Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2007
This paper describes the design and implementation of a PKI-based eHealth authentication architecture. This architecture was developed to authenticate eHealth Professionals accessing RTS (Rede Telemática da Saúde), a regional platform for sharing clinical data among a set of affiliated health institutions. The architecture had to accommodate specific RTS requirements, namely the security of Professionals’ credentials, the mobility of Professionals, and the scalability to accommodate new health institutions. The adopted solution uses short lived certificates and cross-certification agreements between RTS and eHealth institutions for authenticating Professionals accessing the RTS. These certificates carry as well the Professional’s role at their home institution for role-based authorization. Trust agreements between health institutions and RTS are necessary in order to make the certificates recognized by the RTS. The implementation was based in Windows technology and as a general policy we avoided the development of specific code; instead, we used and configured available technology and services.
2008
This paper describes the design and implementation of a PKI-based e-Health authentication architecture. This architecture was developed to authenticate e-Health Professionals accessing RTS (Rede Telemática da Saúde), a regional platform for sharing clinical data among a set of affiliated health institutions. The architecture had to accommodate specific RTS requirements, namely the security of Professionals' credentials, the mobility of Professionals, and the scalability to accommodate new health institutions. The adopted solution uses short lived certificates and cross-certification agreements between RTS and e-Health institutions for authenticating Professionals accessing the RTS. These certificates carry as well the Professional's role at their home institution for role-based authorization. Trust agreements between health institutions and RTS are necessary in order to make the certificates recognized by the RTS. As a proof of concept, a prototype was implemented with Windows technology. The presented authentication architecture is intended to be applied to other medical telematic systems.
International Journal of Advanced Computer Science and Applications, 2016
Recent years have witnessed a widespread availability of electronic healthcare data record (EHR) systems. Vast amounts of health data were generated in the process of treatment in medical centers such hospitals, clinics, or other institutions. To improve the quality of healthcare service, EHRs could be potentially shared by a variety of users. This results in significant privacy issues that should be addressed to make the use of EHR practical. In fact, despite the recent research in designing standards and regulations directives concerning security and privacy in EHR systems, it is still, however, not completely settled out the privacy challenges. In this paper, a systematic literature review was conducted concerning the privacy issues in electronic healthcare systems. More than 50 original articles were selected to study the existing security approaches and figure out the used security models. Also, a novel Context-aware Access Control Security Model (CARE) is proposed to capture the scenario of data interoperability and support the security fundamentals of healthcare systems along with the capability of providing fine-grained access control.
2006
The development of information technology has eased the medical services and provided the electronic health service in a way that a doctor can keep the records of patients in an information system and be informed of changes of status of patients, and make decisions promptly. However, there are increasing challenges over the privacy of patients due to the exposition of clinic information patients to ubiquitous networks. This paper introduces a framework for authentication and authorization in e-health services. It aims to build the architecture for authentication and authorisation within an e-health service system. The architecture will help to build a secure and privacyprotection e-health service system. The authors hope that understanding the underlying framework will not only inform researchers of a better design for e-health service, but also assist e-health systems developers in the understanding of intricate constructions within authentication and authorisation. Further, our paper highlights the importance of protecting the privacy of medical records of patients in terms of information privacy.
2013
E-health services are subjected to same security threats as other online services. This paper emphasizes the requirement of a strong framework in e-health domain for reliable delivery of medical data over the internet. The paper recognizes current and future technological solutions in this regard. The solutions includes the authorization & authentication techniques and cryptography for the data transmission . Recent initiatives in Indian scenarios have also been analyzed. It further suggests the application of SOAP for building a secured framework. Keywords—authorization and authentication, cryptography,SOAP.
2014 International Carnahan Conference on Security Technology (ICCST), 2014
The aim of the Nu.Sa. project is the definition of national level data standards to collect data coming from General Practitioners' Electronic Health Records and to allow secure data sharing between them. This paper introduces the Nu.Sa. framework and is mainly focused on security issues. A solution for secure data sharing and service interoperability is presented and implemented in the actual system used around Italy. The solution is strongly focused on privacy and correct data sharing with a complete set of tools devoted to authorization, encryption and decryption in a data sharing environment and a distributed architecture. The implemented system with more than one year of experiences in thousands of test cases shows a good feasibility of the approach and a future scalability in a cloud based architecture.
International Journal of Medical Informatics, 2004
Electronic healthcare record; Security; Privilege management; Role management; Authorisation; Access control;
Advances in Enterprise Information Technology Security, 2007
This chapter presents security solutions in integrated patient-centric Web-based health-care information systems, also known as electronic healthcare record (EHCR). Security solutions in several projects have been presented and in particular a solution for EHCR integration from scratch. Implementations of Public key infrastructure, privilege management infrastructure, role based access control and rule based access control in EHCR have been presented. Regarding EHCR integration from scratch architecture and security have been proposed and discussed. This integration is particularly suitable for developing countries with wide spread Internet while at the same time the integration of heterogeneous systems is not needed. The chapter aims at contributing to initiatives for implementation of national and transnational EHCR in security aspect.
Studies in health technology and informatics, 2002
Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modem healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has therefore become a major concern for healthcare applications over the Internet. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security policy is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control security model supports and handles efficiently healthcare teams with active security capabilities and is capabl...
Health Informatics Journal, 2002
Downloaded from patient's computerized medical information being accumulated in a variety of locations. Today's healthcare environments use clinical electronic records usually containing data that are shared between source systems involved in healthcare distributed applications, in order to provide information to internal users as well as external requests, payers, and so on. Data may be accessed via remote workstations and complex networks supporting one or more organizations, and potentially within a national information infrastructure .
Journal of Engineering
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our suggested solution is to maintain a secure authentication and access control mechanism for health cloud data. Thus, in this work, Security Secret Key Provider (SSKP) phase is proposed for the E-healthcare-based cloud that consists of two parts. The first is an authenticat...
2008 Third International Conference on Availability, Reliability and Security, 2008
Telehealth applications can deliver medical services to patients at remote locations using telecommunications technologies, such as the Internet. At the same time, such applications also pose unique security challenges. First, the trust issue becomes more severe due to the lack of visual proofs in telehealth applications. The public key infrastructure (PKI) is insufficient for providing the same kind of trust a patient may attain during a face-to-face service. Second, telehealth services, such as tele-monitoring or tele-consultant, naturally demand a systematic organization of users, roles, resources, and flows of information. Existing access control mechanisms in an e-health system are usually incapable of dealing with such workflow-based services. This paper provides cost-efficient solutions to those issues in the context of a Web-based e-health portal system. First, we propose a PKI-like infrastructure for establishing trust between users using biometrics-based authentication and hierarchies of trust. Second, we develop an access control method for workflow-based telehealth services using a rule-based module already available in the portal system.
International Journal of Medical Informatics, 2003
Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modern healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has, therefore, become a major concern. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security model is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control (HAC) security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.
Health and Technology, 2018
Group-based systems, such as e-health systems, have been introduced since the last few decades. E-health systems can be used anytime and anywhere for patient monitoring. Wireless networks are continuously used to monitor patients' conditions and recovery progress. The confidentiality, integrity and authenticity of patients' health records are important to secure in such applications. Efficient key management and distribution are required to secure e-health applications in a wireless mobile environment. However, existing key management protocols cannot route e-health applications securely due to the resource-constrained architecture of the wireless mobile environment. A novel and enhanced key management scheme which aims to identify the challenges related to the security and privacy issues of patients' sensitive information through a strong encryption management is proposed in this study. The proposed model also aims to provide a well-organised and lightweight key management mechanism. This system requires few computations of keys and offers a null rekeying mechanism to ensure forward and backward secrecies. As a result, a secure and privacy-preserving key management scheme for e-health systems, which is known as the healthcare key management (HCKM) framework and aims to decrypt the ciphertext of the same plain text with different keys, is acquired. HCKM minimises the rekeying overhead of group members and the overhead expressed in terms of the number of exchanged messages whilst achieving a sufficiently high security level. The proposed protocol also can operate on dynamic scenarios with a large number (thousands) of nodes and exhibits an excellent performance under the assumption of low rate of evictions.
Health Informatics Journal, 2002
Computing and Control Engineering
While the widespread adoption of Internet and Intranet technology has been one of the exciting developments of recent years, many hospitals are finding that their data and legacy applications do not naturally fit into the new methods of dissemination. Existing applications often rely on isolation or trusted networks for their access control or security, whereas untrusted wide area networks pay little attention to the authenticity, integrity or confidentiality of the data they transport. Many hospitals do not have the resources to develop new "network-ready" versions of existing centralised applications.
2005
Recent research works examine the potential employment of public-key cryptography schemes in e-health environments. In such systems, where a Public Key Infrastructure (PKI) is established beforehand, Attribute Certificates (ACs) and public key enabled protocols like TLS, can provide the appropriate mechanisms to effectively support authentication, authorization and confidentiality services.
2007
In both developing and developed countries, the costs of delivering health care are increasingly tak- ing a large proportion of the national gross domestic product (GDP). GDP, is one of several measures of the size of a regions’ economy. While developed countries have a good doctor to patient ratio, in developing countries the ratios are alarming (e.g., in Uganda
2009 16th International Conference on Systems, Signals and Image Processing, 2009
As mobile devices are enhanced continuously with more resources, wireless infrastructures provide support to a growing number of assistive environments. Among the potential domains which can suffice from their deployment, is the ehealthcare sector. The increased sensitivity requirements imposed by the US and EU legislation, urge towards the design and incorporation of strict security standards in the deployment process of wireless e-healthcare infrastructures. Even though mobile devices are characterized by an increase in processing and autonomy capacity, the necessity to encrypt all communications consists of a significant burden. In this paper we present W-EHR, a wireless architecture that enables authorized medical personnel to access medical records in a secure and transparent manner, utilizing an agent based architecture. Ubiquitous access to medical information -within the hospital range -is achieved using mobile devices; security management is achieved using a hierarchical policy based approach in compatibility with the IETF policy-based management model. In order to comply with the strict privacy requirements, all the transactions are encrypted using a hybrid approach that employs symmetric and asymmetric encryption techniques. We describe our experiments that prove the effective operation of our infrastructure (by means of device resources consumption and network bandwidth). In our calculations we consider the encryption overhead when transmitting medical records in a compatible with medical codification standards form.
Health Informatics Journal, 2003
Throughout the healthcare domain, paper records and forms are being supplanted by electronic records, which are now routinely transmitted over intranets (within organizations), extranets (between organizations) and the Internet (to multiple organizations, worldwide). The potential for greater efficiency, lower costs and enhanced quality of care afforded by electronic versus paper-based records and communication in healthcare is vast. Electronic messaging is quickly becoming the standard for transmitting information in the healthcare industry. The security of transmitted information is a very critical issue. In this article, we report on the development of a Lightweight Authentication Protocol (LAP), which makes a mobile and distributed system more secure and flexible, and we implement it in a healthcare environment where the clinicians use mobile and wireless devices like PDAs. The implementation scenario and the special characteristics of healthcare information systems are described in detail. We also propose a monitoring system that involves patient credentials in order to monitor doctor access to the medical records. Our work shows that it is possible for a PDA to have access to a system like a healthcare Web database system with reasonable performance according to the theoretical analysis.
Throughout the healthcare domain, paper records and forms are being supplanted by electronic records, which are now routinely transmitted over intranets (within organizations), extranets (between organizations) and the Internet (to multiple organizations, worldwide). The potential for greater efficiency, lower costs and enhanced quality of care afforded by electronic versus paper-based records and communication in healthcare is vast. Electronic messaging is quickly becoming the standard for transmitting information in the healthcare industry. The security of transmitted information is a very critical issue. In this article, we report on the development of a Lightweight Authentication Protocol (LAP), which makes a mobile and distributed system more secure and flexible, and we implement it in a healthcare environment where the clinicians use mobile and wireless devices like PDAs. The implementation scenario and the special characteristics of healthcare information systems are described in detail. We also propose a monitoring system that involves patient credentials in order to monitor doctor access to the medical records. Our work shows that it is possible for a PDA to have access to a system like a healthcare Web database system with reasonable performance according to the theoretical analysis.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.