Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario
نویسندگان
چکیده
In this paper, we discuss end user requirements that we elicited for the use of malleable signatures in a Cloud-based eHealth scenario. The concept of a malleable signature, which is a privacy enhancing cryptographic scheme that enables the redaction of personal information from signed documents while preserving the validity of the signature, might be counterintuitive to end users as its functionality does not correspond to the one of a traditional signature scheme. A qualitative study via a series of semi-structured interviews and focus groups has been conducted to understand stakeholders’ opinions and concerns in regards to the possible applications of malleable signatures in the eHealth area, where a medical record is first digitally signed by a doctor and later redacted by the patient in the cloud. Results from this study yielded user requirements such as the need for suitable metaphors and guidelines, usable templates, and clear redaction policies.
منابع مشابه
A service decomposition and definition model in cloud manufacturing systems using game theory focusing on cost accounting perspectives
Cloud manufacturing is a new paradigm which has been under study since 2010 and a vast body of research has been conducted on this topic. Among them, service composition problems are of utmost importance. However, most studies only focused on private clouds meaning the objective function is defined for just one component of the supply chain. This paper attempts to consider service composition p...
متن کاملA risk model for cloud processes
Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to lack of historical data on attacks, which has prevented frequency-based identification...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملWhat Is eHealth (6): Perspectives on the Evolution of eHealth Research
BACKGROUND The field of eHealth holds promise for supporting and enabling health behavior change and the prevention and management of chronic disease. OBJECTIVE In order to establish areas of congruence and controversy among contributors to the early development, evaluation, and dissemination of eHealth applications, as well as the desire to inform an evaluation research funding agenda, 38 se...
متن کاملLinearly Homomorphic Structure-Preserving Signatures and Their Applications
Structure-preserving signatures (SPS) are signature schemes where messages, signatures and public keys all consist of elements of a group over which a bilinear map is efficiently computable. This property makes them useful in cryptographic protocols as they nicely compose with other algebraic tools (like the celebrated Groth-Sahai proof systems). In this paper, we consider SPS systems with homo...
متن کامل