An Event Driven Hybrid Identity Management Approach to Privacy Enhanced e-Health

نویسندگان

  • Rosa Sánchez-Guerrero
  • Florina Almenárez Mendoza
  • Daniel Díaz Sánchez
  • Andrés Marín López
  • Patricia Arias Cabarcos
  • Fabio Sanvido
چکیده

Credential-based authorization offers interesting advantages for ubiquitous scenarios involving limited devices such as sensors and personal mobile equipment: the verification can be done locally; it offers a more reduced computational cost than its competitors for issuing, storing, and verification; and it naturally supports rights delegation. The main drawback is the revocation of rights. Revocation requires handling potentially large revocation lists, or using protocols to check the revocation status, bringing extra communication costs not acceptable for sensors and other limited devices. Moreover, the effective revocation consent--considered as a privacy rule in sensitive scenarios--has not been fully addressed. This paper proposes an event-based mechanism empowering a new concept, the sleepyhead credentials, which allows to substitute time constraints and explicit revocation by activating and deactivating authorization rights according to events. Our approach is to integrate this concept in IdM systems in a hybrid model supporting delegation, which can be an interesting alternative for scenarios where revocation of consent and user privacy are critical. The delegation includes a SAML compliant protocol, which we have validated through a proof-of-concept implementation. This article also explains the mathematical model describing the event-based model and offers estimations of the overhead introduced by the system. The paper focus on health care scenarios, where we show the flexibility of the proposed event-based user consent revocation mechanism.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reputation Management in Privacy-Enhanced E-learning

Both privacy and trust are essential elements of an effective e-learning environment. Privacy provides a personal space to a member of an e-learning community, while trust is a crucial enabler for meaningful and mutually beneficial interactions that build and sustain collaboration (e.g. collaborative learning). Identity management (in the form of various degree of anonymity) is one technology-b...

متن کامل

Identification in Cyberspace as a Main Challenge of e-Government (A Legal Approach to e-Identity Management System)

The penetration and growth of the Internet, as a key technology of the 21st century, caused to some major changes in all individual and social aspects of human life. Some of these changes, which associated with the evolution and changes in the concepts, including legal and political ones, have become a challenge. Identity as a legal and Government as a political concepts are in those fields whi...

متن کامل

Future Interactions in Policy-Driven Privacy Management

The growth of the Internet is increasing the deployment of e-services in such areas as e-business, e-learning, and e-health. In parallel, the providers and consumers of such services are realizing the need for privacy. The widespread use of P3P privacy policies for web sites is an example of this growing concern for privacy. However, while the privacy policy approach may seem to be a reasonable...

متن کامل

Role- and Relationship-based Identity Management for Privacy-enhanced E-learning

An e-learning discussion forum, an essential component of today’s e-learning systems, offers a platform for social learning activities. However, as learners participate in the discussion forum, privacy emerges as a major concern. Privacy concerns in social learning activities originate from one learner’s inability to convey a desired presentation of oneself to another learner. A user-controlled...

متن کامل

Claim-Based versus Network-Based Identity Management: A Hybrid Approach

This paper proposes a hybrid approach that combines claimbased and network-based identity management. Partly by virtue of the principle of separation of concerns, better security and privacy properties are attained. Overall trust is diminished, while simultaneously reducing multiple actors' exposure and value as a target of attack. The proposed architecture also facilitates interoperability and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره 12  شماره 

صفحات  -

تاریخ انتشار 2012