Privacy-Preserving Patient Identity Management Framework for Secure Healthcare Access

This paper proposes and formally evaluates a privacy-preserving, patient-centric identity management framework that ensures secure healthcare access by balancing operational reliability with strong protections against linkability and traceability through anonymous pseudonyms and conditional traceability.

Nasif Muslim, Jean-Charles Grégoire

Published Tue, 10 Ma
📖 5 min read🧠 Deep dive

Imagine you have a very important, long-term diary of your life's health. You visit different doctors, pharmacies, and clinics. To make sure your care is safe and continuous, these places need to know that "Dr. Smith's patient" is the same person as "Pharmacy Jones's customer."

The Problem:
Usually, to link these records, everyone uses your real name or a permanent ID number (like a Social Security number). This is like giving every store you visit a copy of your driver's license.

  • The Risk: If a hacker steals that ID, they can see your entire medical history. Even worse, if a store clerk is nosy, they can track where you've been and what you've bought, building a profile of your life without your permission.
  • The Dilemma: If you use a different fake name for every store to stay private, the stores can't link your records. You might get the wrong medicine because they don't know you saw a specialist last week.

The Solution: The "Magic Mask" Framework
The authors (Nasif Muslim and Jean-Charles Grégoire) propose a new system called HIDM. Think of it as a high-tech, privacy-preserving passport system for healthcare.

Here is how it works, using simple analogies:

1. The "Root of Trust" (The Government Notary)

Imagine a super-trusted government office (the Government Health Authority) that issues a "Legitimacy Badge" to every hospital and doctor.

  • Why? So you know you are talking to a real, licensed doctor and not a hacker pretending to be one. You don't need to trust the doctor personally; you just need to trust the badge they show you.

2. The "Magic Mask" (Pseudonyms)

When you visit a clinic, you don't show your real name. Instead, you wear a Magic Mask (a pseudonym).

  • How it works: The clinic sees a unique code (like "Patient-Blue-7") instead of "John Doe."
  • The Magic: Every time you visit a different clinic, you get a different mask. This means Clinic A cannot talk to Clinic B to say, "Hey, that Blue-7 guy was here yesterday." They are completely disconnected.

3. The "Secret Decoder Ring" (The Health Record Repository)

But wait, if the clinics can't talk, how does the doctor know your allergy history?

  • The Solution: There is a central, secure vault called the Health Record Repository (HRR).
  • The Trick: You give the clinic a "Magic Mask" and a special Decoder Ring. The clinic uses the ring to translate your mask into a code the Vault understands. The Vault sees your real medical file, but the clinic only sees the mask. The clinic never knows your real identity, but the Vault knows exactly who you are so it can pull up your history.

4. The "Two-Key Safe" (Conditional Traceability)

What if you commit a crime or need to be identified for a legal investigation? The system needs a way to break the privacy, but only under strict rules.

  • The Analogy: Imagine a safe that requires two different keys to open, held by two different people who don't trust each other.
    • Key Holder A (The Patient Agency): Knows who "Patient-Blue-7" really is (Real Name).
    • Key Holder B (The Token Agency): Knows which "Patient-Blue-7" code belongs to which specific visit.
  • The Rule: Neither key holder can open the safe alone. They must both agree (like a court order) to combine their keys. Only then can they reveal who the masked person was. This prevents any single corrupt official from spying on you.

5. The "One-Time Ticket" (Appointment Tokens)

When you book an appointment, you get a digital ticket that is valid for one use only and expires at a specific time.

  • Why? This stops hackers from stealing your appointment slot and using it again and again (replay attacks). It's like a concert ticket that self-destructs after you enter the door.

Why is this better than what we have now?

  • Privacy: Your real identity is hidden from the people treating you. They only see a temporary code.
  • Safety: Your medical records are still linked correctly so you get safe, continuous care.
  • Speed: The authors tested this system and found it is fast enough to use in a real doctor's office without making you wait in line forever.
  • Security: It uses advanced math (cryptography) that is currently unbreakable by computers, ensuring no one can forge your identity.

In Summary

This paper presents a system where you can walk into a hospital, get treated, and have your records updated without ever giving them your real name. It's like having a secret identity that only a specific, secure vault can decode, ensuring your privacy is protected while your healthcare remains safe and connected. It balances the need for doctors to know your history with your right to keep your life private.