Papers
Topics
Authors
Recent
Search
2000 character limit reached

Self-Sovereign Identity for Consented and Content-Based Access to Medical Records using Blockchain

Published 31 Jul 2024 in cs.CR and cs.ET | (2407.21559v1)

Abstract: Electronic Health Records (EHRs) and Medical Data are classified as personal data in every privacy law, meaning that any related service that includes processing such data must come with full security, confidentiality, privacy and accountability. Solutions for health data management, as in storing it, sharing and processing it, are emerging quickly and were significantly boosted by the Covid-19 pandemic that created a need to move things online. EHRs makes a crucial part of digital identity data, and the same digital identity trends -- as in self sovereign identity powered by decentralized ledger technologies like Blockchain, are being researched or implemented in contexts managing digital interactions between health facilities, patients and health professionals. In this paper, we propose a blockchain-based solution enabling secure exchange of EHRs between different parties powered by a self-sovereign identity (SSI) wallet and decentralized identifiers. We also make use of a consortium IPFS network for off-chain storage and attribute-based encryption (ABE) to ensure data confidentiality and integrity. Through our solution, we grant users full control over their medical data, and enable them to securely share it in total confidentiality over secure communication channels between user wallets using encryption. We also use DIDs for better user privacy and limit any possible correlations or identification by using pairwise DIDs. Overall, combining this set of technologies guarantees secure exchange of EHRs, secure storage and management along with by-design features inherited from the technological stack.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (8)
  1. Hipaa Healthcare Data Breach Report; 2022. [Online; accessed May 2022]. https://www.hipaajournal.com/january-2022-healthcare-data-breach-report/.
  2. The Path to Self-Sovereign Identity. [Online; accessed May 2022]. http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html.
  3. The Web of Trust Github. Online; accessed May 2022]. https://github.com/WebOfTrustInfo/self-sovereign-identity.
  4. Pairwise DIDs. [Online; accessed September 2022] https://identity.foundation/peer-did-method-spec/.
  5. SSI meetups, webinar presentation by Drummond Reed and Markus Sabadello (2020). [Online; accessed September 2022]. https://ssimeetup.org/decentralized-identifiers-dids-fundamentals-identitybook-info-drummond-reed-markus-sabadello-webinar-46/.
  6. Mogos G. Ciphertext-Policy Attribute-Based Encryption using Quantum Multilevel Secret Sharing Scheme. Journal of Computer Science 2018.
  7. Assessment report on cryptographic technologies, protocols and mechanisms; 2022. [Online; accessed May 2022]. https://ec.europa.eu/research/participants/documents/downloadPublic?documentIds=080166e5b1649a9f&appId=PPGMS.
  8. IPFS Documentation. [Online; accessed May 2022]. https://docs.ipfs.io/.
Citations (3)

Summary

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 1 tweet with 0 likes about this paper.