A mechanism for privacy preserving in healthcare organizations

As use of the internet has become wide spread, many good effects are seen but the adverse functions are also found. One of these adverse functions is the unnecessary personal information exposure. This issue may be a significant problem because there is the potential for so many people to see the information if the information is disclosed by mistake by its collector such as internet service provider. Information can also be disclosed by the person who holds a superior role in the system, namely, the system administrator. Internet users have paid special attention to this issue caused by the fact that many of the operations and transactions that they carry out through the internet can be easily recorded and collected. Thus, identity disintegration has become a desirable feature to be implemented in a database management system. In this paper, we propose an identity disintegration mechanism that is intended for use in the healthcare field.

[1]  S. F. Al-Janabi,et al.  Development of Certificate Authority services for web applications , 2012, 2012 International Conference on Future Communication Networks.

[2]  Ray Hunt,et al.  PKI and digital certification infrastructure , 2001, Proceedings. Ninth IEEE International Conference on Networks, ICON 2001..

[3]  Amit Sahai,et al.  Pseudonym Systems , 1999, Selected Areas in Cryptography.

[4]  Suranjan Choudhury,et al.  Public Key Infrastructure Implementation and Design , 2002 .

[5]  Lidong Chen Access with Pseudonyms , 1995, Cryptography: Policy and Algorithms.

[6]  Yun-kyung Lee,et al.  Anonymous Authentication System Using Group Signature , 2009, 2009 International Conference on Complex, Intelligent and Software Intensive Systems.

[7]  David Chaum,et al.  A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations , 1986, CRYPTO.

[8]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[9]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[10]  Ivan Damgård,et al.  Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals , 1988, CRYPTO.