MedVault: Ensuring Security and Privacy for Medical Data Mustaque Ahamad, Douglas Blough, Ling Liu, David Bauer, Apurva Mohan, Daisuke Mashima, Bhuvan.

Slides:



Advertisements
Similar presentations
An Alternative to Short Lived Certificates By Vipul Goyal Department of Computer Science & Engineering Institute of Technology Banaras Hindu University.
Advertisements

Identifying and Responding to Security Incidents in the Law Firm
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Chapter 14 – Authentication Applications
© 2013 Marcin Nagy & N. Asokan & Jörg Ott 1 PeerShare: A System for Secure Distribution of Sensitive Data among Social Contacts Marcin Nagy, N. Asokan,
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
User-centric Handling of Identity Agent Compromise Daisuke Mashima Dr. Mustaque Ahamad Swagath Kannan College of Computing Georgia Institute of Technology.
1 Programa de Engenharia Elétrica - PEE/COPPE/UFRJ Universidade Federal do Rio de Janeiro A Review of Anomalies Detection Schemes for Smart Grids Andrés.
1 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair March 8, © Ravi Sandhu World-Leading Research.
Mathur, N-1 CSE 5810 CSE5810: Patient Data and Medical Data Privacy Nitish Narain Mathur nnm12001 Department of Computer Science & Engineering University.
Functional component terminology - thoughts C. Tilton.
A responsibility based model EDG CA Managers Meeting June 13, 2003.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Gaurav Lahoti University of Illinois at Urbana-Champaign, IL, USA Daisuke Mashima Wei-Peng Chen Fujitsu Laboratories of America Inc., USA Customer-centric.
Grid Security. Typical Grid Scenario Users Resources.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Figure 1: SDR / MExE Download Framework SDR Framework Network Server Gateway MExE Download + Verification Using MExE Repository (Java sandbox) MExE Applet.
EUropean Best Information through Regional Outcomes in Diabetes Privacy and Disease Registries Technical Aspects Peter Beck JOANNEUM RESEARCH, Austria.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Edward Tsai – CS 239 – Spring 2003 Strong Security for Active Networks CS 239 – Network Security Edward Tsai Tuesday, May 13, 2003.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 10 04/18/2011 Security and Privacy in Cloud Computing.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
DATA SECURITY AND PRIVACY IN WIRELESS BODY AREA NETWORKS MING LI AND WENJING LOU, WORCESTER POLYTECHNIC INSTITUTE KUI REN, ILLINOIS INSTITUTE OF TECHNOLOGY.
Cloud Usability Framework
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Key Management in Cryptography
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Authorization architecture sketches draft-selander-core-access-control-02 draft-gerdes-core-dcaf-authorize-02 draft-seitz-ace-design-considerations-00.
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
Towards A User-Centric Identity-Usage Monitoring System - ICIMP Daisuke Mashima and Mustaque Ahamad College of Computing Georgia Institute of Technology.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
Sanzi-1 CSE5 810 CSE5810: Intro to Biomedical Informatics Dynamically Generated Adaptive Credentials for Health Information Exchange Eugene Sanzi.
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Using Identity Credential Usage Logs to Detect Anomalous Service Accesses Daisuke Mashima Dr. Mustaque Ahamad College of Computing Georgia Institute of.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Health Care Information Systems Research in CERCS Doug Blough.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Policy-based Dynamic Authorization Framework for Sharing Medical Data Apurva Mohan and Douglas M. Blough, Georgia Institute of Technology Andrew Post,
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Enhancing Security and Privacy in Online Social Networks Sonia Jahid University of Illinois at Urbana-Champaign PhD Forum.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Academic Year 2014 Spring Academic Year 2014 Spring.
SACRED REQUIREMENTS DOCUMENT Stephen Farrell, Baltimore Alfred Arsenault, Diversinet.
1 Grid School Module 4: Grid Security. 2 Typical Grid Scenario Users Resources.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Presented by Edith Ngai MPhil Term 3 Presentation
Trust Profiling for Adaptive Trust Negotiation
Grid Security.
Secure Software Confidentiality Integrity Data Security Authentication
Module 8: Securing Network Traffic by Using IPSec and Certificates
Security in Networking
NAAS 2.0 Features and Enhancements
A Framework of Remote Biometric Authentication on the Open Network
Module 8: Securing Network Traffic by Using IPSec and Certificates
IBM GTS Storage Security and Compliance overview.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Presentation transcript:

MedVault: Ensuring Security and Privacy for Medical Data Mustaque Ahamad, Douglas Blough, Ling Liu, David Bauer, Apurva Mohan, Daisuke Mashima, Bhuvan Bamba, Balaji Palanisamy, Ramkumar Krishnan, Italo Dacosta

Overall Goal To develop new techniques for the storage, maintenance, and control of sensitive data that permit open sharing among a wide variety of legitimate users while protecting the data against unauthorized use and disclosure. Key Research Contributions Source-verifiability of medical data. Privacy-conscious data sharing. Attribute-based authorization to access EMR. Monitoring EMR data release and usage.

Source Verifiable PHR Repository Attribute Providers Request, Attributes Fetch Records Evaluate Policy Requester’s Attributes Patient’s Policy Decision Fetch Attributes Request, Attribute ListDecision Attribute-based policy Engine EMR Sources uploading Data Hospital Lab Personal Devices Patient’s Agent Requester’s Agent Patient’s trust domain Requester

4 Minimal Disclosure Credentials Identity Provider Credential User/Owner Relying Parties Partial Credential Network Relying Parties David Bauer, Douglas M. Blough, David Cash, “Minimal information disclosure with efficiently verifiable credentials”, 2008.

5 Minimal Disclosure using Merkle Hash Trees Start with a PKI certificate Replace the flat identity in a certificate with the root hash of a Merkle hash tree of claims H(L,R)‏ H(C)‏ Claim Root H(L,R)‏ H(C)‏ Claim H(L,R)‏ H(C)‏ Claim H(L,R)‏ H(C)‏ Claim H(L,R)‏

Patient’s Policy PHR Repository Chronic Conditions Prescriptions Others Patient’s Agent

Examples of policies on viewing patient’s record 1.A doctor can see the whole record 2.An EMT that has been dispatched to an incident involving a patient can see a subset of the patient’s record 3.Any EMT within 1 mile of the incident can see a subset of the record

Apurva Mohan, David Bauer, Douglas M. Blough, Mustaque Ahamad, Bhuvan Bamba, Ramkumar Krishnan, Ling Liu, Daisuke Mashima, Balaji Palanisamy, “ A Patient-centric, Attribute-based, Source- verifiable Framework for Health Record Sharing ”, Technical Report No. GIT-CERCS-09-11,

Protecting E-healthcare Client Devices against Malware and Physical Theft (Position Paper to appear at USENIX HealthSec ’ 10) Daisuke Mashima, Abhinav Srivastava, Jonathon Giffin, Mutaque Ahamad Georgia Institute of Technology

Typical Architecture EMR Request EMR User Authentication Access control Access control/authentication at EMR repositories is often insufficient. –What if client devices are compromised?

Threats against Client Devices Malware –Compromise of identity credentials Key Loggers, etc. –Disclosure of sensitive medical data Botnets, etc. Physical theft of devices –Misuse of devices to abuse e-healthcare system

Approach Establishing a trusted domain on client devices by using virtualization technologies –Secure execution environment –Secure storage –Other security features that are tamer-resistant Eliminating a single point of attack –Threshold signature scheme –Augmentation by introducing “ Authority ” and “ Online Monitoring System ”

System Overview

(Brief) Security Analysis Compromise of User VM by Malware –Credentials and module integrity are protected. –Tamper-resistant FW prevents information disclosure. Physical Theft –Compromised device can not initiate a valid request without involving the monitoring agent. –Revocation can be done by updating key shares on the monitoring system and authority

Thank you very much. Reference –MedVault Project Douglas Blough et al. –VM Wall “ Tamper-resistant, Application-aware Blocking of Malicious Network Connections ” Srivastava et al., RAID 2008 –User-centric Identity-usage Monitoring System “ User-centric Handling of Identity Agent Compromise ” Mashima et al., ESORICS 2009