Sh Shari ring mH mHealth Da Data a via via Na Named Da Data Ne Networking
Haitao Zhang1, Zhehao Wang2, Christopher Scherb3, Claudio Marxer3, Jeff Burke2, Lixia Zhang1, Christian Tschudin3
- 1. UCLA IRL 2. UCLA REMAP 3. University of Basel
1
Sh Shari ring mH mHealth Da Data a via via Na Named Da Data - - PowerPoint PPT Presentation
Sh Shari ring mH mHealth Da Data a via via Na Named Da Data Ne Networking Haitao Zhang 1 , Zhehao Wang 2 , Christopher Scherb 3 , Claudio Marxer 3 , Jeff Burke 2 , Lixia Zhang 1 , Christian Tschudin 3 1. UCLA IRL 2. UCLA REMAP 3.
1
2
Gartner, 2014
Consumer-facing mHealth applications. Over 13,000 available for iPhone, over 6,000 available for Android.
3
Prakash, R. Adoption of block-chain to enable the scalability and adoption of Accountable Care.
<= probably not sustainable, almost certainly not empowering if unified via one-provider-to-rule-them-all.
4
[1] D. Estrin and I. Sim. Open mHealth architecture: an engine for health care innovation. Science, 330(6005):759-760, 2010. Also, http://openmhealth.org.
5
Sim & Estrin, 2010
The data capture app
7
register User’s mobile device capture app identity manager auth manager Data storage unit (DSU) Data processing unit (DPU) sync sync Data visualization unit (DVU) Configuration website namespace mgt system config register & configure sync register register
<= Each run by potentially different organizations.
8
/org/openmhealth <user-id> <service-id>(DPU, DVU) key <version> key <version> key <version> devices <device-id> key <version> Data read fitness Physical_activity D-KEY E-KEY fitness Physical_activity D-KEY E-KEY D-KEY E-KEY <start_timestamp_hour> <start_timestamp_hour> <end_timestamp_hour> <end_timestamp_hour> FOR <consumer-id> ENCRYPTED PRIVATE KEY PUBLIC KEY DATA OBJECT time_location bout <timestamp> catalog C-KEY <segment>(opt.) DATA OBJECT <timestamp> <version> DATA OBJECT <start_timestamp_hour> <end_timestamp_hour> <E-KEY name> SYM KEY ENCRYPTED BY E-KEY time_location D-KEY E-KEY … … … … … … FOR …
9
Identify the ecosystem Trust anchor User and component identifiers health data sources cryptographic identity (trust relationship) Raw data and catalogs Access control Data types
/org/openmhealth/haitao/data/fitness/physical_activity/time_location/20160526T161300 user-id data-type prefix timestamp /org/openmhealth/haitao/data/fitness/physical_activity/time_location/catalog/20160526T160000 user-id data-type prefix timestamp catalog component
10
11
[1] Y. Yu, A. Afanasyev, D. Clark, V. Jacobson, L. Zhang, et al. Schematizing Trust in Named Data Networking. In Proceedings of the 2nd Conference on Information-Centric Networking. ACM, 2015.
12
/org/openmhealth/<user-id>/<device-id>/<app-id> /org/openmhealth/<user-id>/<device-id>/ /org/openmhealth/<user-id>/ /org/openmhealth/ signed by signed by signed by /org/openmhealth/<user-id>/<data-type>/<timestamp> signed by
transmitted
components access to owner’s data by properly naming, signing, and encrypting keys
13
[1] Y. Yu, A. Afanasyev, and L. Zhang, “Name-Based Access Control,” Named Data Networking Project, Technical Report NDN-0034, October 2015.
14
15
Authorization manager (on behalf of users) Capture app (data producer) DVU or DPU (data consumer) KEK KDK Public Key Private Key Data MAU C-KEY Data KDK C-KEY Consumption credential (KEK/KDK) provides one level of indirection
16
[1] M. Sifalakis, B. Kohler, C. Scherb, and C. Tschudin. An Information Centric Network for Computing the Distribution of Computations. In ACM ICN '14, pages 137-146, 2014.
17
!
/func/code
" # !
DPU DSU
Execution Environment
#
Complex Expression (Interest) KDK Secured Result (Data)
"
KEK
!
Input Data Functions NAC
from relying on underlying transport layers for security
achieve more choice.
retrieval
data and key name structure to express trust relationships
defined granularity
distributed data processing
18
19
zhtaoxiang@gmail.com
jburke@ucla.edu
20