Privacy-preserving Quantified Self: Secure Sharing and Processing of Encrypted Small Data

Hossein Shafagh, Anwar Hithnawi
{"title":"Privacy-preserving Quantified Self: Secure Sharing and Processing of Encrypted Small Data","authors":"Hossein Shafagh, Anwar Hithnawi","doi":"10.1145/3097620.3097625","DOIUrl":null,"url":null,"abstract":"The emergence of a plethora of wearables and sensing technologies has enabled non-intrusive digitization of our daily physical activities. Emerging applications utilize such data to make inferences about our physiological and health states, provide health diagnosis, and contribute to wellbeing improvements. The common approach for such applications is to collect data, either using mobile applications or special hardware, e.g., wearables, and store them on a third party storage provider. This results in many unconnected data silos of self-quantification data. Researchers and industry, advocate for a common personal storage space, to conquer the myriad of small chunks of data, deemed to be lost/forgotten in the long term. The benefits of such co-located personal data are tremendous, specifically with regards to personalized medicine, treatment, and health care. However, the centralized storage of data exacerbates the privacy and security concerns that the IoT ecosystem is facing today. In this position paper, we advocate the necessity of privacy and security guarantees for the paradigm of co-located storage of personal health data. We envision two core security functionalities: true end-to-end encryption, such that only encrypted data is stored in the cloud and secure sharing of encrypted data, without disclosing data owner's secret keys. We discuss the challenges in adopting such an end-to-end encryption paradigm while preserving the cloud's basic processing functionalities over encrypted data and how to cryptographically enforce access control.","PeriodicalId":109303,"journal":{"name":"Proceedings of the Workshop on Mobility in the Evolving Internet Architecture","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Workshop on Mobility in the Evolving Internet Architecture","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3097620.3097625","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

The emergence of a plethora of wearables and sensing technologies has enabled non-intrusive digitization of our daily physical activities. Emerging applications utilize such data to make inferences about our physiological and health states, provide health diagnosis, and contribute to wellbeing improvements. The common approach for such applications is to collect data, either using mobile applications or special hardware, e.g., wearables, and store them on a third party storage provider. This results in many unconnected data silos of self-quantification data. Researchers and industry, advocate for a common personal storage space, to conquer the myriad of small chunks of data, deemed to be lost/forgotten in the long term. The benefits of such co-located personal data are tremendous, specifically with regards to personalized medicine, treatment, and health care. However, the centralized storage of data exacerbates the privacy and security concerns that the IoT ecosystem is facing today. In this position paper, we advocate the necessity of privacy and security guarantees for the paradigm of co-located storage of personal health data. We envision two core security functionalities: true end-to-end encryption, such that only encrypted data is stored in the cloud and secure sharing of encrypted data, without disclosing data owner's secret keys. We discuss the challenges in adopting such an end-to-end encryption paradigm while preserving the cloud's basic processing functionalities over encrypted data and how to cryptographically enforce access control.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
保护隐私的量化自我:加密小数据的安全共享和处理
大量可穿戴设备和传感技术的出现,使我们日常身体活动的非侵入式数字化成为可能。新兴的应用程序利用这些数据来推断我们的生理和健康状态,提供健康诊断,并有助于改善幸福感。此类应用程序的常见方法是使用移动应用程序或特殊硬件(例如可穿戴设备)收集数据,并将其存储在第三方存储提供商上。这导致了许多自我量化数据的互不关联的数据孤岛。研究人员和业界都提倡建立一个通用的个人存储空间,以克服无数被认为长期丢失或遗忘的小块数据。这种共同定位的个人数据的好处是巨大的,特别是在个性化医疗、治疗和卫生保健方面。然而,数据的集中存储加剧了物联网生态系统目前面临的隐私和安全问题。在这篇立场文件中,我们提倡对个人健康数据在同一地点存储的范例进行隐私和安全保障的必要性。我们设想了两个核心安全功能:真正的端到端加密,这样只有加密的数据才会存储在云中;加密数据的安全共享,而不会泄露数据所有者的密钥。我们将讨论采用这种端到端加密范式所面临的挑战,同时保留云对加密数据的基本处理功能,以及如何以加密方式实施访问控制。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
DICE: Dynamic Multi-RAT Selection in the ICN-enabled Wireless Edge The Named-Object Abstraction for Realizing Advanced Mobility Services in the Future Internet A NEAT Approach to Mobile Communication Popularity-aware Intra-domain Mobility Management Privacy-preserving Quantified Self: Secure Sharing and Processing of Encrypted Small Data
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1