Formal Analysis of an E-Health Protocol

08/25/2018
by   Naipeng Dong, et al.
0

Given the sensitive nature of health data, security and privacy in e-health systems is of prime importance. It is crucial that an e-health system must ensure that users remain private - even if they are bribed or coerced to reveal themselves, or others: a pharmaceutical company could, for example, bribe a pharmacist to reveal information which breaks a doctor's privacy. In this paper, we first identify and formalise several new but important privacy properties on enforcing doctor privacy. Then we analyse the security and privacy of a complicated and practical e-health protocol (DLV08). Our analysis uncovers ambiguities in the protocol, and shows to what extent these new privacy properties as well as other security properties (such as secrecy and authentication) and privacy properties (such as anonymity and untraceability) are satisfied by the protocol. Finally, we address the found ambiguities which result in both security and privacy flaws, and propose suggestions for fixing them.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/13/2022

On Post-Quantum Perfect Forward Secrecy in 6G

The standardized Authentication and Key Agreement protocol for 5G networ...
research
05/28/2021

A Holistic Approach to Enhanced Security and Privacy in Digital Health Passports

As governments around the world decide to deploy digital health passport...
research
09/06/2023

Provably Unlinkable Smart Card-based Payments

The most prevalent smart card-based payment method, EMV, currently offer...
research
08/16/2023

Privacy at Risk: Exploiting Similarities in Health Data for Identity Inference

Smartwatches enable the efficient collection of health data that can be ...
research
10/03/2019

On the security and privacy of Interac e-Transfers

Nowadays, the Interac e-Transfer is one of the most important remote pay...
research
05/23/2017

Learning to Succeed while Teaching to Fail: Privacy in Closed Machine Learning Systems

Security, privacy, and fairness have become critical in the era of data ...
research
09/08/2022

Security Analysis of the EDHOC protocol

Ephemeral Diffie-Hellman Over COSE (EDHOC) aims at being a very compact ...

Please sign up or login with your details

Forgot password? Click here to reset