Computer Science > Cryptography and Security

Important: e-prints posted on arXiv are not peer-reviewed by arXiv; they should not be relied upon without context to guide clinical practice or health-related behavior and should not be reported in news media as established information without consulting multiple experts in the field.

[Submitted on 31 Jul 2024]

Title: Self-Sovereign Identity for Consented and Content-Based Access to Medical Records using Blockchain

View a PDF of the paper titled Self-Sovereign Identity for Consented and Content-Based Access to Medical Records using Blockchain, by Marie Tcholakian and Karolina Gorna and Maryline Laurent and Hella Kaffel Ben Ayed and Montassar Naghmouchi

Abstract: Electronic Health Records (EHRs) and Medical Data are classified as personal data in every privacy law, meaning that any related service that includes processing such data must come with full security, confidentiality, privacy and accountability. Solutions for health data management, as in storing it, sharing and processing it, are emerging quickly and were significantly boosted by the Covid-19 pandemic that created a need to move things online. EHRs makes a crucial part of digital identity data, and the same digital identity trends -- as in self sovereign identity powered by decentralized ledger technologies like Blockchain, are being researched or implemented in contexts managing digital interactions between health facilities, patients and health professionals. In this paper, we propose a blockchain-based solution enabling secure exchange of EHRs between different parties powered by a self-sovereign identity (SSI) wallet and decentralized identifiers. We also make use of a consortium IPFS network for off-chain storage and attribute-based encryption (ABE) to ensure data confidentiality and integrity. Through our solution, we grant users full control over their medical data, and enable them to securely share it in total confidentiality over secure communication channels between user wallets using encryption. We also use DIDs for better user privacy and limit any possible correlations or identification by using pairwise DIDs. Overall, combining this set of technologies guarantees secure exchange of EHRs, secure storage and management along with by-design features inherited from the technological stack.

Comments: 13 pages, 11 figures
Subjects: Cryptography and Security (cs.CR) ; Emerging Technologies (cs.ET)
Cite as: arXiv:2407.21559 [cs.CR]
(or arXiv:2407.21559v1 [cs.CR] for this version)
https://doi.org/10.48550/arXiv.2407.21559