Skip to main content

Secure Cross-Border Exchange of Health Related Data: The KONFIDO Approach

  • Conference paper
  • First Online:
Internet and Distributed Computing Systems (IDCS 2019)

Abstract

This paper sets up the scene of the KONFIDO project in a clear way. In particular, it: (i) defines KONFIDO objectives and draws KONFIDO boundaries; (ii) identifies KONFIDO users and beneficiaries; (iii) describes the environment where KONFIDO is embedded; (iv) provides a bird’s eye view of the KONFIDO technologies and how they will be deployed in the pilot studies of the project; and (v) presents the approach that the KONFIDO consortium will take to prove that the proposed solutions work. KONFIDO addresses one of the top three priorities of the European Commission regarding the digital transformation of health and care in the Digital Single Market, i.e. citizens’ secure access to their health data, also across borders. To make sure that KONFIDO has a high-impact, its results are exposed to the wide public by developing three substantial pilots in three distinct European countries (namely Denmark, Italy, and Spain).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://ec.europa.eu/inea/en/connecting-europe-facility/cef-telecom/apply-funding/2017-cef-telecom-call-ehealth-cef-tc-2017-2.

  2. 2.

    As an example, for demonstration purposed it might be irrelevant if the pilots run on an infrastructure that spans multiple countries or if they are deployed on a more compact – yet fully fledged – distributed setup.

References

  1. European Commission: Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions on enabling the digital transformation of health and care in the Digital Single Market; empowering citizens and building a healthier society, Brussels, 25.4.2018 COM (2018) 233 final. http://ec.europa.eu/newsroom/dae/document.cfm?doc_id=51628

  2. Theodouli, A., Arakliotis, S., Moschou, K., Votis, K., Tzovaras, D.: On the design of a Blockchain-based system to facilitate healthcare data sharing. In: Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 1374–1379 (2018)

    Google Scholar 

  3. Mesaritakis, C., et al.: Physical unclonable function based on a multi-mode optical waveguide. Sci. Rep. 8(1), 9653 (2018). https://doi.org/10.1038/s41598-018-28008-6

    Article  Google Scholar 

  4. Carpov, S., Tortech, T.: Secure top most significant genome variants search: iDASH 2017 competition. BMC Med. Genomics 11(Suppl 4), 82 (2018). https://doi.org/10.1186/s12920-018-0399-x

    Article  Google Scholar 

  5. Coppolino, L., D’Antonio, S., Mazzeo, G., Romano, L., Sgaglione, L.: Exploiting new CPU extensions for secure exchange of eHealth data at the EU level. In: 14th European Dependable Computing Conference (EDCC2018) (2018). https://doi.org/10.1109/EDCC.2018.00015

  6. Natsiavas, P., et al.: Comprehensive user requirements engineering methodology for secure and interoperable health data exchange. BMC Med. Inform. Decis. Mak. 18(1), 85 (2018). https://doi.org/10.1186/s12911-018-0664-0

    Article  Google Scholar 

  7. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance) ELI. http://data.europa.eu/eli/reg/2016/679/2016-05-04

  8. Staffa, M., et al.: An OpenNCP-based solution for secure ehealth data exchange. J. Netw. Comput. Appl. 116, 65–85 (2018). https://doi.org/10.1016/j.jnca.2018.05.012. ISSN 1084-8045

    Article  Google Scholar 

  9. Gelenbe, E., et al.: Security in Computer and Information Sciences. First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26–27, 2018, Revised Selected Papers. Lecture Notes, Vol. CCIS 821, Springer, Berlin (2018). https://link.springer.com/content/pdf/10.1007%2F978-3-319-95189-8.pdf

  10. http://www.hl7.org/implement/standards/product_brief.cfm?product_id=185

  11. Coppolino, L., D’Antonio, S., Mazzeo, G., Romano, L.: A comparative analysis of emerging approaches for securing java software with Intel SGX. Future Gener. Comput. Syst. 97, 620–633 (2019). https://doi.org/10.1016/j.future.2019.03.018. ISSN 0167-739X

    Article  Google Scholar 

Download references

Acknowledgements

The authors are grateful to the following people, for their valuable contributions to this paper: Salvatore D’Antonio and Giovanni Mazzeo (CINI), Pantelis Natsiavas (CERTH), Jesper Soederberg Knudsen (MEDCOM).

The research leading to these results has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 727528 (KONFIDO - Secure and Trusted Paradigm for Interoperable eHealth Services). This paper reflects only the authors’ views and the Commission is not liable for any use that may be made of the information contained therein.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sotiris Diamantopoulos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Diamantopoulos, S. et al. (2019). Secure Cross-Border Exchange of Health Related Data: The KONFIDO Approach. In: Montella, R., Ciaramella, A., Fortino, G., Guerrieri, A., Liotta, A. (eds) Internet and Distributed Computing Systems . IDCS 2019. Lecture Notes in Computer Science(), vol 11874. Springer, Cham. https://doi.org/10.1007/978-3-030-34914-1_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34914-1_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34913-4

  • Online ISBN: 978-3-030-34914-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics