Security and Privacy Requirements for Electronic Consent

Stef Verreydt, Koen Yskout, W. Joosen
{"title":"Security and Privacy Requirements for Electronic Consent","authors":"Stef Verreydt, Koen Yskout, W. Joosen","doi":"10.1145/3433995","DOIUrl":null,"url":null,"abstract":"Electronic consent (e-consent) has the potential to solve many paper-based consent approaches. Existing approaches, however, face challenges regarding privacy and security. This literature review aims to provide an overview of privacy and security challenges and requirements proposed by papers discussing e-consent implementations, as well as the manner in which state-of-the-art solutions address them. We conducted a systematic literature search using ACM Digital Library, IEEE Xplore, and PubMed Central. We included papers providing comprehensive discussions of one or more technical aspects of e-consent systems. Thirty-one papers met our inclusion criteria. Two distinct topics were identified, the first being discussions of e-consent representations and the second being implementations of e-consent in data sharing systems. The main challenge for e-consent representations is gathering the requirements for a “valid” consent. For the implementation papers, many provided some requirements but none provided a comprehensive overview. Blockchain is identified as a solution to transparency and trust issues in traditional client-server systems, but several challenges hinder it from being applied in practice. E-consent has the potential to grant data subjects control over their data. However, there is no agreed-upon set of security and privacy requirements that must be addressed by an e-consent platform. Therefore, security- and privacy-by-design techniques should be an essential part of the development lifecycle for such a platform.","PeriodicalId":72043,"journal":{"name":"ACM transactions on computing for healthcare","volume":"2 1","pages":"1 - 24"},"PeriodicalIF":0.0000,"publicationDate":"2021-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3433995","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM transactions on computing for healthcare","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3433995","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Electronic consent (e-consent) has the potential to solve many paper-based consent approaches. Existing approaches, however, face challenges regarding privacy and security. This literature review aims to provide an overview of privacy and security challenges and requirements proposed by papers discussing e-consent implementations, as well as the manner in which state-of-the-art solutions address them. We conducted a systematic literature search using ACM Digital Library, IEEE Xplore, and PubMed Central. We included papers providing comprehensive discussions of one or more technical aspects of e-consent systems. Thirty-one papers met our inclusion criteria. Two distinct topics were identified, the first being discussions of e-consent representations and the second being implementations of e-consent in data sharing systems. The main challenge for e-consent representations is gathering the requirements for a “valid” consent. For the implementation papers, many provided some requirements but none provided a comprehensive overview. Blockchain is identified as a solution to transparency and trust issues in traditional client-server systems, but several challenges hinder it from being applied in practice. E-consent has the potential to grant data subjects control over their data. However, there is no agreed-upon set of security and privacy requirements that must be addressed by an e-consent platform. Therefore, security- and privacy-by-design techniques should be an essential part of the development lifecycle for such a platform.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
电子同意的安全和隐私要求
电子同意(e-consent)有可能解决许多基于纸张的同意方法。然而,现有方法在隐私和安全方面面临挑战。本文献综述旨在概述讨论电子响应实现的论文提出的隐私和安全挑战和要求,以及最先进的解决方案解决这些问题的方式。我们使用ACM数字图书馆、IEEE Xplore和PubMed Central进行了系统的文献检索。我们收录了对电子响应系统的一个或多个技术方面进行全面讨论的论文。31篇论文符合我们的入选标准。确定了两个不同的主题,第一个是对电子响应表示的讨论,第二个是电子响应在数据共享系统中的实现。电子同意书的主要挑战是收集“有效”同意书的要求。关于实施文件,许多文件提出了一些要求,但没有一份提供全面的概述。区块链被认为是传统客户端-服务器系统中透明度和信任问题的解决方案,但一些挑战阻碍了它在实践中的应用。电子同意有可能授予数据主体对其数据的控制权。然而,没有一套商定的安全和隐私要求必须由电子响应平台解决。因此,设计技术的安全性和隐私性应该是此类平台开发生命周期的重要组成部分。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
10.30
自引率
0.00%
发文量
0
期刊最新文献
A method for comparing time series by untangling time-dependent and independent variations in biological processes AI-assisted Diagnosing, Monitoring, and Treatment of Mental Disorders: A Survey HEalthRecordBERT (HERBERT): leveraging transformers on electronic health records for chronic kidney disease risk stratification iScan: Detection of Colorectal Cancer From CT Scan Images Using Deep Learning A Computation Model to Estimate Interaction Intensity through Non-verbal Behavioral Cues: A Case Study of Intimate Couples under the Impact of Acute Alcohol Consumption
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1