21st International Conference on Data Engineering (ICDE'05)
DOI: 10.1109/icde.2005.111
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and Ownership Preserving of Outsourced Medical Data

Abstract: The demand for the secondary use of medical data is increasing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
61
0

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 106 publications
(61 citation statements)
references
References 27 publications
0
61
0
Order By: Relevance
“…Although digital watermarking techniques represent a viable solution for the problem of enforcing ownership of medical data (Bertino et al 2005), preliminary studies in watermarking or information hiding techniques have been developed only for embedding text, images, audio or video in to a host signal. Moreover the techniques developed for these databases do not transpose well to other biomedical time series data modalities such as EEG and ECG for the following reasons: 1) The redundancy in a time series of biomedical signals such as EEG or ECG is less compared with an image or audio, and hence embedding data in to these time series data is much more difficult since the reduced redundancy limits possibilities of hiding data and has not been investigated; 2) Audio signal has slow time-varying feature while biomedical signal is the fast changing-time series; 3) The watermark scheme needs to address a significant challenge related to biomedical data that is insertion of a watermark must not result in changing health and medical data of a patient to a level where a decision maker (or system) can misdiagnose the patient; and 4) In most applications, biomedical time series data such as EEG or ECG is recorded from multiple channels and at relatively high sampling frequencies.…”
Section: Current Issues In Sharing and Storing Biomedical Datamentioning
confidence: 99%
See 1 more Smart Citation
“…Although digital watermarking techniques represent a viable solution for the problem of enforcing ownership of medical data (Bertino et al 2005), preliminary studies in watermarking or information hiding techniques have been developed only for embedding text, images, audio or video in to a host signal. Moreover the techniques developed for these databases do not transpose well to other biomedical time series data modalities such as EEG and ECG for the following reasons: 1) The redundancy in a time series of biomedical signals such as EEG or ECG is less compared with an image or audio, and hence embedding data in to these time series data is much more difficult since the reduced redundancy limits possibilities of hiding data and has not been investigated; 2) Audio signal has slow time-varying feature while biomedical signal is the fast changing-time series; 3) The watermark scheme needs to address a significant challenge related to biomedical data that is insertion of a watermark must not result in changing health and medical data of a patient to a level where a decision maker (or system) can misdiagnose the patient; and 4) In most applications, biomedical time series data such as EEG or ECG is recorded from multiple channels and at relatively high sampling frequencies.…”
Section: Current Issues In Sharing and Storing Biomedical Datamentioning
confidence: 99%
“…In healthcare, each collaborator (hospital) needs to share their private local databases with other collaborators in telemedicine system, telediagnosis, telesurgery, and hospital information system (Bhatnagar and Wu 2013). However, there are multiple danger zones like copyright and integrity violations of digital objects (Gupta and Raval 2012), and the sharing of medical data also exposes data holders to threat of data theft (Bertino et al 2005). In reality, lots of incidents can be found where e-health systems become found wanting due to the miss-management and privacy violations of sensitive health data.…”
Section: Introductionmentioning
confidence: 99%
“…With the increasing development of IT outsourcing, a substantial amount of research work has been done on how to verify outsourced data and computation [2,3,[9][10][11][15][16][17]. Merkle hash trees have been used extensively for authentication of data elements [14].…”
Section: Related Workmentioning
confidence: 99%
“…Using a combination of server-side scripts 2 and database connections is a widely used approach in providing dynamic content to online users and in retrieving and storing customer data on databases. These scripts offer website owners a versatile interpreted language that can create complex web environments, with libraries offering connectivity to many other services such as databases.…”
Section: Introductionmentioning
confidence: 99%
“…However, watermarking of database systems started to receive attention because of the increasing use of database systems in many real-life applications. Examples where database watermarking might be of a crucial importance include protecting rights of outsourced relational databases and allowing the creation of secured and copyright-protected web-based services that enable users to search and access databases remotely [6,10,19] . Due to the different characteristics between images or audio and relational data, there exists no image or audio watermarking method suitable for watermarking relational databases.…”
Section: Introductionmentioning
confidence: 99%