2019
DOI: 10.21552/eplr/2019/4/5
|View full text |Cite
|
Sign up to set email alerts
|

Homomorphic Encryption: The ‘Holy Grail’ for Big Data Analytics and Legal Compliance in the Pharmaceutical and Healthcare Sector?

Abstract: The pharmaceutical and healthcare sector is a prime target for cybercriminals around the world. These cyber-attacks represent significant challenges in the context of data protection and data security. The General Data Protection Regulation (GDPR) imposes strict rules regarding the processing and analysis of personal data. In conventional approaches, data analysts request data from various sources. Then, they anonymise or pseudonymise the data using various tools and techniques. These methods often use powerfu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…This embedding process is a simple translation from the hexadecimal hash value to a numerical representation. While it is true that this mapping introduces an ordering between dimensions 10 where a distance could be…”
Section: A Distance-based ML Using Hash-combsmentioning
confidence: 99%
See 2 more Smart Citations
“…This embedding process is a simple translation from the hexadecimal hash value to a numerical representation. While it is true that this mapping introduces an ordering between dimensions 10 where a distance could be…”
Section: A Distance-based ML Using Hash-combsmentioning
confidence: 99%
“…Our work is motivated by widespread concerns that HE encryption techniques may not guarantee that encrypted personal data can be considered as anonymous data, and therefore processed outside the scope of the data protection regulations like the EU's GDPR 2 [2]. Three relevant factors must be considered when assessing the level of security of encrypted data: the strength of the encryption algorithm used, the length of the encryption key, and the security of encryption key management [10]. If an organization holds some third party's data (acting, in GDPR terms, as the data controller) in encrypted form but does not hold nor can access the decryption key in any way, it is reasonable to assume that it will not be able to access any personal information within the data [5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The rise of digitalization and new mobile technologies such as medical apps and cloud-based electronic health records have increased data security risks (Compagnucci et al, 2019). One of the primary goals of the HIPAA Security Rule is to protect individual privacy, in particular while implementing new technologies that are intended to improve the quality and efficiency of patient care.…”
Section: Protection Of Privacymentioning
confidence: 99%
“…T HE Fully Homomorphic Encryption (FHE) scheme was referred to as the "Holy Grail" of the cryptography [1]. They have the ability to perform encrypted data processing without prior decryption.…”
Section: Introductionmentioning
confidence: 99%