An Implementation of Event and Filter Confidentiality in Pub/Sub Systems and its Application to e-Health

被引:4
|
作者
Ion, Mihaela [1 ]
Russello, Giovanni [1 ]
Crispo, Bruno [2 ]
机构
[1] CREATE NET Int Res Ctr, Via Cascata 56D, I-38123 Trento, Italy
[2] Univ Trento, Dept Informat Engn & Comp Sci, Trento, Italy
关键词
confidentiality; publish/subscribe; attribute-based encryption; encrypted search; e-Health;
D O I
10.1145/1866307.1866401
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The publish/subscribe model offers a loosely-coupled communication paradigm where applications interact indirectly and asynchronously. Publisher applications generate events that are forwarded to subscriber applications by a network of brokers. Subscribers register by specifying filters that brokers match against events as part of the routing process. Brokers might be deployed on untrusted servers where malicious entities can get access to events and filters. Supporting confidentiality of events and filters in this setting is still an open challenge. First of all, it is desirable that publishers and subscribers do not share secret keys, such a requirement being against the loose-coupling of the model. Second, brokers need to route events by matching encrypted events against encrypted filters. This should be possible even with very complex filters. Existing solutions do not fully address these issues. This work describes the implementation of a novel schema that supports (i) confidentiality for events and filters; (ii) filters that express very complex constraints on events even if brokers are not able to access any information on both events and filters; (iii) and finally, does not require publishers and subscribers to share keys. We then describe an e-Health application scenario for monitoring patients with chronic diseases and show how our encryption schema can be used to provide confidentiality of the patients' personal and medical data, and control who can receive the patients' data and under which conditions.
引用
收藏
页码:696 / 698
页数:3
相关论文
共 50 条
  • [21] Innovative Concept of Application of Electronic Modeling in Building e-Health Systems
    Manukova, Aneliya
    Sokolov, Tsvetan
    Marinov, Matey
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2022, 11 (03): : 1149 - 1153
  • [22] Application and Effectiveness of Ontology on E-Health
    Garshasbi, Masoud
    Asosheh, Abbas
    Asadi, Hassan
    2014 7TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2014, : 544 - 549
  • [23] Containerized backend for e-health application
    Toader, Cosmin Gabriel
    Popescu, Nirvana
    2018 IEEE 16TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2018), 2018, : 74 - 80
  • [24] Modeling Blockchain E-health Systems
    Coutinho, Emanuel F.
    Neto, Mauricio M.
    Abreu, Antonio Welligton
    Moreira, Leonardo O.
    Bezerra, Carla I. M.
    Paillard, Gabriel
    de Souza, Jose Neuman
    PROCEEDINGS OF THE 10TH EURO-AMERICAN CONFERENCE ON TELEMATICS AND INFORMATION SYSTEMS (EATIS 2020), 2020,
  • [25] Trust and Reputation in e-Health Systems
    Alboaie, L.
    Buraga, S. C.
    INTERNATIONAL CONFERENCE ON ADVANCEMENTS OF MEDICINE AND HEALTH CARE THROUGH TECHNOLOGY, 2009, 26 : 43 - 48
  • [26] Wearable systems for e-health and wellbeing
    Cola, Guglielmo
    Vecchio, Alessio
    PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (02) : 225 - 225
  • [27] E-HEALTH: FROM SENSORS TO SYSTEMS
    De Micheli, Giovanni
    2015 TRANSDUCERS - 2015 18TH INTERNATIONAL CONFERENCE ON SOLID-STATE SENSORS, ACTUATORS AND MICROSYSTEMS (TRANSDUCERS), 2015, : 3 - 6
  • [28] E-Health Systems in Digital Environments
    Hummelholm, Aarne
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 641 - 649
  • [29] Wearable systems for e-health and wellbeing
    Guglielmo Cola
    Alessio Vecchio
    Personal and Ubiquitous Computing, 2018, 22 : 225 - 225
  • [30] An authentication framework for e-Health systems
    Al-Nayadi, Fahed
    Abawajy, Jemal H.
    2007 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY, VOLS 1-3, 2007, : 1159 - 1163