatives in Lithuania by CARRE project
Governmental and private eHealth and telemedicine initiatives in LithuaniaGovernmental and private eHealth and telemedicine initiatives in Lithuania
Governmental and private eHealth and telemedicine initiatives in Lithuania
CARRE project731 views
Vilnius University Hospital Santariškių Klinikos by CARRE project
Vilnius University Hospital Santariškių KlinikosVilnius University Hospital Santariškių Klinikos
Vilnius University Hospital Santariškių Klinikos
CARRE project1.2K views
Estimation of Pulse Arrival Time Using Impedance Plethysmogram from Body Comp... by CARRE project
Estimation of Pulse Arrival Time Using Impedance Plethysmogram from Body Comp...Estimation of Pulse Arrival Time Using Impedance Plethysmogram from Body Comp...
Estimation of Pulse Arrival Time Using Impedance Plethysmogram from Body Comp...
CARRE project966 views
Aggregating Educational Data for Patient Empowerment by CARRE project
Aggregating Educational Data for Patient EmpowermentAggregating Educational Data for Patient Empowerment
Aggregating Educational Data for Patient Empowerment
CARRE project531 views
Empowering Patients through Information Technologies - WC2015 Keynote by CARRE project
Empowering Patients through Information Technologies - WC2015 KeynoteEmpowering Patients through Information Technologies - WC2015 Keynote
Empowering Patients through Information Technologies - WC2015 Keynote
CARRE project1K views
Patient Empowerment as a Cognitive Process by CARRE project
 Patient Empowerment as a Cognitive Process Patient Empowerment as a Cognitive Process
Patient Empowerment as a Cognitive Process
CARRE project1.1K views
ICT in Medical Education: Educating and Empowering the Patient by CARRE project
ICT in Medical Education: Educating and Empowering the PatientICT in Medical Education: Educating and Empowering the Patient
ICT in Medical Education: Educating and Empowering the Patient
CARRE project472 views
CARRE presentation Nov 2013 by CARRE project
CARRE presentation Nov 2013CARRE presentation Nov 2013
CARRE presentation Nov 2013
CARRE project1.1K views

Recently uploaded

Bacterial Reproduction.pdf by
Bacterial Reproduction.pdfBacterial Reproduction.pdf
Bacterial Reproduction.pdfNandadulalSannigrahi
21 views32 slides
ALGAL PRODUCTS.pptx by
ALGAL PRODUCTS.pptxALGAL PRODUCTS.pptx
ALGAL PRODUCTS.pptxRASHMI M G
5 views17 slides
A Ready-to-Analyze High-Plex Spatial Signature Development Workflow for Cance... by
A Ready-to-Analyze High-Plex Spatial Signature Development Workflow for Cance...A Ready-to-Analyze High-Plex Spatial Signature Development Workflow for Cance...
A Ready-to-Analyze High-Plex Spatial Signature Development Workflow for Cance...InsideScientific
78 views62 slides
Open Access Publishing in Astrophysics by
Open Access Publishing in AstrophysicsOpen Access Publishing in Astrophysics
Open Access Publishing in AstrophysicsPeter Coles
1.2K views26 slides
Nitrosamine & NDSRI.pptx by
Nitrosamine & NDSRI.pptxNitrosamine & NDSRI.pptx
Nitrosamine & NDSRI.pptxNileshBonde4
18 views22 slides

Recently uploaded(20)

A Ready-to-Analyze High-Plex Spatial Signature Development Workflow for Cance... by InsideScientific
A Ready-to-Analyze High-Plex Spatial Signature Development Workflow for Cance...A Ready-to-Analyze High-Plex Spatial Signature Development Workflow for Cance...
A Ready-to-Analyze High-Plex Spatial Signature Development Workflow for Cance...
InsideScientific78 views
Open Access Publishing in Astrophysics by Peter Coles
Open Access Publishing in AstrophysicsOpen Access Publishing in Astrophysics
Open Access Publishing in Astrophysics
Peter Coles1.2K views
Nitrosamine & NDSRI.pptx by NileshBonde4
Nitrosamine & NDSRI.pptxNitrosamine & NDSRI.pptx
Nitrosamine & NDSRI.pptx
NileshBonde418 views
별헤는 사람들 2023년 12월호 전명원 교수 자료 by sciencepeople
별헤는 사람들 2023년 12월호 전명원 교수 자료별헤는 사람들 2023년 12월호 전명원 교수 자료
별헤는 사람들 2023년 12월호 전명원 교수 자료
sciencepeople58 views
Small ruminant keepers’ knowledge, attitudes and practices towards peste des ... by ILRI
Small ruminant keepers’ knowledge, attitudes and practices towards peste des ...Small ruminant keepers’ knowledge, attitudes and practices towards peste des ...
Small ruminant keepers’ knowledge, attitudes and practices towards peste des ...
ILRI5 views
Note on the Riemann Hypothesis by vegafrank2
Note on the Riemann HypothesisNote on the Riemann Hypothesis
Note on the Riemann Hypothesis
vegafrank27 views
2. Natural Sciences and Technology Author Siyavula.pdf by ssuser821efa
2. Natural Sciences and Technology Author Siyavula.pdf2. Natural Sciences and Technology Author Siyavula.pdf
2. Natural Sciences and Technology Author Siyavula.pdf
ssuser821efa10 views
Discovery of therapeutic agents targeting PKLR for NAFLD using drug repositio... by Trustlife
Discovery of therapeutic agents targeting PKLR for NAFLD using drug repositio...Discovery of therapeutic agents targeting PKLR for NAFLD using drug repositio...
Discovery of therapeutic agents targeting PKLR for NAFLD using drug repositio...
Trustlife127 views
How to be(come) a successful PhD student by Tom Mens
How to be(come) a successful PhD studentHow to be(come) a successful PhD student
How to be(come) a successful PhD student
Tom Mens524 views
Small ruminant keepers’ knowledge, attitudes and practices towards peste des ... by ILRI
Small ruminant keepers’ knowledge, attitudes and practices towards peste des ...Small ruminant keepers’ knowledge, attitudes and practices towards peste des ...
Small ruminant keepers’ knowledge, attitudes and practices towards peste des ...
ILRI7 views

Towards Privacy by Design in Personal e-Health Systems

  • 1. This work was supported by the FP7-ICT project CARRE (No. 611140), co-funded by the European Commission. Towards Privacy by Design in Personal e-Health Systems George Drosatos1, Pavlos S. Efraimidis2, Garrath Williams3 and Eleni Kaldoudi1 1School of Medicine, Democritus University of Thrace, Greece 2Dept. of Electric and Computer Engineering, Democritus University of Thrace, Greece 3University of Lancaster, UK
  • 2. HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 2 First step towards privacy by design ‒ Analyze the personal e-Health systems  Modeling their functionalities ‒ Identify the arising privacy issues  Based on modeled system’s functionality ‒ Present some possible privacy-enhancing techniques  e.g. encryption, anonymization, pseudonyms … Next steps:  Develop a methodology for engineering privacy  Organize practical guidelines G. Drosatos, Privacy by Design in Personal e-Health:
  • 3. HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 3 CARRE Project https://www.carre-project.eu ‒ It is a EU co-funded project in the area of cardiorenal with focus to provide personalized health ‒ Personal data: Sensor data (e.g. activity and blood pressure), PHR and patient’s intentions (travel, diet, diseases, etc) G. Drosatos, Privacy by Design in Personal e-Health:
  • 4. HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 4 Privacy principles and concerns Privacy principles:  Data minimization  Data protection by design  Data protection by default Privacy concerns:  User identification  Personal data leakage 1. Directive 95/46/EC. In Official Journal L 281, 0031-0050 (1995) 2. Green Paper on Mobile Health (“mHealth”) (SWD(2014) 135 Final)  Individual consent  Individual control Privacy  The right to informational self-determination G. Drosatos, Privacy by Design in Personal e-Health:
  • 5. Data requirements for a personal e-Health system personal e-health system intentions, plans, etc. cognitive personal health records quantified self medical electronic health records health insurance financial personal data in personal systems environmental sensors environmental geolocation data personal data in institutional systems educational resources for patients medical evidence public data on the web
  • 6. HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 6 Basic personal e-Health systems functionalities personal data storage personal data processing basic e-health system user interface personal data from personal systems institutional systems public data from public online databases private announcements to third parties private responses to anonymous individual ‘bulletin’ board personal data to external services and data bases (e.g. registries or statistical pooling) G. Drosatos, Privacy by Design in Personal e-Health: 1 2 3 4 5
  • 7. HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 7 (1) Personal data storage and processing Privacy issues arise when these operations happens on remote service ‒ Countermeasures of data storage:  Cryptographic techniques ‒ Countermeasures of processing:  There is not general solution  Processing in encrypted data require a lot of assumptions  Pre-processing before encryption  Computational cost  Not possible to be applied to all cases personal data storage personal data processing basic e-Health system user interfaceG. Drosatos, Privacy by Design in Personal e-Health:
  • 8. HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 8 (2) Personal data exchange with 3rd party systems ‒ Privacy issues:  Linkability among the different user’s accounts  Linkability with the physical person (in case of interaction with institutional systems)  Increase privacy concerns when combine partial personal data together ‒ Countermeasures:  There is not direct measures to this problem  An obvious solution involves building dedicated middleware in the user-side that will act as a proxy for all personal systems personal data storage personal data processing basic e-Health system user interface personal data from personal systems institutional systems G. Drosatos, Privacy by Design in Personal e-Health:
  • 9. HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 9 (3) Integration of personalized public data ‒ Privacy issues:  Linking particular public data to specific user  Revealing the user’s needs to public service ‒ Countermeasures:  Altering (expanding or generalizing) the initial request  Cooperation of a group of users in the system to conceal one another’s requests  Using anonymous network technologies (such as TOR) personal data storage personal data processing basic e-Health system user interface public data from public online databases G. Drosatos, Privacy by Design in Personal e-Health:
  • 10. HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 10 (4) Exporting personal data for public use ‒ Privacy issues:  Medical registries: User identification of ‘critical mass’ of pooled anonymized personal data  Statistical data pooling: User identification if number of participants is small ‒ Countermeasures:  Medical registries: Minimizing and stripping all the identifiable parts  Statistical data pooling:  Privacy preserving cryptographic techniques  The appropriate technique depends on the location of storage and the form of statistical processing personal data storage personal data processing basic e-Health system user interface personal data to external services and data bases (e.g. registries or statistical pooling) G. Drosatos, Privacy by Design in Personal e-Health:
  • 11. HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 11 (5) Exchange of private personal data messages ‒ Privacy issues:  Conceal the user’s identity from the system and (selectively) from the receiver of the message  Conceal the actual message from the system ‒ Countermeasures:  Anonymous credential techniques  Cryptographic techniques  Unlinkably exchanging messages personal data storage personal data processing basic e-Health system user interface ‘bulletin’ board private announcements to third parties private responses to anonymous individual G. Drosatos, Privacy by Design in Personal e-Health:
  • 12. HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 12 Conclusions & Next steps ‒ Analyze the personal e-Health systems, identify the arising privacy issues and present some possible privacy-enhancing techniques ‒ Based on the arising privacy issues and propose possible countermeasures  Develop a methodology for engineering privacy and present practical guidelines  Apply the developed methodology to CARRE G. Drosatos, Privacy by Design in Personal e-Health:
  • 13. HEALTHINF 2016, part of BIOSTEC, 21-23 Feb 2016 13 This work was supported by the FP7-ICT project CARRE (No. 611140), co-funded by the European Commission. CARRE Project: Personalized patient empowerment and shared decision support for cardiorenal disease and comorbidities. Acknowledgement G. Drosatos, Privacy by Design in Personal e-Health: