Formal Analysis of an eHealth Protocol

نویسندگان

  • Naipeng Dong
  • Hugo Jonker
  • Jun Pang
چکیده

Given the sensitive nature of health data, security and privacy of eHealth systems is of prime importance. Properties like secrecy, authentication, anonymity, and untraceability need to be satisfied. However, only satisfying these properties is not sufficient in case users can reveal private information to the adversary. For instance, a pharmaceutical company may bribe or coerce a pharmacist to reveal information which breaks a doctor’s privacy. Therefore, new privacy properties are required: enforced prescribing-privacy, independency of prescribing-privacy, and independency of enforced prescribing-privacy. In this paper, we identify and formalise these new properties. Moreover we take an eHealth protocol (DLVV08), which is proposed for practical use, as a case study, and study to what extent all these properties are satisfied by the DLVV08 protocol. Finally, we address found ambiguities and flaws and propose suggestions for fixing them.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal Analysis of Privacy in an eHealth Protocol

Given the nature of health data, privacy of eHealth systems is of prime importance. An eHealth system must enforce that users remain private, even if they are bribed or coerced to reveal themselves or others. Consider e.g. a pharmaceutical company that bribes a pharmacist to reveal information which breaks a doctor’s privacy. In this paper, we identify and formalise several new but important pr...

متن کامل

Work in Progress: A Protocol for the Collection, Analysis, and Interpretation of Log Data from eHealth Technology

Randomized controlled trials to evaluate the effectiveness of eHealth technologies provide only little understanding in why a particular outcome did occur. Log data analysis is a promising methodology to explain the found effects of eHealth technologies and to improve the effects. In this paper, we describe our experiences with the collection, analysis, and interpretation of log data from eHeal...

متن کامل

Validity and Reliability of the Iranian Version of eHealth Literacy Scale

Abstract: Introduction:  The eHEALS is an 8-item measure of eHealth literacy developed to measure consumers’ combined knowledge, comfort, and perceived skills at finding, evaluating, and applying electronic health information to health problems. The current study aims to measure validity and reliability of the Iranian version of eHEALS questionnaire in a population context. Mat...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012