SlideShare a Scribd company logo
Protecting Personal Data in an IoT Network 
with UMA 
A Patient Centric use case 
Domenico Catalano, Oracle Italy 
Maciej Machulak, Cloud Identity Limited 
Kantara Initiative Workshop 3rd Nov. 2014 - Dublin 
1
Agenda 
Personal Data in an IoT Network 
Risks and Challenges about Personal Data 
UMA Approach and Use case 
Conclusion 
Q&A 
2
3 
With more than seven billion 
people and businesses, and at 
least 35 billion devices, 
communicating, transacting, 
and even negotiating with each 
other, a new world comes into 
being: 
The World of 
Digital 
Business
Nike’s Digital Master 
4 
Nike’s Fuelband allows athletes to 
track their workouts, share their 
performance online, and even 
receive an advice from digital 
“coaches”. Meanwhile both social 
media and digital products 
provide Nike with rich data on 
customers, their activities, and 
their preferences.
Risks about Personal Data 
“ 
5 
Individual 
Organization 
Fully 78% of consumers 
think it is hard to trust 
companies when it 
comes to use of their 
personal data.” 
Orange, The Future of Digital Trust, 2014 
Individuals have little visibility into the practices of the 
organizations they are putting their trust in – until their data 
is breached or misused.
Challenges to Mitigate Risks 
Unlocking the value of Personal Data: From Collection to Usage 
New approaches for decentralized and distributed 
network environment. 
Who has data about you? 
Where is the data about you located? 
6 
Protection and Security 
Accountability 
Right and Responsibility for using Personal Data 
New approaches that help 
individuals understand how 
and when data is collected. 
How the data is being 
used and the implications 
of these actions. 
Empower individual 
more effectively and 
efficiently. 
Context Aware 
Source:World Economic Forum 2013 Report: Unlocking the Value of Personal Data: From Collection to Usage
Personal Data Management Services 
A mapping of Market 
Source: Word Economic Forum Report (2014): Rethinking Personal Data: A new lens for Strengthening Trust 
7
User-Managed Access (UMA) 
Concept and Terminology 
8 
UMA defines how to: 
Protect resources 
Authorize access 
Enforce policy 
A centralized Authorization 
Server governs access 
based on Individual Policy.
Ubiquitous Networking of IoT 
9 
TV 
PC 
PDA 
Home Electronics 
Vehicle 
Sensors 
Camera 
Smart 
Card 
RFIDtag 
Telematics 
Navigation 
Device 
Home Server 
Gateway 
Medical 
Device 
Mobile 
Device 
Wearable 
PC 
Data, Resource, 
Web/Application 
Server, Content 
Object-to-Object 
Communication 
Human-to-Human 
Communication 
Internet 
Human-to-Object 
Communication 
Human with 
Attached Device Objects 
Source: Shaping Future Service Environments with the Cloud and Internet of Things: Networking Challenges and Service Evolution
A simplified IoT Taxonomy 
Dumb Thing Intelligence Thing Smart Thing 
10 
Intelligence 
Web-based Service 
Context-awareness 
End-to-End connectivity 
Data handling and processing 
capabilities 
Real-time identification and 
tracking of object Network capability 
Context-aware 
Connecting to anything 
Tag-based
UMA for IoT Network 
11 
Smart 
IoT Network 
Intelligence Thing 
Thing 
Dumb 
Thing
UMA for IoT Network 
A patient-centric use case 
12
Patient-Centric Use case 
Actors and Roles 
Intelligence Thing Smart Thing 
13 
Patient 
Doctor 
Electronic 
Stethoscope 
Client 
Client 
EHR 
RS 
Patient Monitor 
RFIDtag
Patient-Centric Use case 
Security Domains and Goals 
14 
Doctor’s Security 
Domain 
Patient’s Security 
Domain 
Hospital’s Security 
Domain 
Heartbeats 
data 
Control and 
authorize 
data sharing 
EHR 
Resource 
Owner 
Resource 
Owner Requesting 
Party 
Prevent 
unauthorized 
object 
connection
Patient-Centric scenario 
UMA Features 
Resource 
Protection Authorization Patient Consent 
15
Resource Protection 
UMA Dynamic Registration 
IoT Network 
Electronic 
Stethoscope 
UMA Personal 
Authorization Server 
Secret 
Patient 
Monitor 
RFIDtag 
OAuth 2.0 Dynamic Client Registration Protocol 16 
Day Hospital 
Request 
Patient Registration 
Department 
Doctor’s team 
sw_stmt
UMA as Authorization 
Mechanism for IoT 
17
Authorization Flow 
Authentication and Authorization in Constrained 
Environment (ACE) 
18 
Resource 
Server 
Intelligence 
Thing 
UMA 
Authorization 
Server 
AuthN 
Manager 
Authentication and 
Authorization 
http://tools.ietf.org/pdf/draft-gerdes-ace-actors-01.pdf 
Policy 
Department 
Doctor’s team 
Doctor Patient
Authorization Flow 
Revealing Electronic Stethoscope 
Pairing with 
Electronic Stethoscope 
Authorization Requested… 
19
Authorization Flow 
Authentication and Authorization 
National Healthcare System 
Authentication Process 
Fingerprint 
20
Creating a Protected Resource 
Patient’s Data Association 
Electronic Stethoscope 
Data Uploading 
21
New Protected Resource 
Patient Notification 
Personal UMA AS 
Heartbeat data added as protected 
resource 
View Close 
22 
Patient
EHR Client Access and Patient Consent 
UMA Flow 
Protect with PAT 
23 
Heartbeats data 
PAT: Permission Access Token 
AAT: Authorization Access Token 
RPT: Requesting Party Token 
Patient 
Resource Owner 
Authorization 
Server 
Authorization API 
EHR System 
UMA Client 
Protection API 
manage 
Consent 
PAT 
Access RPT AAT 
with RPT 
Client redirects the 
Requesting Party to AS 
Patient Monitor 
Requesting Party IdP/Claim Provider 
Claim Client 
Authenticate 
Request UserInfo 
EHR: Electronic Healthcare Record 
RS
Patient-Centric Platform 
Healthcare Patient Platform 
My Team My Day My Health Data 
Add more 12.00 Lunch 
24 
Main Doctor 
Dr. Alan Smith 
Cardiologists 
Dr. Peter Doole 
Radiologist 
Dr. Alice Gale 
Hematologist 
8.00-9.00 Cardio Therapy 
About Me 
Heartbeats 
X-Ray 
Electro Cardio 
Graph 
Mrs. Mary 
Davidson, 72 
Chat with a doctor 
Ask 
Share my data 
Who has data about me 
My Consent
Patient-Centric Platform 
< Back Who has data about me: X-ray 
25 
Healthcare Patient Platform 
Research 
X-Ray 
Medical Doctor 
Radiology 
Departiment 
Diagnostic research 
Biomedical 
Saint James 
Hospital 
X-RAY Specialists 
X-Ray Operators 
Peter Doole 
LifeScience 
Hospital 
Healthdata 
Alice Gale 
Hospitals
Advantages of UMA Approach 
Applicable to 
constrained 
resources, 
different nature of 
things, data and 
owners. 
26 
Designed for 
centralising the 
Authorization 
process for 
distributed 
resources. 
Developed to 
meet the 
Privacy By 
Design 
principles.
UMA for Patient-Centric Scenario 
Benefits 
• Improve Patient-centric Experience. 
• Prevent medical errors through 
authorization processes. 
• Empower Patients on controlling their 
Personal data (healthcare data). 
27
Future Works 
• Inheriting Data sharing policy 
• Delegation with Notification 
28
In the News 
https://kantarainitiative.org/uma-takes-home-award-from-eic-2014/ 
29
Acknowledgements 
• Eve Maler (Chair UMA WG), Adrian Gropper (Hearthurl), George 
Fletcher (AOL) 
• UMA Work Group 
• User-Managed Access (UMA) Core Protocol 
• OAuth 2.0 Dynamic Client Registration Protocol 
• Securing Internet of Things 
• Actors in the ACE Architecture 
• Rethinking Personal Data: A New Lens for Strengthening Trust 
30 
References
Questions? 
Thank you 
@UMAWG 
tinyurl.com/umawg |tinyurl.com/umafaq 
31

More Related Content

What's hot

Kantara a Global Context 2011
Kantara a Global Context 2011Kantara a Global Context 2011
Kantara a Global Context 2011
kantarainitiative
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ali Raza
 
11 ways blockchain can improve the healthcare industry
11 ways blockchain can improve the healthcare industry11 ways blockchain can improve the healthcare industry
11 ways blockchain can improve the healthcare industry
JohnsMike1
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
CloudMask inc.
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Harilal Punalur
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
Priyanka Aash
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities
ForgeRock
 
The day when role based access control disappears
The day when role based access control disappearsThe day when role based access control disappears
The day when role based access control disappears
Ulf Mattsson
 
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon (SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
Priyanka Aash
 
IRJET- Electronic Health Records
IRJET- Electronic Health RecordsIRJET- Electronic Health Records
IRJET- Electronic Health Records
IRJET Journal
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-Social
NetIQ
 
How blockchain is revolutionising healthcare industry’s challenges of genomic...
How blockchain is revolutionising healthcare industry’s challenges of genomic...How blockchain is revolutionising healthcare industry’s challenges of genomic...
How blockchain is revolutionising healthcare industry’s challenges of genomic...
Tyrone Systems
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solution
Hexnode
 
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
Alex G. Lee, Ph.D. Esq. CLP
 
The emerging pci dss and nist standards
The emerging pci dss and nist standardsThe emerging pci dss and nist standards
The emerging pci dss and nist standards
Ulf Mattsson
 
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
ProductNation/iSPIRT
 
Xanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System DevelopmentXanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System Development
Alex G. Lee, Ph.D. Esq. CLP
 
Identity and Access Management Tools
Identity and Access Management ToolsIdentity and Access Management Tools
Identity and Access Management Tools
ijtsrd
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital Identity
Noreen Whysel
 

What's hot (19)

Kantara a Global Context 2011
Kantara a Global Context 2011Kantara a Global Context 2011
Kantara a Global Context 2011
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
11 ways blockchain can improve the healthcare industry
11 ways blockchain can improve the healthcare industry11 ways blockchain can improve the healthcare industry
11 ways blockchain can improve the healthcare industry
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities
 
The day when role based access control disappears
The day when role based access control disappearsThe day when role based access control disappears
The day when role based access control disappears
 
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon (SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
 
IRJET- Electronic Health Records
IRJET- Electronic Health RecordsIRJET- Electronic Health Records
IRJET- Electronic Health Records
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-Social
 
How blockchain is revolutionising healthcare industry’s challenges of genomic...
How blockchain is revolutionising healthcare industry’s challenges of genomic...How blockchain is revolutionising healthcare industry’s challenges of genomic...
How blockchain is revolutionising healthcare industry’s challenges of genomic...
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solution
 
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
 
The emerging pci dss and nist standards
The emerging pci dss and nist standardsThe emerging pci dss and nist standards
The emerging pci dss and nist standards
 
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
Presentation by Seclore Technologies at Zensar #TechShowcase. An iSPIRT Produ...
 
Xanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System DevelopmentXanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System Development
 
Identity and Access Management Tools
Identity and Access Management ToolsIdentity and Access Management Tools
Identity and Access Management Tools
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital Identity
 

Viewers also liked

Open Innovation in the UK - Digital Catapult - Michele Nati
Open Innovation in the UK - Digital Catapult - Michele NatiOpen Innovation in the UK - Digital Catapult - Michele Nati
Open Innovation in the UK - Digital Catapult - Michele Nati
MicheleNati
 
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract ContextsUser-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
ForgeRock
 
Personal Data Receipts - Michele Nati - Lead Technologist Privacy and Trust -...
Personal Data Receipts - Michele Nati - Lead Technologist Privacy and Trust -...Personal Data Receipts - Michele Nati - Lead Technologist Privacy and Trust -...
Personal Data Receipts - Michele Nati - Lead Technologist Privacy and Trust -...
MicheleNati
 
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
MicheleNati
 
Personal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy WorkshopPersonal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy Workshop
Kaliya "Identity Woman" Young
 
Push to Pull: From Supply Chains to Patient-Centric Value Networks
Push to Pull: From Supply Chains  to Patient-Centric Value NetworksPush to Pull: From Supply Chains  to Patient-Centric Value Networks
Push to Pull: From Supply Chains to Patient-Centric Value Networks
accenture
 
Ethical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemEthical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data Ecosystem
Kaliya "Identity Woman" Young
 
C Documents And Settings Pmartin1 Local Settings Temporary Internet Files Co...
C  Documents And Settings Pmartin1 Local Settings Temporary Internet Files Co...C  Documents And Settings Pmartin1 Local Settings Temporary Internet Files Co...
C Documents And Settings Pmartin1 Local Settings Temporary Internet Files Co...
guestc9655c
 
Daimyo _japon_le_lendemain
Daimyo  _japon_le_lendemainDaimyo  _japon_le_lendemain
Daimyo _japon_le_lendemainKostas Tampakis
 
Do Donts Samenwerking
Do Donts SamenwerkingDo Donts Samenwerking
Do Donts Samenwerking
JGB de Groot
 
Representacíon en complemento
Representacíon en complementoRepresentacíon en complemento
Representacíon en complementosixtoverduga
 
Salvatore dali!!!
Salvatore dali!!!Salvatore dali!!!
Salvatore dali!!!
Kostas Tampakis
 
Presentatie huisstijl en website
Presentatie huisstijl en websitePresentatie huisstijl en website
Presentatie huisstijl en websiteMuziekgebouw
 
23
2323
Salida Desde Roma 1
Salida  Desde Roma 1Salida  Desde Roma 1
Salida Desde Roma 1corrycor
 
Copywriting for the reluctant
Copywriting for the reluctantCopywriting for the reluctant
Copywriting for the reluctant
RellyAB
 
Summitviii draft adoptionfundingbreakout-110501223638-phpapp02
Summitviii draft adoptionfundingbreakout-110501223638-phpapp02Summitviii draft adoptionfundingbreakout-110501223638-phpapp02
Summitviii draft adoptionfundingbreakout-110501223638-phpapp02
Andy Lehman
 
Exchange Server 2007
Exchange Server 2007Exchange Server 2007
Exchange Server 2007
senthil17
 

Viewers also liked (20)

Open Innovation in the UK - Digital Catapult - Michele Nati
Open Innovation in the UK - Digital Catapult - Michele NatiOpen Innovation in the UK - Digital Catapult - Michele Nati
Open Innovation in the UK - Digital Catapult - Michele Nati
 
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract ContextsUser-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
 
Personal Data Receipts - Michele Nati - Lead Technologist Privacy and Trust -...
Personal Data Receipts - Michele Nati - Lead Technologist Privacy and Trust -...Personal Data Receipts - Michele Nati - Lead Technologist Privacy and Trust -...
Personal Data Receipts - Michele Nati - Lead Technologist Privacy and Trust -...
 
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
 
Personal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy WorkshopPersonal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy Workshop
 
Push to Pull: From Supply Chains to Patient-Centric Value Networks
Push to Pull: From Supply Chains  to Patient-Centric Value NetworksPush to Pull: From Supply Chains  to Patient-Centric Value Networks
Push to Pull: From Supply Chains to Patient-Centric Value Networks
 
Ethical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemEthical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data Ecosystem
 
C Documents And Settings Pmartin1 Local Settings Temporary Internet Files Co...
C  Documents And Settings Pmartin1 Local Settings Temporary Internet Files Co...C  Documents And Settings Pmartin1 Local Settings Temporary Internet Files Co...
C Documents And Settings Pmartin1 Local Settings Temporary Internet Files Co...
 
Daimyo _japon_le_lendemain
Daimyo  _japon_le_lendemainDaimyo  _japon_le_lendemain
Daimyo _japon_le_lendemain
 
Do Donts Samenwerking
Do Donts SamenwerkingDo Donts Samenwerking
Do Donts Samenwerking
 
Representacíon en complemento
Representacíon en complementoRepresentacíon en complemento
Representacíon en complemento
 
Creativebriefmasterclass 110608005339-phpapp01
Creativebriefmasterclass 110608005339-phpapp01Creativebriefmasterclass 110608005339-phpapp01
Creativebriefmasterclass 110608005339-phpapp01
 
Salvatore dali!!!
Salvatore dali!!!Salvatore dali!!!
Salvatore dali!!!
 
Presentatie huisstijl en website
Presentatie huisstijl en websitePresentatie huisstijl en website
Presentatie huisstijl en website
 
23
2323
23
 
Salida Desde Roma 1
Salida  Desde Roma 1Salida  Desde Roma 1
Salida Desde Roma 1
 
Copywriting for the reluctant
Copywriting for the reluctantCopywriting for the reluctant
Copywriting for the reluctant
 
Summitviii draft adoptionfundingbreakout-110501223638-phpapp02
Summitviii draft adoptionfundingbreakout-110501223638-phpapp02Summitviii draft adoptionfundingbreakout-110501223638-phpapp02
Summitviii draft adoptionfundingbreakout-110501223638-phpapp02
 
Exchange Server 2007
Exchange Server 2007Exchange Server 2007
Exchange Server 2007
 
Chemical weather
Chemical weatherChemical weather
Chemical weather
 

Similar to Protecting Personal Data in a IoT Network with UMA

EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8
Caroline Rivett
 
Future of Digital Healthcare on Cloud .pdf
Future of Digital Healthcare on Cloud .pdfFuture of Digital Healthcare on Cloud .pdf
Future of Digital Healthcare on Cloud .pdf
ayushiqss
 
Internet of things & healthcare
Internet of things & healthcareInternet of things & healthcare
Internet of things & healthcare
khalidhassan105
 
HCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerHCAD_600_Paper1_Amer
HCAD_600_Paper1_Amer
Amer Nazar
 
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...
eSAT Journals
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
YogeshIJTSRD
 
Cloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the HospitalsCloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the Hospitals
ijtsrd
 
Iaetsd cplm cloud facilitated privacy shielding leakage
Iaetsd cplm cloud facilitated privacy shielding leakageIaetsd cplm cloud facilitated privacy shielding leakage
Iaetsd cplm cloud facilitated privacy shielding leakage
Iaetsd Iaetsd
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
IRJET Journal
 
Securing the digital front door
Securing the digital front doorSecuring the digital front door
Securing the digital front door
Ryan Coleman
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
Unisys Corporation
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
Akshay Mittal
 
The Internet Of Things UOP
The Internet Of Things UOPThe Internet Of Things UOP
The Internet Of Things UOP
Ahmad Atef Al-Shoubaki
 
Securing Data with Block chain and AI ppt
Securing Data with Block chain and AI pptSecuring Data with Block chain and AI ppt
Securing Data with Block chain and AI ppt
sumayyakousar194
 
Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.
iFour Technolab Pvt. Ltd.
 
Towards a fair (My)Data economy
Towards a fair (My)Data economyTowards a fair (My)Data economy
Towards a fair (My)Data economy
Alexandros Nousias
 
The Delivery of Web Mining in Healthcare System on Cloud Computing
The Delivery of Web Mining in Healthcare System on Cloud ComputingThe Delivery of Web Mining in Healthcare System on Cloud Computing
The Delivery of Web Mining in Healthcare System on Cloud Computing
IOSR Journals
 
The Use of AI and Blockchain in Connected Medical Devices
The Use of AI and Blockchain in Connected Medical DevicesThe Use of AI and Blockchain in Connected Medical Devices
The Use of AI and Blockchain in Connected Medical Devices
Omar Fogliadini
 
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
Raúl van Riezen
 
MEDBLOCK
MEDBLOCKMEDBLOCK
MEDBLOCK
IRJET Journal
 

Similar to Protecting Personal Data in a IoT Network with UMA (20)

EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8
 
Future of Digital Healthcare on Cloud .pdf
Future of Digital Healthcare on Cloud .pdfFuture of Digital Healthcare on Cloud .pdf
Future of Digital Healthcare on Cloud .pdf
 
Internet of things & healthcare
Internet of things & healthcareInternet of things & healthcare
Internet of things & healthcare
 
HCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerHCAD_600_Paper1_Amer
HCAD_600_Paper1_Amer
 
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
 
Cloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the HospitalsCloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the Hospitals
 
Iaetsd cplm cloud facilitated privacy shielding leakage
Iaetsd cplm cloud facilitated privacy shielding leakageIaetsd cplm cloud facilitated privacy shielding leakage
Iaetsd cplm cloud facilitated privacy shielding leakage
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
 
Securing the digital front door
Securing the digital front doorSecuring the digital front door
Securing the digital front door
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
 
The Internet Of Things UOP
The Internet Of Things UOPThe Internet Of Things UOP
The Internet Of Things UOP
 
Securing Data with Block chain and AI ppt
Securing Data with Block chain and AI pptSecuring Data with Block chain and AI ppt
Securing Data with Block chain and AI ppt
 
Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Healthcare Industry - iFour Technolab Pvt. Ltd.
 
Towards a fair (My)Data economy
Towards a fair (My)Data economyTowards a fair (My)Data economy
Towards a fair (My)Data economy
 
The Delivery of Web Mining in Healthcare System on Cloud Computing
The Delivery of Web Mining in Healthcare System on Cloud ComputingThe Delivery of Web Mining in Healthcare System on Cloud Computing
The Delivery of Web Mining in Healthcare System on Cloud Computing
 
The Use of AI and Blockchain in Connected Medical Devices
The Use of AI and Blockchain in Connected Medical DevicesThe Use of AI and Blockchain in Connected Medical Devices
The Use of AI and Blockchain in Connected Medical Devices
 
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
 
MEDBLOCK
MEDBLOCKMEDBLOCK
MEDBLOCK
 

More from kantarainitiative

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022
kantarainitiative
 
2021 Annual General Meeting
2021 Annual General Meeting2021 Annual General Meeting
2021 Annual General Meeting
kantarainitiative
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary
kantarainitiative
 
2020 Annual General Meeting
2020 Annual General Meeting2020 Annual General Meeting
2020 Annual General Meeting
kantarainitiative
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiative
kantarainitiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020
kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
kantarainitiative
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020
kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
kantarainitiative
 
Kantara orientation 2018
Kantara orientation 2018Kantara orientation 2018
Kantara orientation 2018
kantarainitiative
 
Kantara Overview 2017
Kantara Overview 2017Kantara Overview 2017
Kantara Overview 2017
kantarainitiative
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
kantarainitiative
 
Cloud Identity Summit
Cloud Identity SummitCloud Identity Summit
Cloud Identity Summit
kantarainitiative
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
kantarainitiative
 
Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)
kantarainitiative
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016
kantarainitiative
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
kantarainitiative
 

More from kantarainitiative (20)

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022
 
2021 Annual General Meeting
2021 Annual General Meeting2021 Annual General Meeting
2021 Annual General Meeting
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary
 
2020 Annual General Meeting
2020 Annual General Meeting2020 Annual General Meeting
2020 Annual General Meeting
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara orientation 2018
Kantara orientation 2018Kantara orientation 2018
Kantara orientation 2018
 
Kantara Overview 2017
Kantara Overview 2017Kantara Overview 2017
Kantara Overview 2017
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
Cloud Identity Summit
Cloud Identity SummitCloud Identity Summit
Cloud Identity Summit
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
 

Recently uploaded

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 

Recently uploaded (20)

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 

Protecting Personal Data in a IoT Network with UMA

  • 1. Protecting Personal Data in an IoT Network with UMA A Patient Centric use case Domenico Catalano, Oracle Italy Maciej Machulak, Cloud Identity Limited Kantara Initiative Workshop 3rd Nov. 2014 - Dublin 1
  • 2. Agenda Personal Data in an IoT Network Risks and Challenges about Personal Data UMA Approach and Use case Conclusion Q&A 2
  • 3. 3 With more than seven billion people and businesses, and at least 35 billion devices, communicating, transacting, and even negotiating with each other, a new world comes into being: The World of Digital Business
  • 4. Nike’s Digital Master 4 Nike’s Fuelband allows athletes to track their workouts, share their performance online, and even receive an advice from digital “coaches”. Meanwhile both social media and digital products provide Nike with rich data on customers, their activities, and their preferences.
  • 5. Risks about Personal Data “ 5 Individual Organization Fully 78% of consumers think it is hard to trust companies when it comes to use of their personal data.” Orange, The Future of Digital Trust, 2014 Individuals have little visibility into the practices of the organizations they are putting their trust in – until their data is breached or misused.
  • 6. Challenges to Mitigate Risks Unlocking the value of Personal Data: From Collection to Usage New approaches for decentralized and distributed network environment. Who has data about you? Where is the data about you located? 6 Protection and Security Accountability Right and Responsibility for using Personal Data New approaches that help individuals understand how and when data is collected. How the data is being used and the implications of these actions. Empower individual more effectively and efficiently. Context Aware Source:World Economic Forum 2013 Report: Unlocking the Value of Personal Data: From Collection to Usage
  • 7. Personal Data Management Services A mapping of Market Source: Word Economic Forum Report (2014): Rethinking Personal Data: A new lens for Strengthening Trust 7
  • 8. User-Managed Access (UMA) Concept and Terminology 8 UMA defines how to: Protect resources Authorize access Enforce policy A centralized Authorization Server governs access based on Individual Policy.
  • 9. Ubiquitous Networking of IoT 9 TV PC PDA Home Electronics Vehicle Sensors Camera Smart Card RFIDtag Telematics Navigation Device Home Server Gateway Medical Device Mobile Device Wearable PC Data, Resource, Web/Application Server, Content Object-to-Object Communication Human-to-Human Communication Internet Human-to-Object Communication Human with Attached Device Objects Source: Shaping Future Service Environments with the Cloud and Internet of Things: Networking Challenges and Service Evolution
  • 10. A simplified IoT Taxonomy Dumb Thing Intelligence Thing Smart Thing 10 Intelligence Web-based Service Context-awareness End-to-End connectivity Data handling and processing capabilities Real-time identification and tracking of object Network capability Context-aware Connecting to anything Tag-based
  • 11. UMA for IoT Network 11 Smart IoT Network Intelligence Thing Thing Dumb Thing
  • 12. UMA for IoT Network A patient-centric use case 12
  • 13. Patient-Centric Use case Actors and Roles Intelligence Thing Smart Thing 13 Patient Doctor Electronic Stethoscope Client Client EHR RS Patient Monitor RFIDtag
  • 14. Patient-Centric Use case Security Domains and Goals 14 Doctor’s Security Domain Patient’s Security Domain Hospital’s Security Domain Heartbeats data Control and authorize data sharing EHR Resource Owner Resource Owner Requesting Party Prevent unauthorized object connection
  • 15. Patient-Centric scenario UMA Features Resource Protection Authorization Patient Consent 15
  • 16. Resource Protection UMA Dynamic Registration IoT Network Electronic Stethoscope UMA Personal Authorization Server Secret Patient Monitor RFIDtag OAuth 2.0 Dynamic Client Registration Protocol 16 Day Hospital Request Patient Registration Department Doctor’s team sw_stmt
  • 17. UMA as Authorization Mechanism for IoT 17
  • 18. Authorization Flow Authentication and Authorization in Constrained Environment (ACE) 18 Resource Server Intelligence Thing UMA Authorization Server AuthN Manager Authentication and Authorization http://tools.ietf.org/pdf/draft-gerdes-ace-actors-01.pdf Policy Department Doctor’s team Doctor Patient
  • 19. Authorization Flow Revealing Electronic Stethoscope Pairing with Electronic Stethoscope Authorization Requested… 19
  • 20. Authorization Flow Authentication and Authorization National Healthcare System Authentication Process Fingerprint 20
  • 21. Creating a Protected Resource Patient’s Data Association Electronic Stethoscope Data Uploading 21
  • 22. New Protected Resource Patient Notification Personal UMA AS Heartbeat data added as protected resource View Close 22 Patient
  • 23. EHR Client Access and Patient Consent UMA Flow Protect with PAT 23 Heartbeats data PAT: Permission Access Token AAT: Authorization Access Token RPT: Requesting Party Token Patient Resource Owner Authorization Server Authorization API EHR System UMA Client Protection API manage Consent PAT Access RPT AAT with RPT Client redirects the Requesting Party to AS Patient Monitor Requesting Party IdP/Claim Provider Claim Client Authenticate Request UserInfo EHR: Electronic Healthcare Record RS
  • 24. Patient-Centric Platform Healthcare Patient Platform My Team My Day My Health Data Add more 12.00 Lunch 24 Main Doctor Dr. Alan Smith Cardiologists Dr. Peter Doole Radiologist Dr. Alice Gale Hematologist 8.00-9.00 Cardio Therapy About Me Heartbeats X-Ray Electro Cardio Graph Mrs. Mary Davidson, 72 Chat with a doctor Ask Share my data Who has data about me My Consent
  • 25. Patient-Centric Platform < Back Who has data about me: X-ray 25 Healthcare Patient Platform Research X-Ray Medical Doctor Radiology Departiment Diagnostic research Biomedical Saint James Hospital X-RAY Specialists X-Ray Operators Peter Doole LifeScience Hospital Healthdata Alice Gale Hospitals
  • 26. Advantages of UMA Approach Applicable to constrained resources, different nature of things, data and owners. 26 Designed for centralising the Authorization process for distributed resources. Developed to meet the Privacy By Design principles.
  • 27. UMA for Patient-Centric Scenario Benefits • Improve Patient-centric Experience. • Prevent medical errors through authorization processes. • Empower Patients on controlling their Personal data (healthcare data). 27
  • 28. Future Works • Inheriting Data sharing policy • Delegation with Notification 28
  • 29. In the News https://kantarainitiative.org/uma-takes-home-award-from-eic-2014/ 29
  • 30. Acknowledgements • Eve Maler (Chair UMA WG), Adrian Gropper (Hearthurl), George Fletcher (AOL) • UMA Work Group • User-Managed Access (UMA) Core Protocol • OAuth 2.0 Dynamic Client Registration Protocol • Securing Internet of Things • Actors in the ACE Architecture • Rethinking Personal Data: A New Lens for Strengthening Trust 30 References
  • 31. Questions? Thank you @UMAWG tinyurl.com/umawg |tinyurl.com/umafaq 31