Hurdles for Genomic Data Usage Management

We are pleased to share an upcoming THaW paper to appear next month at  IEEE Workshop on Data Usage Management, a workshop colocated with the IEEE Symposium on Security & Privacy in May 2014.

Abstract: Our genome determines our appearance, gender, diseases, reaction to drugs, and much more. It not only contains information about us but also about our relatives, past generations, and future generations. This creates many policy and technology challenges to protect privacy and manage usage of genomic data. In this paper, we identify various features of genomic data that make its usage management very challenging and different from other types of data. We also describe some ideas about potential solutions and propose some recommendations for the usage of genomic data. [pdf]

ZEBRA: Zero-Effort Bilateral Recurring Authentication

The THaW team is pleased to announce the third of its three papers to be presented at the IEEE Symposium on Security & Privacy (aka ‘Oakland’) in May.

ZEBRA: Zero-Effort Bilateral Recurring Authentication
Shrirang Mare, Andrés Molina-Markham, Cory Cornelius, Ronald Peterson, and David Kotz

Abstract: Common authentication methods based on passwords, tokens, or fingerprints perform one-time authentication and rely on users to log out from the computer terminal when they leave. Users often do not log out, however, which is a security risk. The most common solution, inactivity timeouts, inevitably fail security (too long a timeout) or usability (too short a timeout) goals. One solution is to authenticate users continuously while they are using the terminal and automatically log them out when they leave. Several solutions are based on user proximity, but these are not sufficient: they only confirm whether the user is nearby but not whether the user is actually using the terminal. Proposed solutions based on behavioral biometric authentication (e.g., keystroke dynamics) may not be reliable, as a recent study suggests.

To address this problem we propose ZEBRA. In ZEBRA, a user wears a bracelet (with a built-in accelerometer, gyroscope, and radio) on her dominant wrist. When the user interacts with a computer terminal, the bracelet records the wrist movement, processes it, and sends it to the terminal. The terminal compares the wrist movement with the inputs it receives from the user (via keyboard and mouse), and confirms the continued presence of the user only if they correlate. Because the bracelet is on the same hand that provides inputs to the terminal, the accelerometer and gyroscope data and input events received by the terminal should correlate because their source is the same – the user’s hand movement. In our experiments ZEBRA performed continuous authentication with 85% accuracy in verifying the correct user and identified all adversaries within 11 s. For a different threshold that trades security for usability, ZEBRA correctly verified 90% of users and identified all adversaries within 50 s.

Note: since the time this paper was published we have learned of a relevant trademark on the name “Zebra”. Thus, we have renamed our approach “BRACE” and will use that name in future publications.

[view pdf]

Dynamic Searchable Encryption via Blind Storage

The THaW team is pleased to announce the second of its three papers to be presented at the IEEE Symposium on Security & Privacy (aka ‘Oakland’) in May.

Dynamic Searchable Encryption via Blind Storage
Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter

Abstract: Dynamic Searchable Symmetric Encryption allows a client to store a dynamic collection of encrypted documents with a server, and later quickly carry out keyword searches on these encrypted documents, while revealing minimal information to the server. In this paper we present a new dynamic SSE scheme that is simpler and more efficient than existing schemes while revealing less information to the server than prior schemes, achieving fully adaptive security against honest-but-curious servers.

We implemented a prototype of our scheme and demonstrated its efficiency on datasets from prior work. Apart from its concrete efficiency, our scheme is also simpler: in particular, it does not require the server to support any operation other than upload and download of data. Thus the server in our scheme can be based solely on a cloud storage service, rather than a cloud computation service as well, as in prior work.

In building our dynamic SSE scheme, we introduce a new primitive called Blind Storage, which allows a client to store a set of files on a remote server in such a way that the server does not learn how many files are stored, or the lengths of the individual files; as each file is retrieved, the server learns about its existence(and can notice the same file being downloaded subsequently), but the file’s name and contents are not revealed. This is a primitive with several applications other than SSE, and is of independent interest.

[view pdf]

SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks

The THaW team is pleased to announce the first of its three papers to be presented at the IEEE Symposium on Security & Privacy (aka ‘Oakland’) in May.

SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks
Michael Rushanan, Aviel D. Rubin, Denis Foo Kune, Colleen M. Swanson

Abstract: Balancing security, privacy, safety, and utility is a necessity in the health care domain, in which implantable medical devices (IMDs) and body area networks (BANs) have made it possible to continuously and automatically manage and treat a number of health conditions, ranging from cardiac arrhythmia to Parkinson’s disease. In this work, we provide a clear definition and overview of the problem space, categorizing relevant research results in academia with respect to threats and identifying trends and directions for future research. We identify three broad research categories aimed at ensuring the security and privacy of the telemetry interface, software, and physiological sensing interface layers. We find that while the security of the telemetry interface has received much attention in academia, both the threat of software exploitation and the sensor interface layer deserve further attention.

[view pdf]

Postdoc position available

Professor David Kotz is looking for a sharp graduate to join his team at Dartmouth as a postdoc in summer 2014.

Dartmouth shield logoThe postdoc will be involved in his research on security & privacy for healthcare information systems; in particular, his group is working on secure methods for use of mobile computing and wearable sensors in the context of healthcare (mHealth). As such, the postdoc would join an inter-disciplinary team working on multiple funded projects, primarily Amulet with some involvement in the Trustworthy Health & Wellness (THaW) project. The team collaborates with colleagues in the engineering and medical schools, and with several other universities.

Continue reading

THaW Testifies in Annapolis

THaW researchers testified in a Maryland House of Delegates hearing on security the Maryland Healthcare Exchange. We are working with Maryland Delegate Kathy Szeliga to help draft  bill, House Bill 1306, to apply security measures to the Maryland Healthcare Exchange’s website. Hopkins Senior Security Engineer, Joe Carrigan’s testimony is online and can be viewed here (The discussion on HB 1306 starts at 1:30:18).

Kevin Fu – one of “Five MedTech Influencers You Should Know“

This week, MDDI News profiled THaW PI Kevin Fu as one of its “Five MedTech Influencers You Should Know“, and included this University of Michigan video about his lab’s work.

THaW kick-off meeting

THaW participants (and a few invited guests) at Johns Hopkins University, December 2013

THaW participants (and a few invited guests) at Johns Hopkins University, December 2013

The THaW research group held its first all-hands meeting at the Johns Hopkins University on December 11, 2013. About thirty researchers from five universities and affiliated medical centers were in attendance, along with several experts from the field of healthcare information technology. It was a great opportunity for the team to build rapport and begin collaborative projects.  Many thanks to Avi Rubin and Wendy Phillips and their team for hosting us.

Kotz appointed to GAO’s Health IT Policy Committee

The Comptroller General of the Government Accountability Office (GAO) announced the appointment of THaW PI David Kotz to the organization’s Health IT (HIT) Policy Committee. In his announcement, Gene Dodaro noted, “In developing policy for health information technology, it’s important to take into account expertise related to privacy and security and to health care research as well as the views of health care workers who are the users of HIT.”

The Comptroller General is responsible for appointing 13 of the 20 members of the HIT Policy Committee. David will fill the role of expert in privacy and security.

Read more in the full GAO press release and an article on HispanicBusiness.com

Amulet project launched

We are pleased to announce that NSF CNS has awarded three years of funding for the Computational Jewelry for Mobile Health project, which complements many of the projects in the Trustworthy Health and Wellness program and involves several of the same Dartmouth researchers.

The project’s vision is that computational jewelry, in a form like a bracelet or pendant, will provide the properties essential for successful body-area mHealth networks. These devices coordinate the activity of the body-area network and provide a discreet means for communicating with their wearer. Such devices complement the capabilities of a smartphone, bridging the gap between the type of pervasive computing possible with a mobile phone and that enabled by wearable computing.

The interdisciplinary team of investigators from Dartmouth and Clemson is designing and developing ‘Amulet’, an electronic bracelet and a software framework that enables developers to create (and users to easily use) safe, secure, and efficient mHealth applications that fit seamlessly into everyday life. The research is determining the degree to which computational jewelry offers advantages in availability, reliability, security, privacy, and usability, and developing techniques that provide these properties in spite of the severely-constrained power resources of wearable jewelry.

Learn more about the Amulet project at amulet-project.org.