2008
DOI: 10.1504/ijbidm.2008.022135
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-enhancing methods for e-health applications: how to prevent statistical analyses and attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Stingl and Slaming [30] pointed out different attacks on patient health records including the statistical analysis of metadata which can be mostly launched by internal attackers. Even if metadata is encrypted the attacker can draw different conclusions from the data.…”
Section: Privacy and Metadatamentioning
confidence: 99%
“…Stingl and Slaming [30] pointed out different attacks on patient health records including the statistical analysis of metadata which can be mostly launched by internal attackers. Even if metadata is encrypted the attacker can draw different conclusions from the data.…”
Section: Privacy and Metadatamentioning
confidence: 99%
“…To achieve unlinkability between the objects (PATIENT, FOLDER, etc. ), pseudonymization of relationships [12,20,21] is adopted. In order to pseudonymize a relationship (e.g., PATIENT to FOLDER), the creator of the record chooses a second random primary key per record, encrypted and then integrated into the master table (PATIENT).…”
Section: Figurementioning
confidence: 99%
“…However, this does not imply that one can find a link to any other record in other tables, e.g., the patient. By applying simple obfuscation techniques as discussed in [20], one can hide the actual size of the sets in the partition and thus reduce the information accessible to an adversary.…”
Section: Figurementioning
confidence: 99%
“…Even the cloud should not know the identities of the patients. Although the EHR contents are encrypted, it is not secure to expose the patients' identities, for attackers will possibly acquire general knowledge of the patients' healthcare activities (e.g., the attackers may discover at least which doctors one patient has visited from the doctors' signatures) and even more from analyzing the contents in EHRs stored in the cloud (Stingl & Slamanig, 2008).…”
Section: Introductionmentioning
confidence: 99%