A Context-Policy-based Approach to Access Control for Healthcare Data Protection

Author(s):  
M. Fahim Ferdous Khan ◽  
Ken Sakamura
2007 ◽  
Vol 14 (2) ◽  
pp. 189-195 ◽  
Author(s):  
Renate Gertz

AbstractOn the 1st of December 2006, the Court of Session in Edinburgh issued the first decision on Freedom of Information and health data regarding a request for information on incidences of childhood leukemia, in the range of 0 - 14 years, by year and census ward from 1990 to 2003 for the Dumfries and Galloway postal areas. The case, which provides an example for the collision course between the Freedom of Information and Data Protection regime, had been anticipated as a landmark decision, however, due to several problems and inconsistencies it sadly failed to meet those expectations.


2013 ◽  
Vol 55 (6) ◽  
Author(s):  
Arya Adriansyah ◽  
Boudewijn F. van Dongen ◽  
Nicola Zannone

AbstractPrivacy is becoming a urgent issue in information systems nowadays because of the stringent requirements imposed by data protection regulations. Traditional security approaches based on access control and authorization are not adequate to address these requirements. The underlying fundamental problem is that those approaches are preventive and thus they are not able to deal with exceptions. In this paper, we present a practical privacy framework that shifts the problem of preventing infringements into a problem of detecting infringements. The framework is based on systematic log auditing, use of patterns and privacy metrics to detect and quantify infringements.


2016 ◽  
Vol 9 (3) ◽  
pp. 157 ◽  
Author(s):  
Esmaeil Mehraeen ◽  
Marjan Ghazisaeedi ◽  
Jebraeil Farzi ◽  
Saghar Mirshekari

<p><strong>BACKGROUND:</strong> Healthcare data are very sensitive records that should not be made available to unauthorized people in order for protecting patient's information security. However, in progressed technologies as cloud computing which are vulnerable to cyber gaps that pose an adverse impact on the security and privacy of patients’ electronic health records and in these situations, security challenges of the wireless networks need to be carefully understood and considered. Recently, security concerns in cloud computing environment are a matter of challenge with rising importance.</p><p><strong>OBJECTIVE:</strong> In this study a systematic review to investigate the security challenges in cloud computing was carried out. We focused mainly on healthcare cloud computing security with an organized review of 210 full text articles published between 2000 and 2015.</p><p><strong>METHOD:</strong> A systematic literature review was conducted including PubMed, Science direct, Embase, ProQuest, Web of science, Cochrane, Emerald, and Scopus databases.</p><p><strong>FINDINGS:</strong> Using the strategies described, 666 references retrieved (for research question one 365, research question two 201, and research question three 100 references).</p><p><strong>IMPROVEMENTS:</strong> Review of articles showed that for ensuring healthcare data security, it is important to provide authentication, authorization and access control within cloud's virtualized network. Issues such as identity management and access control, Internet-based access, authentication and authorization and cybercriminals are major concerns in healthcare cloud computing. To manage these issues<strong> </strong>many involved events such as Hybrid Execution Model, VCC-SSF, sHype Hypervisor Security Architecture, Identity Management, and Resource Isolation approaches<em> </em>have to be defined for using cloud computing threat management processes.</p>


2021 ◽  
pp. 1-13
Author(s):  
Evgenia Psarra ◽  
Yiannis Verginadis ◽  
Ioannis Patiniotakis ◽  
Dimitris Apostolou ◽  
Gregoris Mentzas

In emergency situations, different actors involved in first aid services should be authorized to retrieve information from the patient’s Electronic Health Records (EHRs). The research objectives of this work involve the development and implementation of methods to characterise emergency situations requiring extraordinary access to healthcare data. The aim is to implement such methods based on contextual information pertaining to specific patients and emergency situations and also leveraging personalisation aspects which enable the efficient access control on sensitive data during emergencies. The Attribute Based Access Control paradigm is used in order to grant access to EHRs based on contextual information. We introduce an ABAC approach using personalized context handlers, in which raw contextual information can be uplifted in order to recognize critical situations and grant access to healthcare data. Results indicate that context-aware ABAC is a very effective method for detecting critical situations that require emergency access to personal health records. In comparison to RBAC implementations of emergency access control to EHRs, the proposed ABAC implementation leverages contextual information pertaining to the specific patient and emergency situations. Contextual information increases the capability of ABAC to recognize critical situations and grant access to healthcare data.


Sign in / Sign up

Export Citation Format

Share Document