This database also executes the searches for the double-sided blinded process.
This is later shared with the user through the dashboard. When a user searches for some content, the trapdoor is sent to the database, where it is executed, and the response of the search is then returned to the client interface. Once data is encrypted all data is stored on this database. Healthcare database – The healthcare database provides the right facility for the users to store information.
The client module itself has two major components: the searchable encryption module and the data anonymization module. This is where all the tasks are executed. The dashboard is accessible via the web.Ĭlient – The Client module is the key component of the HE tool. The web-based nature of the dashboard makes it operating system and device independent, so that anyone having access to a web browser can use the tool. The dashboard is running off the client-side module and is a web-based tool. SPHINX users interact with this dashboard for the purpose of performing encryption, decryption, search and data anonymization tasks.
All these components are interlinked and have their own defined characteristics.ĭashboard – The dashboard acts as the control panel for the HE tool. The healthcare database is also referred to as the cloud module. HE consists of three interfaces, the dashboard, the client-side module and the healthcare database module. The procedure of data anonymisation is depicted in the following image: This is necessary to ensure compliance with the EU General Data Protection Regulation (GDPR). Data anonymization is key for ensuring data privacy. The data anonymisation module of the HE tool provides the SPHINX toolkit with the desired level of data anonymization. The double-sided blinded process of the HE solution is a feature that offers entities the ability to encrypt their own datasets and then allows different entities to perform search operations on their data. The process of search in the encrypted domain is shown below: This duo helps reduce computational complexity and increases performance efficiency. The encryption process makes use of two schemes, which include an AES encryption and an HE based searchable cipher creation. The search in the encrypted domain capability allows one to search in the database that they have encrypted themselves. These include searching in the encrypted domain, allowing a double-sided blinded search capability and providing data anonymity. The component is built using this scheme and provides a multitude of features for the SPHINX solution. The RSA-based partial homomorphic encryption scheme allows one to create a searchable cipher, thus eliminating the need for any index generation. The Homomorphic Encryption (HE) developed for the SPHINX toolkit is based on a partial homomorphic encryption scheme. In the current age of heterogeneous networking, this is a highly valuable capability. This as a result helps maintain data confidentiality while it is being processed, thus enabling tasks to be performed when data is residing in untrusted environments. Homomorphisms are maps between algebraic structures that allow the development of cryptographic techniques that, in turn, permit computations to be performed on encrypted data.