SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
1Sven Wohlgemuth On Privacy by Observable Delegation of Personal Data
National Institute of Informatics
Privacy in e-Health



Observing Disclosure of X-Ray Images to Third Parties by Using Digital
Watermarking



ISSI 2009

September 30th, 2009
Dr. Sven Wohlgemuth
Prof. Dr. Noboru Sonehara
Prof. Dr. Isao Echizen
National Institute of Informatics, Japan
Prof. Dr. Günter Müller
University of Freiburg, Germany
National Institute of Informatics
2
National Institute of Informatics
Scenario: Telemedicine
Dr. Sven Wohlgemuth Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
Privacy promise:
All personal data will be handled according to legislation and agreed privacy policy
between users and services.
2
National Institute of Informatics
Scenario: Telemedicine
Dr. Sven Wohlgemuth Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
?
Privacy promise:
All personal data will be handled according to legislation and agreed privacy policy
between users and services.
3Dr. Sven Wohlgemuth
National Institute of Informatics
Privacy and Business Processes
Patient
DP
d
DC
Privacy legislation:
„Privacy is the claim of individuals, groups and institutions to determine for themselves, when,
how and to what extent information about them is communicated to others.“
(Westin 1967, EU/Germany, Japan, HIPAA)
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
3Dr. Sven Wohlgemuth
National Institute of Informatics
Privacy and Business Processes
Problem: No control for disclosure of personal data
Patient
DP
d
Privacy legislation:
„Privacy is the claim of individuals, groups and institutions to determine for themselves, when,
how and to what extent information about them is communicated to others.“
(Westin 1967, EU/Germany, Japan, HIPAA)
Pretschner, A., Hilty, M., and Basin, D. 2006.
DP = Data provider
DC = Data consumer
d,d’ = Personal dataDisclosure of personal data
d, d’
d, d’
DC / DP
Services
DC / DP
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
4Dr. Sven Wohlgemuth
National Institute of Informatics
Privacy-Enhancing Technologies: State of the Art
• Anonymity (Anonymizer, Mix network)
• Identity Management 

(Liberty Alliance, Shibboleth, iManager, 

IBM idemix)
• Policy language for provisions

(P3P)
• Digital Rights Management 

(Digital Privacy Management)
• Policy languages for obligations

(IBM EPAL, NAPS)
• Sticky policies

(HP Adaptive Privacy Management
System)
DC / DP
DC / DPDP
d
Patient
d, d’ d, d’
Services
• Delegation of rights (DREISAM)
+ Audit trail by digital watermarking 

(DETECTIVE)
Collection Disclosure to 3rd Parties
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
Wohlgemuth, S., 2008
5
DP
Dr. Sven Wohlgemuth
National Institute of Informatics
DETECTIVE: Disclosure with Control
Controllable Disclosure: Authorization + enforcement by the user
(a) Authorization: Non-linkable delegation of rights (DREISAM)
(b) Enforcement: Audit trail by digital watermarking (DETECTIVE)
DC
DCDC / DP
(TTP)
Patient Services
Rights 1
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
5
DP
Dr. Sven Wohlgemuth
National Institute of Informatics
DETECTIVE: Disclosure with Control
Controllable Disclosure: Authorization + enforcement by the user
(a) Authorization: Non-linkable delegation of rights (DREISAM)
(b) Enforcement: Audit trail by digital watermarking (DETECTIVE)
DC
DCDC / DP
(TTP)
Patient Services
Rights 1
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
5
DP
Dr. Sven Wohlgemuth
National Institute of Informatics
DETECTIVE: Disclosure with Control
Controllable Disclosure: Authorization + enforcement by the user
(a) Authorization: Non-linkable delegation of rights (DREISAM)
(b) Enforcement: Audit trail by digital watermarking (DETECTIVE)
DC
DCDC / DP
(TTP)
Patient Services
d
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
5
DP
Dr. Sven Wohlgemuth
National Institute of Informatics
DETECTIVE: Disclosure with Control
Controllable Disclosure: Authorization + enforcement by the user
(a) Authorization: Non-linkable delegation of rights (DREISAM)
(b) Enforcement: Audit trail by digital watermarking (DETECTIVE)
DC
DCDC / DP
(TTP)
Patient Services
Rights 2
d
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
5
DP
Dr. Sven Wohlgemuth
National Institute of Informatics
DETECTIVE: Disclosure with Control
Controllable Disclosure: Authorization + enforcement by the user
(a) Authorization: Non-linkable delegation of rights (DREISAM)
(b) Enforcement: Audit trail by digital watermarking (DETECTIVE)
DC
DCDC / DP
(TTP)
Patient Services
d’
d
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
5
DP
Dr. Sven Wohlgemuth
National Institute of Informatics
DETECTIVE: Disclosure with Control
Controllable Disclosure: Authorization + enforcement by the user
(a) Authorization: Non-linkable delegation of rights (DREISAM)
(b) Enforcement: Audit trail by digital watermarking (DETECTIVE)
DC
DCDC / DP
(TTP)
Patient Services
d
d’
d’
d
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
6
National Institute of Informatics
DETECTIVE: Proof-of-Concept Implementation
Dr. Sven Wohlgemuth
Basic modules Use of existing modules Realizing DETECTIVE protocols
Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
Dr. Sven Wohlgemuth
2009 Postdoc scholar at NII funded by DAAD (German Academic Exchange Service)

Project: Enforcement of Privacy-Compliant Disclosure of Personal Data

Member of ISSI 2009 organizing committee
2008 Doctoral graduation at University of Freiburg, Germany (Prof. Dr. Günter Müller)

Thesis: Privacy with Delegation of Rights
2000 Diploma graduation at University of Saarbrücken, Germany (Prof. Dr. Birgit Pfitzmann, Tom Beiler)

Thesis: Key Management – Object-Oriented Design and Implementation
2006/08 Member of SICHERHEIT 2008 and ETRICS 2006 conferences’ organizing committee
2006-08 Founding Coordinator of working group “Privacy in Business Processes” of European Network of
Excellence “Future of Identity in the Information Society (FIDIS)”
2001-06 Coordinator of German research priority programme “Security in Information and Communication
Technology (SPP 1079)” funded by the German Research Foundation (DFG)
2003 doIT Software-Award 2003 by German Federal State “Baden-Württemberg” for “Usability and
Security by Identity Management”
7
National Institute of Informatics
Dr. Sven Wohlgemuth Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
National Institute of Informatics
2-1-2 Hitotsubashi, Chiyoda-ku
Tokyo 101-8430
Japan
Phone: +81 3 4212 2594
Fax: +81 3 3556 1916
E-mail: wohlgemuth@nii.ac.jp
WWW: www.nii.ac.jp

Contenu connexe

Similaire à Privacy Controls for Medical Data Sharing

Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd PartiesPrivacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd PartiesSven Wohlgemuth
 
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacyTagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacySven Wohlgemuth
 
Resilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage ControlResilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage ControlSven Wohlgemuth
 
European Journal Epractice Volume 8.6
European Journal Epractice Volume 8.6European Journal Epractice Volume 8.6
European Journal Epractice Volume 8.6ePractice.eu
 
Solutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and UsabilitySolutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and UsabilitySven Wohlgemuth
 
PersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsPersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsSven Wohlgemuth
 
Outline D
Outline DOutline D
Outline Dbutest
 
Privacy protecting fitness trackers
Privacy protecting fitness trackersPrivacy protecting fitness trackers
Privacy protecting fitness trackersiwhhu
 
A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...journalBEEI
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11DaliaCulbertson719
 
Privacy impact assessment
Privacy impact assessmentPrivacy impact assessment
Privacy impact assessmentSpringer
 
Towards Privacy by Design in Personal e-Health Systems
Towards Privacy by Design in Personal e-Health SystemsTowards Privacy by Design in Personal e-Health Systems
Towards Privacy by Design in Personal e-Health SystemsCARRE project
 
Medical Imaging: 8 Opportunities for technology entrepreneurs and investors
Medical Imaging: 8 Opportunities for technology entrepreneurs and investorsMedical Imaging: 8 Opportunities for technology entrepreneurs and investors
Medical Imaging: 8 Opportunities for technology entrepreneurs and investorsHealthstartup
 
PLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalPLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalSofie van der Meulen
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Axon Lawyers
 
Privacy concerns in a remote monitoring and social networking platform for as...
Privacy concerns in a remote monitoring and social networking platform for as...Privacy concerns in a remote monitoring and social networking platform for as...
Privacy concerns in a remote monitoring and social networking platform for as...Peter Rothenpieler
 
An itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchAn itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchMarlon Domingus
 
CINECA webinar slides: Ethical, legal and societal issues in international da...
CINECA webinar slides: Ethical, legal and societal issues in international da...CINECA webinar slides: Ethical, legal and societal issues in international da...
CINECA webinar slides: Ethical, legal and societal issues in international da...CINECAProject
 
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docxR E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docxmakdul
 

Similaire à Privacy Controls for Medical Data Sharing (20)

Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd PartiesPrivacy in Business Processes - Disclosure of Personal Data to 3rd Parties
Privacy in Business Processes - Disclosure of Personal Data to 3rd Parties
 
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacyTagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
 
Resilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage ControlResilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage Control
 
European Journal Epractice Volume 8.6
European Journal Epractice Volume 8.6European Journal Epractice Volume 8.6
European Journal Epractice Volume 8.6
 
Solutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and UsabilitySolutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and Usability
 
PersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsPersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet Applications
 
Outline D
Outline DOutline D
Outline D
 
Privacy protecting fitness trackers
Privacy protecting fitness trackersPrivacy protecting fitness trackers
Privacy protecting fitness trackers
 
A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...
 
Image data beyond radiology: new developments
Image data beyond radiology: new developmentsImage data beyond radiology: new developments
Image data beyond radiology: new developments
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
 
Privacy impact assessment
Privacy impact assessmentPrivacy impact assessment
Privacy impact assessment
 
Towards Privacy by Design in Personal e-Health Systems
Towards Privacy by Design in Personal e-Health SystemsTowards Privacy by Design in Personal e-Health Systems
Towards Privacy by Design in Personal e-Health Systems
 
Medical Imaging: 8 Opportunities for technology entrepreneurs and investors
Medical Imaging: 8 Opportunities for technology entrepreneurs and investorsMedical Imaging: 8 Opportunities for technology entrepreneurs and investors
Medical Imaging: 8 Opportunities for technology entrepreneurs and investors
 
PLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalPLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics final
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics'
 
Privacy concerns in a remote monitoring and social networking platform for as...
Privacy concerns in a remote monitoring and social networking platform for as...Privacy concerns in a remote monitoring and social networking platform for as...
Privacy concerns in a remote monitoring and social networking platform for as...
 
An itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchAn itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and research
 
CINECA webinar slides: Ethical, legal and societal issues in international da...
CINECA webinar slides: Ethical, legal and societal issues in international da...CINECA webinar slides: Ethical, legal and societal issues in international da...
CINECA webinar slides: Ethical, legal and societal issues in international da...
 
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docxR E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
 

Plus de Sven Wohlgemuth

A Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementA Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementSven Wohlgemuth
 
Competitive Compliance with Blockchain
Competitive Compliance with BlockchainCompetitive Compliance with Blockchain
Competitive Compliance with BlockchainSven Wohlgemuth
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSven Wohlgemuth
 
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 個人情報の有効活用を可能にする (Enabling effective use of personal information) 個人情報の有効活用を可能にする (Enabling effective use of personal information)
個人情報の有効活用を可能にする (Enabling effective use of personal information)Sven Wohlgemuth
 
Privacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningPrivacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningSven Wohlgemuth
 
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleEN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleSven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementSven Wohlgemuth
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...Sven Wohlgemuth
 
On Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsOn Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsSven Wohlgemuth
 
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementEN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementSven Wohlgemuth
 
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzEN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzSven Wohlgemuth
 
Privacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationPrivacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationSven Wohlgemuth
 
International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009Sven Wohlgemuth
 
Durchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenDurchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenSven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementSven Wohlgemuth
 
Privacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementPrivacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementSven Wohlgemuth
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSchlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSven Wohlgemuth
 
Resilience by Usable Security
Resilience by Usable SecurityResilience by Usable Security
Resilience by Usable SecuritySven Wohlgemuth
 
Sicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten WeltSicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten WeltSven Wohlgemuth
 

Plus de Sven Wohlgemuth (20)

A Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementA Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity Management
 
Competitive Compliance with Blockchain
Competitive Compliance with BlockchainCompetitive Compliance with Blockchain
Competitive Compliance with Blockchain
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with Blockchains
 
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 個人情報の有効活用を可能にする (Enabling effective use of personal information) 個人情報の有効活用を可能にする (Enabling effective use of personal information)
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 
Privacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningPrivacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process Mining
 
EN 6.3: 4 Kryptographie
EN 6.3: 4 KryptographieEN 6.3: 4 Kryptographie
EN 6.3: 4 Kryptographie
 
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleEN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 Sicherheitsmodelle
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
 
On Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsOn Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health Records
 
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementEN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
 
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzEN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
 
Privacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationPrivacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal Information
 
International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009
 
Durchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenDurchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in Dienstenetzen
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 
Privacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementPrivacy in Business Processes by Identity Management
Privacy in Business Processes by Identity Management
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSchlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
 
Resilience by Usable Security
Resilience by Usable SecurityResilience by Usable Security
Resilience by Usable Security
 
Sicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten WeltSicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten Welt
 

Dernier

Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfrohankumarsinghrore1
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PPRINCE C P
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticssakshisoni2385
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxAArockiyaNisha
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡anilsa9823
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)PraveenaKalaiselvan1
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfSumit Kumar yadav
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...Sérgio Sacani
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.Nitya salvi
 
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencyHire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencySheetal Arora
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxgindu3009
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINsankalpkumarsahoo174
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000Sapana Sha
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 

Dernier (20)

Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdf
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C P
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdf
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
 
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencyHire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 

Privacy Controls for Medical Data Sharing

  • 1. 1Sven Wohlgemuth On Privacy by Observable Delegation of Personal Data National Institute of Informatics Privacy in e-Health
 
 Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
 
 ISSI 2009
 September 30th, 2009 Dr. Sven Wohlgemuth Prof. Dr. Noboru Sonehara Prof. Dr. Isao Echizen National Institute of Informatics, Japan Prof. Dr. Günter Müller University of Freiburg, Germany National Institute of Informatics
  • 2. 2 National Institute of Informatics Scenario: Telemedicine Dr. Sven Wohlgemuth Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking Privacy promise: All personal data will be handled according to legislation and agreed privacy policy between users and services.
  • 3. 2 National Institute of Informatics Scenario: Telemedicine Dr. Sven Wohlgemuth Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking ? Privacy promise: All personal data will be handled according to legislation and agreed privacy policy between users and services.
  • 4. 3Dr. Sven Wohlgemuth National Institute of Informatics Privacy and Business Processes Patient DP d DC Privacy legislation: „Privacy is the claim of individuals, groups and institutions to determine for themselves, when, how and to what extent information about them is communicated to others.“ (Westin 1967, EU/Germany, Japan, HIPAA) Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
  • 5. 3Dr. Sven Wohlgemuth National Institute of Informatics Privacy and Business Processes Problem: No control for disclosure of personal data Patient DP d Privacy legislation: „Privacy is the claim of individuals, groups and institutions to determine for themselves, when, how and to what extent information about them is communicated to others.“ (Westin 1967, EU/Germany, Japan, HIPAA) Pretschner, A., Hilty, M., and Basin, D. 2006. DP = Data provider DC = Data consumer d,d’ = Personal dataDisclosure of personal data d, d’ d, d’ DC / DP Services DC / DP Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
  • 6. 4Dr. Sven Wohlgemuth National Institute of Informatics Privacy-Enhancing Technologies: State of the Art • Anonymity (Anonymizer, Mix network) • Identity Management 
 (Liberty Alliance, Shibboleth, iManager, 
 IBM idemix) • Policy language for provisions
 (P3P) • Digital Rights Management 
 (Digital Privacy Management) • Policy languages for obligations
 (IBM EPAL, NAPS) • Sticky policies
 (HP Adaptive Privacy Management System) DC / DP DC / DPDP d Patient d, d’ d, d’ Services • Delegation of rights (DREISAM) + Audit trail by digital watermarking 
 (DETECTIVE) Collection Disclosure to 3rd Parties Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking Wohlgemuth, S., 2008
  • 7. 5 DP Dr. Sven Wohlgemuth National Institute of Informatics DETECTIVE: Disclosure with Control Controllable Disclosure: Authorization + enforcement by the user (a) Authorization: Non-linkable delegation of rights (DREISAM) (b) Enforcement: Audit trail by digital watermarking (DETECTIVE) DC DCDC / DP (TTP) Patient Services Rights 1 Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
  • 8. 5 DP Dr. Sven Wohlgemuth National Institute of Informatics DETECTIVE: Disclosure with Control Controllable Disclosure: Authorization + enforcement by the user (a) Authorization: Non-linkable delegation of rights (DREISAM) (b) Enforcement: Audit trail by digital watermarking (DETECTIVE) DC DCDC / DP (TTP) Patient Services Rights 1 Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
  • 9. 5 DP Dr. Sven Wohlgemuth National Institute of Informatics DETECTIVE: Disclosure with Control Controllable Disclosure: Authorization + enforcement by the user (a) Authorization: Non-linkable delegation of rights (DREISAM) (b) Enforcement: Audit trail by digital watermarking (DETECTIVE) DC DCDC / DP (TTP) Patient Services d Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
  • 10. 5 DP Dr. Sven Wohlgemuth National Institute of Informatics DETECTIVE: Disclosure with Control Controllable Disclosure: Authorization + enforcement by the user (a) Authorization: Non-linkable delegation of rights (DREISAM) (b) Enforcement: Audit trail by digital watermarking (DETECTIVE) DC DCDC / DP (TTP) Patient Services Rights 2 d Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
  • 11. 5 DP Dr. Sven Wohlgemuth National Institute of Informatics DETECTIVE: Disclosure with Control Controllable Disclosure: Authorization + enforcement by the user (a) Authorization: Non-linkable delegation of rights (DREISAM) (b) Enforcement: Audit trail by digital watermarking (DETECTIVE) DC DCDC / DP (TTP) Patient Services d’ d Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
  • 12. 5 DP Dr. Sven Wohlgemuth National Institute of Informatics DETECTIVE: Disclosure with Control Controllable Disclosure: Authorization + enforcement by the user (a) Authorization: Non-linkable delegation of rights (DREISAM) (b) Enforcement: Audit trail by digital watermarking (DETECTIVE) DC DCDC / DP (TTP) Patient Services d d’ d’ d Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking Wohlgemuth, S., Sonehara, N., Echizen, I. and Müller, G., 2009
  • 13. 6 National Institute of Informatics DETECTIVE: Proof-of-Concept Implementation Dr. Sven Wohlgemuth Basic modules Use of existing modules Realizing DETECTIVE protocols Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking
  • 14. Dr. Sven Wohlgemuth 2009 Postdoc scholar at NII funded by DAAD (German Academic Exchange Service)
 Project: Enforcement of Privacy-Compliant Disclosure of Personal Data
 Member of ISSI 2009 organizing committee 2008 Doctoral graduation at University of Freiburg, Germany (Prof. Dr. Günter Müller)
 Thesis: Privacy with Delegation of Rights 2000 Diploma graduation at University of Saarbrücken, Germany (Prof. Dr. Birgit Pfitzmann, Tom Beiler)
 Thesis: Key Management – Object-Oriented Design and Implementation 2006/08 Member of SICHERHEIT 2008 and ETRICS 2006 conferences’ organizing committee 2006-08 Founding Coordinator of working group “Privacy in Business Processes” of European Network of Excellence “Future of Identity in the Information Society (FIDIS)” 2001-06 Coordinator of German research priority programme “Security in Information and Communication Technology (SPP 1079)” funded by the German Research Foundation (DFG) 2003 doIT Software-Award 2003 by German Federal State “Baden-Württemberg” for “Usability and Security by Identity Management” 7 National Institute of Informatics Dr. Sven Wohlgemuth Privacy in e-Health – Observing Disclosure of X-Ray Images to Third Parties by Using Digital Watermarking National Institute of Informatics 2-1-2 Hitotsubashi, Chiyoda-ku Tokyo 101-8430 Japan Phone: +81 3 4212 2594 Fax: +81 3 3556 1916 E-mail: wohlgemuth@nii.ac.jp WWW: www.nii.ac.jp