-
Notifications
You must be signed in to change notification settings - Fork 454
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
privacy and self-sovereign identity #3013
Comments
Facinating 2012 report from World Economic Forum
Our government is already conducting various initiatives within this area. See this letter to parlement about the various ongoing matters. |
Read literature:
Attended events:
|
W3C is creating a group on self-sovereign Identity matters. However, seems too heavy and leaning towards a browser-only perspective. Please also read detailed (privacy-minded) crypto papers:
|
Key paper discussing 15 years of decentralization with 189 citations from the literature {including TribBler} This paper is a beautiful version of 3 years earlier work by TUDelft students https://cryptome.org/2014/04/tor-vulns-attacks.pdf titled "The fifteen year struggle of decentralizing After 15 years of struggling scientist we now see the emergence of numerous standards group which also make sadly little progress. https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/topics-and-advance-readings/DID-Whitepaper.md#decentralized-identifiers-dids-and-decentralized-identity-management-didm
|
Real patient open dataset: |
About self-sovereign IDs.. |
Read literature:
|
Read literature:
Meeting with Idius Felix. He advised me to look for another dmain because I lack domain knowledge about healthcare. He thought my research question was too broad. Tried to contact Ron van den Bosch (UMCG) but he retired this month. |
Felix consult; the electronic patient file does not exist. Spread out across hospital, special clinics, general practitioner, elderly care, etc. Future direction:
ToDo: Learn QT for Android and Python. |
Activities:
|
Medicit input: self-sovereign identity where patient can see all available data, append corrections, control sharing, and control removal. Defined format and medical patient data. Demo app https://mxi.nl/upload/documenten/presentatie_doorontwikkeling_blockchain_zin_izo_mxi.pdf Next meeting: first QT app, expand with MijnZorgLog basic features. Possible future steps: Trustchain + self-sovereign ID, IPv8. Smartphone becomes your personal medical data server. Problem, reliability, backup, and theft-locking. Brainstorm idea: spread your encrypted patient files among social network. Features: remotely disable, your trustchain locks, trustchain goes into recovery mode, recover with friends (mechanism to support 1-5 friends)?. This is the Facebook account recovery using trusted contacts:
|
Please read fascinating thesis from Yesterday. It links various domains, excellent problem description. No code, no engineering. |
Activities:
|
|
Read literature:
|
Buzzword bingo for possible thesis title and storyline:
Suggested ToDo:
This morning discussion inspired the following design. Simple party-trick also used in Enigma design by MIT for distributed encrypted storage. Simple designs like this might actually work! |
|
please read https://link.springer.com/chapter/10.1007/978-3-319-67816-0_21
|
Related work on zero-knowledge proof, Nature papers. Zero-Knowledge Nuclear Warhead Verification. |
Activities:
|
Activities:
|
|
Activities:
|
Dedicated prototype. Completely from scratch, without any unneeded features and functionality.
|
I subscribed to this post and saw that you maybe start looking at switching to PyEthereum; I see you guys are trying to do these steps:
This for me sounds like Shamir Secret Sharing; there are currently two projects in the Ethereum ecosystem working on this; Since 31st of May 2018, Kimono released their smart contract on Rinkeby for trustless secret sharing; kimono medium post: https://medium.com/@pfh/kimono-trustless-secret-sharing-using-time-locks-on-ethereum-8e7e696494d The kimono platform uses a commit and reveal scheme that distributes the secret for each piece of data across a network of peers who share it with the public only once the time-lock is complete. it relies on Shamir Secret Sharing uPort also has a bounty open for a implementation of shamir secret sharing (sss) in WebAssembly, that is almost complete. 3box/sss-wasm#2 |
Roadmap for thesis. Concrete tasks
|
thesis_6_juli.pdf
|
|
thesis_26_juli.pdf |
next steps
|
Activities last month:
|
|
Activities last 3 weeks:
|
Discovered initiatives:
Feedback:
|
Performance analysis:
Think about more decentralised approach. Can every medical institute run their own portal for login and coordination? |
Activities:
|
Progress meeting minutes:
|
Activities:
|
Meeting minutes:
|
New thesis draft, processed feedback from last time. |
Review notes:
Future work ideas&brainstorm: run a test network using public datasets like a prescribed medication for all doctors in the UK for a whole year. Emulate all hospitals, doctors, and medication prescription events. |
On Security Analysis of Proof-of-Elapsed-Time (PoET). Solid related work for a security analysis. It introduces a likelyhood of being a cheater. |
No more comments on thesis text and chapter wording. Except usage of Sybil term for cheating in a lottery (7.2.1 Sybil attacks). Advised to make "7.2 Resistance against attacks" a single text paragraph without sub-sub-headings. Final thesis addition suggestion: link outcome of experimental results with the appropriate theory. Great additional to theoretical thesis depth (1+ page):
|
Review notes: General impression: Extensively introduced topic (good!; clear!); relatively short description of the actual work and its evaluation (but i'm not familiar with the standards in your field, so I'm not the best to judge.
I would be happy to discuss more practical aspects when implementing MediTrail in a medical environment such as an academic hospital. Looking forward to hear more! Cheers, Erik |
|
|
Presentation draft: |
draft thesis direction
Investigate the revealing of privacy-sensitive attributes of your identity.
Should be usable even in the sensitive medical domain with electronic patient files.
First step, find related work in this area (irma, zero-knowledge, zkSNARKs)
For next meeting: gather all general docs, weforum Djuri his thesis, etc. in .PDF form.
The text was updated successfully, but these errors were encountered: