eHealth systems. We discussed several common
application scenarios, and pointed out some possible
problems (e.g., PID collision, smart card loss, etc.),
and attacks (e.g., malicious cloud, ISP, insurance
companies, eavesdroppers, etc.), with corresponding
countermeasures. We also provide an optional
scheme for decreasing the computation burden in the
smart cards. These would make the proposed
pseudonym scheme more feasible to be implemented
in practical eHealth systems.
As future work, the computational cost of the
pseudonym scheme needs to be evaluated in
prototype eHealth systems equipped with simulated
cloud, smart cards and users. What is more, we will
continue to investigate the proposed pseudonym
scheme as to feasibility and compatibility with other
technologies in practical eHealth systems.
ACKNOWLEDGEMENTS
We would like to thank Adrian Spalka who raised
many challenges and comments from the viewpoint
of practical eHealth systems to this paper. Also we
appreciate Jan Lehnhardt for discussing with us
about the details of the scheme. What is more, he
commented on the early version of this paper and
helped with much literal work.
REFERENCES
Alemán, J. L. F., Señor, I. C., Lozoya, P. Á. O., Toval, A.,
2013. Security and privacy in electronic health
records: A systematic literature review. Journal of
biomedical informatics.
Alhaqbani, B., Fidge, C., 2008. Privacy-preserving
electronic health record linkage using pseudonym
identifiers. HealthCom 2008. 10th International
Conference on e-health Network- ing, Applications
and Services: IEEE. pp. 108-117.
Deng, M., Petkovic, M., Nalin, M., Baroni, I., 2011. A
Home Healthcare System in the Cloud--Addressing
Security and Privacy Challenges. 2011 International
Conference on Cloud Computing: IEEE. pp. 549-556.
Garets, D., Davis, M., 2006. Electronic medical records
vs. electronic health records: yes, there is a difference.
Policy white paper. Chicago, HIMSS Analytics.
Li, Z.-R., Chang, E.-C., Huang, K.-H., Lai, F., 2011. A
secure electronic medical record sharing mechanism
in the cloud computing platform., 15th International
Symposium on Consumer Electronics (ISCE): IEEE.
pp. 98-103.
Lim, C. H., Lee, P. J., 1997. A key recovery attack on
discrete log-based schemes using a prime order
subgroup. In Advances in Cryptology—CRYPTO'97,
pp. 249-263: Springer.
Löhr, H., Sadeghi, A.-R., Winandy, M., 2010. Securing
the e-health cloud. Proceedings of the 1st ACM
International Health Informatics Symposium: ACM.
pp. 220-229.
Lysyanskaya, A., Rivest, R. L., Sahai, A., Wolf, S., 2000.
Pseudonym systems. Selected Areas in Cryptography:
pp. 184-199.
McCurley, K. S., 1990. The discrete logarithm problem.
Proc. of Symp. in Applied Math. pp. 49-74.
Mell, P., Grance, T., 2011. The NIST definition of cloud
computing (draft). NIST special publication, 800
(145): 7.
Microsoft., 2007. HealthVault. www.healthvault.com.
Pfitzmann, A., Köhntopp, M., 2001. Anonymity,
unobservability, and pseudonymity—a proposal for
terminology. Designing privacy enhancing
technologies: Springer. pp. 1-9.
Rui, Z., Ling, L., 2010, 5-10 July 2010. Security Models
and Requirements for Healthcare Application Clouds.
IEEE 3rd International Conference on Cloud
Computing: IEEE. pp. 268-275.
Ruland, C. M., Brynhi, H., Andersen, R., Bryhni, T., 2008.
Developing a shared electronic health record for
patients and clinicians. Studies in health technology
and informatics, 136: 57-62.
Schneier, B., 1996. Applied cryptography. Protocols,
Algorithms, and Source Code in C/Bruce Schneier:
John Wiley, Sons, Inc.
Stingl, C., Slamanig, D., 2008. Privacy-enhancing
methods for e-health applications: how to prevent
statistical analyses and attacks. International Journal
of Business Intelligence and Data Mining, 3 (3): 236-
254.
Tang, P. C., Ash, J. S., Bates, D. W., Overhage, J. M.,
Sands, D. Z., 2006. Personal health records:
definitions, benefits, and strategies for overcoming
barriers to adoption. J Am Med Inform Assoc, 13 (2):
121-6.
ADecentralizedPseudonymSchemeforCloud-basedeHealthSystems
237