Conference Paper

A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems.

Conference: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings
Source: DBLP

ABSTRACT This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual's personal health information requires their informed consent, health care information networks need an access control framework that can capture and enforce individual access policies tailored to the specific circumstances of each consumer. Role Based Access Control (RBAC) is examined as a candidate access control framework. While it is well suited to the task in many regards, we identify a number of shortcomings, particularly in the range of access policy expression types that it can support. For efficiency and comprehensibility, access policies that grant access to a broad range of entities whilst explicitly denying it to subgroups of those entities need to be supported in health information networks. We argue that RBAC does not support policies of this type with sufficient flexibility and propose a novel adaptation of RBAC principles to address this shortcoming. We also describe a prototype distributed medical information system that embodies the improved RBAC model.

0 Followers
 · 
64 Views
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: In today's era of aging society, people want to handle personal health care by themselves in everyday life. In particular, the evolution of medical and IT convergence technology and mobile smart devices has made it possible for people to gather information on their health status anytime and anywhere easily using biometric information acquisition devices. Healthcare information systems can contribute to the improvement of the nation's healthcare quality and the reduction of related cost. However, there are no perfect security models or mechanisms for healthcare service applications, and privacy information can therefore be leaked. In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. We propose and design u-healthcare service integration platform (u-HCSIP) applying RBAC security model. The proposed u-HCSIP performs four main functions: storing and exchanging personal health records (PHR), recommending meals and exercise, buying/selling private health information or experience, and managing personal health data using smart devices.
  • [Show abstract] [Hide abstract]
    ABSTRACT: The volume of the data involved in healthcare systems and the sensitivity of the data call for strict, non-obtrusive and efficient access control. This paper presents the design and implementation of a software prototype to demonstrate how Role-Based Access Control (RBAC), supported by context-awareness, can be applied in the Mauritian healthcare service for providing efficient and effective access control to patient's data. The work has consisted of studying different models of Role-Based and Context-Based access control used elsewhere and applying it to the Mauritian healthcare sector. The software prototype is based on information flow in a collaborator healthcare institution. The prototype has been implemented as a distributed system based on the client-server model, with the location of users and time of access being forms of context considered. The prototype has been successfully implemented and tested under different scenarios of data access.
    2014 IST-Africa Conference & Exhibition; 05/2014
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Given the sensitive nature of health data, security and pri-vacy of eHealth systems is of prime importance. Properties like secrecy, authentication, anonymity, and untraceability need to be satisfied. How-ever, only satisfying these properties is not sufficient in case users can re-veal private information to the adversary. For instance, a pharmaceutical company may bribe or coerce a pharmacist to reveal information which breaks a doctor's privacy. Therefore, new privacy properties are required: enforced prescribing-privacy, independency of prescribing-privacy, and independency of enforced prescribing-privacy. In this paper, we identify and formalise these new properties. Moreover we take an eHealth proto-col (DLVV08), which is proposed for practical use, as a case study, and study to what extent all these properties are satisfied by the DLVV08 protocol. Finally, we address found ambiguities and flaws and propose suggestions for fixing them.