SlideShare una empresa de Scribd logo
1 de 24
Descargar para leer sin conexión
Privacy Preserving Back-up and
 Recovery of Emergency Data

    Seminar on System Security for Master
                  SS2010
             Zdravko Danailov
Privacy Preserving Back-up and Recovery of Emergency Data                      2

                                                            Zdravko Danailov

                                         Outline

        Introduction
           The Telematics infrastructure
           Electronic Health Card
           Health Professional Card
           Hardware Security Module
           Emergency data
        Existing/ proposed solution for Back-up/Recovery of
        emergency data
           Existing/proposed solution
           Disadvantages
              Renewing of the eHC (lost, defect or expired)
              Recovery of emergency data on the eHC
        Krawczyk’s Secret Sharing Scheme
        Our proposal solution
        Conclusion
Privacy Preserving Back-up and Recovery of Emergency Data                      3

                                                            Zdravko Danailov

                          Basics: The Telematics infrastructure


        Overview of the entire architecture




        Primary systems architecture
Privacy Preserving Back-up and Recovery of Emergency Data                      4

                                                            Zdravko Danailov

                          Basics: Electronic Health Card (eHC)


          eHC
            Solution design by the Fraunhofer Institute
            Chip card (HSM)
            Content (emergency data, ePrescription)
Privacy Preserving Back-up and Recovery of Emergency Data                      5

                                                            Zdravko Danailov

                         Basics: Health Professional Card (HPC)


          HPC
            Solution design by “Elektronischer Arztausweis”-work
            group
            individually programmed access authorization card for
            health professionals (e.g. doctors, pharmacists)
            Doctor-to-doctor Method (D2D)
            Creation of medicament documentation via the web-
            based software star.net®
Privacy Preserving Back-up and Recovery of Emergency Data                      6

                                                            Zdravko Danailov

                        Basics: Hardware Security Module (HSM)


          HSM
            Use as card (eHC, HPC) or eHC chip card terminal
            Connection via USB-port or serial interface
Privacy Preserving Back-up and Recovery of Emergency Data                      7

                                                            Zdravko Danailov

                                 Basics: Emergency data


          Emergency data                        Emergency data
            relevant diagnoses,                       declaration for
            medication or                             organs’ spending
            allergy/ intolerance
Privacy Preserving Back-up and Recovery of Emergency Data                      8

                                                            Zdravko Danailov

                                         Outline

        Introduction
           The Telematics infrastructure
           Electronic Health Card
           Health Professional Card
           Hardware Security Module
           Emergency data
        Existing/ proposed solution for Back-up/Recovery
        of emergency data
           Existing/proposed solution
           Disadvantages
              Renewing of the eHC (lost, defect or expired)
              Recovery of emergency data on the eHC
        Krawczyk’s Secret Sharing Scheme
        Our proposal solution
        Conclusion
Privacy Preserving Back-up and Recovery of Emergency Data                      9

                                                            Zdravko Danailov

                         Existing/ proposed solution: Overview

        Overview
           Person involved: patient, doctor, paramedic
           HSM: chip cards – eHC, HPC; chip card terminal;
           Processing emergency data: Back-up, Recovery, Update
Privacy Preserving Back-up and Recovery of Emergency Data                      10

                                                            Zdravko Danailov

                         Existing/ proposed solution by gematik



                                                Authentication

                                                Processing of emergency
                                                data

                                                Creating Back-up (on A4
                                                paper or in local database)

                                                Recovery of emergency data
                                                on eHC
Privacy Preserving Back-up and Recovery of Emergency Data                           11

                                                            Zdravko Danailov

      Disadvantages of the solution: Renewing of the eHC(lost, defect or expired)

        Renewing of the eHC (lost, defect or expired)
           Obtaining the emergency data from A4 paper
              Creation of A4 paper with emergency data – optional
              A4 paper – lost, stolen or deleted
              Exposing of private data
           Obtaining the emergency data from primary system’s database
              Temporary Back-up may be: 1.deleted 2.not accessible
Privacy Preserving Back-up and Recovery of Emergency Data                      12

                                                            Zdravko Danailov

        Disadvantages of the solution: Recovery of emergency data on the eHC

        Recovery of emergency data on the eHC
           Obtaining the emergency data from A4 paper
              Creation of A4 paper with emergency data – optional
              A4 paper – lost, stolen or deleted
              Exposing of private data
           Obtaining the emergency data from primary system’s database
              Temporary Back-up may be: 1.deleted 2.not accessible
Privacy Preserving Back-up and Recovery of Emergency Data                      13

                                                            Zdravko Danailov

                                         Outline

        Introduction
           The Telematics infrastructure
           Electronic Health Card
           Health Professional Card
           Hardware Security Module
           Emergency data
        Existing/ proposed solution for Back-up/Recovery of
        emergency data
           Existing/proposed solution
           Disadvantages
              Renewing of the eHC (lost, defect or expired)
              Recovery of emergency data on the eHC
        Krawczyk’s Secret Sharing Scheme
        Our proposal solution
        Conclusion
Privacy Preserving Back-up and Recovery of Emergency Data                          14

                                                            Zdravko Danailov

                               Secret Sharing Scheme (SS)

        Secret Sharing Scheme (n,m)
           Invented by both Adi Shamir and George Blackley independently of each
           other in 1979




        Method for distribution of a secret S among a group of n-
        participants

        Reconstruction is possible only when a sufficient number
        of shares are combined together
Privacy Preserving Back-up and Recovery of Emergency Data                              15

                                                            Zdravko Danailov

                             Shamir’s Secret Sharing Scheme

         Shamir’s Secret Sharing Scheme (n,t)
            Based on polynomial interpolation




            Distribution
                polynomial of degree t-1, secret S = k0, coefficients kt-1,…,k1 picked at
                random
                n points on the curve; n participants
            Reconstruction
                at least t out of the n players reveal their points
                sufficient information
                secret S
            information-theoretically secure
            storage efficient
                Size of shares = size of secret |S|
Privacy Preserving Back-up and Recovery of Emergency Data                      16

                                                            Zdravko Danailov

                           Information Dispersal Scheme (IDS)

        Information Dispersal Scheme (n,m)
           Based on error correcting codes (e.g. Reed-Solomon Code)




        Method for distribution of information F among a group of
        n-participants
        Reconstruction is possible when sufficient number of
        fragments (≥m) are combined together
        Secrecy is not important
        size of fragments =
Privacy Preserving Back-up and Recovery of Emergency Data                      17

                                                            Zdravko Danailov

                           Krawczyk’s Secret Sharing Scheme


         Krawczyk’s Secret Sharing Scheme (n,m)
            Combination of SS and IDS




         computationally secure
         less storage and bandwidth in comparison to Shamir’s SS
         size of shares = |si| <|S|
Privacy Preserving Back-up and Recovery of Emergency Data                      18

                                                            Zdravko Danailov

                                         Outline

        Introduction
           The Telematics infrastructure
           Electronic Health Card
           Health Professional Card
           Hardware Security Module
           Emergency data
        Existing/ proposed solution for Back-up/Recovery of
        emergency data
           Existing/proposed solution
           Disadvantages
              Renewing of the eHC (lost, defect or expired)
              Recovery of emergency data on the eHC
        Krawczyk’s Secret Sharing Scheme
        Our proposal solution
        Conclusion
Privacy Preserving Back-up and Recovery of Emergency Data                      19

                                                            Zdravko Danailov

                             Our proposal solution: Overview

        Overview
           Person involved: patient, doctor, paramedic
           HSM: chip cards – eHC, HPC; chip card terminal;




        Properties
           tolerate no non-availability
           preserve privacy
           no encryption but secret sharing
Privacy Preserving Back-up and Recovery of Emergency Data                             20

                                                             Zdravko Danailov

                               Our proposal solution: Back-up

        Back-up of emergency data
           Authentication (via e.g. ID-patient/ ID-doctor, ID-eHC/ID-HPC,
           Fingerprints, different types of digital signatures, PIN, etc.)
           Complete the form for emergency data and/ or form for organs’ donation
           Confirmation of the data, e.g. via fingerprint by the patient and doctor
           Back-up
              using Krawczyk’s SS – executed online via e.g. VPN
              using a portable device (e.g. USB-Stick) – executed offline
Privacy Preserving Back-up and Recovery of Emergency Data                              21

                                                            Zdravko Danailov

                              Our proposal solution: Recovery

        Recovery of emergency data
           Authentication (via e.g. ID-patient/ ID-doctor, ID-eHC/ID-HPC,
           Fingerprints, different types of digital signatures, PIN) on HSM
           Recovery of emergency data is possible
              using Krawczyk’s SS – executed online via e.g. VPN, from every “true”/
              authorized doctor or medical person
              using a portable device (e.g. USB-Stick) – executed offline
Privacy Preserving Back-up and Recovery of Emergency Data                      22

                                                            Zdravko Danailov

                                         Outline

        Introduction
           The Telematics infrastructure
           Electronic Health Card
           Health Professional Card
           Hardware Security Module
           Emergency data
        Existing/ proposed solution for Back-up/Recovery of
        emergency data
           Existing/proposed solution
           Disadvantages
              Renewing of the eHC (lost, defect or expired)
              Recovery of emergency data on the eHC
        Krawczyk’s Secret Sharing Scheme
        Our proposal solution
        Conclusion
Privacy Preserving Back-up and Recovery of Emergency Data                      23

                                                            Zdravko Danailov

                                        Conclusion

        Our proposal solution

           minimizes the exposition of privite data

           tolerates no non-availability

           offers better alternatives for back-up and recovery of
           emergency data

           uses no encryption but secret sharing

           computationally secure

           information-theoretically unsecure
Privacy Preserving Back-up and Recovery of Emergency Data                      24

                                                            Zdravko Danailov




                         Thank You!

Más contenido relacionado

Último

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Último (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 

Destacado

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destacado (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Privacy Preserving Back-up and Recovery of Emergency Data

  • 1. Privacy Preserving Back-up and Recovery of Emergency Data Seminar on System Security for Master SS2010 Zdravko Danailov
  • 2. Privacy Preserving Back-up and Recovery of Emergency Data 2 Zdravko Danailov Outline Introduction The Telematics infrastructure Electronic Health Card Health Professional Card Hardware Security Module Emergency data Existing/ proposed solution for Back-up/Recovery of emergency data Existing/proposed solution Disadvantages Renewing of the eHC (lost, defect or expired) Recovery of emergency data on the eHC Krawczyk’s Secret Sharing Scheme Our proposal solution Conclusion
  • 3. Privacy Preserving Back-up and Recovery of Emergency Data 3 Zdravko Danailov Basics: The Telematics infrastructure Overview of the entire architecture Primary systems architecture
  • 4. Privacy Preserving Back-up and Recovery of Emergency Data 4 Zdravko Danailov Basics: Electronic Health Card (eHC) eHC Solution design by the Fraunhofer Institute Chip card (HSM) Content (emergency data, ePrescription)
  • 5. Privacy Preserving Back-up and Recovery of Emergency Data 5 Zdravko Danailov Basics: Health Professional Card (HPC) HPC Solution design by “Elektronischer Arztausweis”-work group individually programmed access authorization card for health professionals (e.g. doctors, pharmacists) Doctor-to-doctor Method (D2D) Creation of medicament documentation via the web- based software star.net®
  • 6. Privacy Preserving Back-up and Recovery of Emergency Data 6 Zdravko Danailov Basics: Hardware Security Module (HSM) HSM Use as card (eHC, HPC) or eHC chip card terminal Connection via USB-port or serial interface
  • 7. Privacy Preserving Back-up and Recovery of Emergency Data 7 Zdravko Danailov Basics: Emergency data Emergency data Emergency data relevant diagnoses, declaration for medication or organs’ spending allergy/ intolerance
  • 8. Privacy Preserving Back-up and Recovery of Emergency Data 8 Zdravko Danailov Outline Introduction The Telematics infrastructure Electronic Health Card Health Professional Card Hardware Security Module Emergency data Existing/ proposed solution for Back-up/Recovery of emergency data Existing/proposed solution Disadvantages Renewing of the eHC (lost, defect or expired) Recovery of emergency data on the eHC Krawczyk’s Secret Sharing Scheme Our proposal solution Conclusion
  • 9. Privacy Preserving Back-up and Recovery of Emergency Data 9 Zdravko Danailov Existing/ proposed solution: Overview Overview Person involved: patient, doctor, paramedic HSM: chip cards – eHC, HPC; chip card terminal; Processing emergency data: Back-up, Recovery, Update
  • 10. Privacy Preserving Back-up and Recovery of Emergency Data 10 Zdravko Danailov Existing/ proposed solution by gematik Authentication Processing of emergency data Creating Back-up (on A4 paper or in local database) Recovery of emergency data on eHC
  • 11. Privacy Preserving Back-up and Recovery of Emergency Data 11 Zdravko Danailov Disadvantages of the solution: Renewing of the eHC(lost, defect or expired) Renewing of the eHC (lost, defect or expired) Obtaining the emergency data from A4 paper Creation of A4 paper with emergency data – optional A4 paper – lost, stolen or deleted Exposing of private data Obtaining the emergency data from primary system’s database Temporary Back-up may be: 1.deleted 2.not accessible
  • 12. Privacy Preserving Back-up and Recovery of Emergency Data 12 Zdravko Danailov Disadvantages of the solution: Recovery of emergency data on the eHC Recovery of emergency data on the eHC Obtaining the emergency data from A4 paper Creation of A4 paper with emergency data – optional A4 paper – lost, stolen or deleted Exposing of private data Obtaining the emergency data from primary system’s database Temporary Back-up may be: 1.deleted 2.not accessible
  • 13. Privacy Preserving Back-up and Recovery of Emergency Data 13 Zdravko Danailov Outline Introduction The Telematics infrastructure Electronic Health Card Health Professional Card Hardware Security Module Emergency data Existing/ proposed solution for Back-up/Recovery of emergency data Existing/proposed solution Disadvantages Renewing of the eHC (lost, defect or expired) Recovery of emergency data on the eHC Krawczyk’s Secret Sharing Scheme Our proposal solution Conclusion
  • 14. Privacy Preserving Back-up and Recovery of Emergency Data 14 Zdravko Danailov Secret Sharing Scheme (SS) Secret Sharing Scheme (n,m) Invented by both Adi Shamir and George Blackley independently of each other in 1979 Method for distribution of a secret S among a group of n- participants Reconstruction is possible only when a sufficient number of shares are combined together
  • 15. Privacy Preserving Back-up and Recovery of Emergency Data 15 Zdravko Danailov Shamir’s Secret Sharing Scheme Shamir’s Secret Sharing Scheme (n,t) Based on polynomial interpolation Distribution polynomial of degree t-1, secret S = k0, coefficients kt-1,…,k1 picked at random n points on the curve; n participants Reconstruction at least t out of the n players reveal their points sufficient information secret S information-theoretically secure storage efficient Size of shares = size of secret |S|
  • 16. Privacy Preserving Back-up and Recovery of Emergency Data 16 Zdravko Danailov Information Dispersal Scheme (IDS) Information Dispersal Scheme (n,m) Based on error correcting codes (e.g. Reed-Solomon Code) Method for distribution of information F among a group of n-participants Reconstruction is possible when sufficient number of fragments (≥m) are combined together Secrecy is not important size of fragments =
  • 17. Privacy Preserving Back-up and Recovery of Emergency Data 17 Zdravko Danailov Krawczyk’s Secret Sharing Scheme Krawczyk’s Secret Sharing Scheme (n,m) Combination of SS and IDS computationally secure less storage and bandwidth in comparison to Shamir’s SS size of shares = |si| <|S|
  • 18. Privacy Preserving Back-up and Recovery of Emergency Data 18 Zdravko Danailov Outline Introduction The Telematics infrastructure Electronic Health Card Health Professional Card Hardware Security Module Emergency data Existing/ proposed solution for Back-up/Recovery of emergency data Existing/proposed solution Disadvantages Renewing of the eHC (lost, defect or expired) Recovery of emergency data on the eHC Krawczyk’s Secret Sharing Scheme Our proposal solution Conclusion
  • 19. Privacy Preserving Back-up and Recovery of Emergency Data 19 Zdravko Danailov Our proposal solution: Overview Overview Person involved: patient, doctor, paramedic HSM: chip cards – eHC, HPC; chip card terminal; Properties tolerate no non-availability preserve privacy no encryption but secret sharing
  • 20. Privacy Preserving Back-up and Recovery of Emergency Data 20 Zdravko Danailov Our proposal solution: Back-up Back-up of emergency data Authentication (via e.g. ID-patient/ ID-doctor, ID-eHC/ID-HPC, Fingerprints, different types of digital signatures, PIN, etc.) Complete the form for emergency data and/ or form for organs’ donation Confirmation of the data, e.g. via fingerprint by the patient and doctor Back-up using Krawczyk’s SS – executed online via e.g. VPN using a portable device (e.g. USB-Stick) – executed offline
  • 21. Privacy Preserving Back-up and Recovery of Emergency Data 21 Zdravko Danailov Our proposal solution: Recovery Recovery of emergency data Authentication (via e.g. ID-patient/ ID-doctor, ID-eHC/ID-HPC, Fingerprints, different types of digital signatures, PIN) on HSM Recovery of emergency data is possible using Krawczyk’s SS – executed online via e.g. VPN, from every “true”/ authorized doctor or medical person using a portable device (e.g. USB-Stick) – executed offline
  • 22. Privacy Preserving Back-up and Recovery of Emergency Data 22 Zdravko Danailov Outline Introduction The Telematics infrastructure Electronic Health Card Health Professional Card Hardware Security Module Emergency data Existing/ proposed solution for Back-up/Recovery of emergency data Existing/proposed solution Disadvantages Renewing of the eHC (lost, defect or expired) Recovery of emergency data on the eHC Krawczyk’s Secret Sharing Scheme Our proposal solution Conclusion
  • 23. Privacy Preserving Back-up and Recovery of Emergency Data 23 Zdravko Danailov Conclusion Our proposal solution minimizes the exposition of privite data tolerates no non-availability offers better alternatives for back-up and recovery of emergency data uses no encryption but secret sharing computationally secure information-theoretically unsecure
  • 24. Privacy Preserving Back-up and Recovery of Emergency Data 24 Zdravko Danailov Thank You!