1
Privacy in e-Health As highly sensitive patient information provides a promising goal for attackers, there is increasing social and political pressure regarding the prevention of health data misuse. Traditional data security and access control mechanisms have their limitations in that they are vulnerable against inside attacks by malicious administrators. The answer to this problem is to let the patient as data owner control the access rights of trusted third parties. Challenges Nowadays, the protection of sensitive data is more important than ever before, because data is stored for longer periods of time and in a centralized way. It is the patient’s right to demand privacy (e.g., HIPAA, EC Directives, Domestic Acts) as disclosure of medical data can create serious problems for the patient. On their own, traditional access control, disassociation, and encryption techniques have their limitations. It is necessary to assure the availability of health data for secondary use to improve clinical studies. Johannes Heurix and Thomas Neubauer www.ffg.at/comet Das Kompetenzzentrum SBA Research wird im Rahmen von COMET – Competence Centers for Excellent Technologies durch BMVIT, BMWFJ, das Land Wien gefördert. Das Programm COMET wird durch die FFG abgewickelt. T. Neubauer and J. Heurix: “A Methodology for the Pseudonymization of Medical Data” in International Journal of Medical Informatics, Vol. 80/3, 2010. J. Heurix, M. Karlinger, T. Neubauer: “Pseudonymization with Metadata Encryption for Privacy-Preserving Searchable Documents” in Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS'12), 2012. In the local scenario, PERiMETER pseudonymizes only records stored in the local data repository. Both patient and health professional access the records via the same workstation using personal smart cards as authentication tokens. An optional server-side hardware security module provides cryptographic services with enhanced key protection. In the central scenario, PERiMETER is responsible for managing access to multiple records at multiple locations. While the pseudonymization metadata contain only references, the actual health records remain at the individual local storages. Through the PERiMETER server, the data owner can grant trusted persons from other environments access to selected records. Figure 1: PERiMETER Usage Scenarios Figure 2: PERiMETER Concept PERiMETER Figure 3: Pseudonymization Data Model PERiMETER (Pseudonymization and pERsonal METadata EncRyption) utilizes a pseudonym-based access control mechanism and a layer-based security model with multiple cryptographic keys to grant access only to authenticated and authorized persons. The patient as data owner strictly controls all access rights to personal health data and is able to create access authorizations for trusted persons, while depersonalized and pseudonymized medical information is available for secondary use. Record fragment links are managed by personal encrypted metadata storages that provide privacy-preserving querying mechanisms using an XML Schema-aware searchable encryption scheme. Root pseudonyms are known to the patient as data owner only and are used as references to represent the links between the document fragments. Fragment-specific shared pseudonyms created by the data owner provide trusted persons with this linking information and act as authorization tokens. Pseudonyms Usage Scenarios

Privacy in e-Health€¦ · It is the patient’s right to demand privacy (e.g., HIPAA, EC Directives, Domestic Acts) as disclosure of medical data can create serious problems for

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Privacy in e-Health€¦ · It is the patient’s right to demand privacy (e.g., HIPAA, EC Directives, Domestic Acts) as disclosure of medical data can create serious problems for

Privacy in e-Health

As highly sensitive patient information provides a promising goal for attackers, there is increasing social and political pressure regarding the prevention of health data misuse. Traditional data security and access control mechanisms have their limitations in that they are vulnerable against inside attacks by malicious administrators. The answer to this problem is to let the patient as data owner control the access rights of trusted third parties.

Challenges Nowadays, the protection of sensitive data is more important than ever before, because data is stored for longer periods of time and in a centralized way.

It is the patient’s right to demand privacy (e.g., HIPAA, EC Directives, Domestic Acts) as disclosure of medical data can create serious problems for the patient.

On their own, traditional access control, disassociation, and encryption techniques have their limitations.

It is necessary to assure the availability of health data for secondary use to improve clinical studies.

Johannes Heurix and Thomas Neubauerwww.ffg.at/comet

Das Kompetenzzentrum SBA Research wird im Rahmen von COMET – Competence Centers for Excellent Technologies durch BMVIT, BMWFJ, das Land Wien gefördert. Das Programm COMET wird durch die FFG abgewickelt.

T. Neubauer and J. Heurix: “A Methodology for the Pseudonymization of Medical Data” in International Journal of Medical Informatics, Vol. 80/3, 2010.J. Heurix, M. Karlinger, T. Neubauer: “Pseudonymization with Metadata Encryption for Privacy-Preserving Searchable Documents” in Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS'12), 2012.

In the local scenario, PERiMETER pseudonymizes only records stored in the local data repository. Both patient and health professional access the records via the same workstation using personal smart cards as authentication tokens. An optional server-side hardware security module provides cryptographic services with enhanced key protection.

In the central scenario, PERiMETER is responsible for managing access to multiple records at multiple locations. While the pseudonymization metadata contain only references, the actual health records remain at the individual local storages. Through the PERiMETER server, the data owner can grant trusted persons from other environments access to selected records.

Figure 1: PERiMETER Usage Scenarios

Figure 2: PERiMETER Concept

PERiMETER

Figure 3: Pseudonymization Data Model

PERiMETER (Pseudonymization and pERsonal METadata EncRyption) utilizes a pseudonym-based access control mechanism and a layer-based security model with multiple cryptographic keys to grant access only to authenticated and authorized persons. The patient as data owner strictly controls all access rights to personal health data and is able to create access authorizations for trusted persons, while depersonalized and pseudonymized medical information is available for secondary use. Record fragment links are managed by personal encrypted metadata storages that provide privacy-preserving querying mechanisms using an XML Schema-aware searchable encryption scheme.

Root pseudonyms are known to the patient as data owner only and are used as references to represent the links between the document fragments. Fragment-specific shared pseudonyms created by the data owner provide trusted persons with this linking information and act as authorization tokens.

Pseudonyms

Usage Scenarios