A Framework for Capturing Patient Consent in Pervasive Healthcare Applications

2011 ◽  
pp. 659-673
Author(s):  
Giovanni Russello ◽  
Changyu Dong ◽  
Naranker Dualy

In this chapter, the authors describe a new framework for pervasive healthcare applications where the patient’s consent has a pivotal role. In their framework, patients are able to control the disclosure of their medical data. The patient’s consent is implicitly captured by the context in which his or her medical data is being accessed. Context is expressed in terms of workflows. The execution of a task in a workflow carries information that the system uses for providing access rights accordingly to the patient’s consent. Ultimately, the patient is in charge of withdrawing consent if necessary. Moreover, the use of workflow enables the enforcement of the need-to-kwon principle. This means that a subject is authorised to access sensitive data only when required by the actual situation.

Author(s):  
Giovanni Russello ◽  
Changyu Dong ◽  
Naranker Dualy

In this chapter, the authors describe a new framework for pervasive healthcare applications where the patient’s consent has a pivotal role. In their framework, patients are able to control the disclosure of their medical data. The patient’s consent is implicitly captured by the context in which his or her medical data is being accessed. Context is expressed in terms of workflows. The execution of a task in a workflow carries information that the system uses for providing access rights accordingly to the patient’s consent. Ultimately, the patient is in charge of withdrawing consent if necessary. Moreover, the use of workflow enables the enforcement of the need-to-kwon principle. This means that a subject is authorised to access sensitive data only when required by the actual situation.


2020 ◽  
Vol 2 (2) ◽  
Author(s):  
Suzanna Schmeelk ◽  
Lixin Tao

Many organizations, to save costs, are movinheg to t Bring Your Own Mobile Device (BYOD) model and adopting applications built by third-parties at an unprecedented rate.  Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection, mitigation, and prevention.  This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project (OWASP).  OWASP maintains lists of the top ten security threats to web and mobile applications.  We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.  We analyze 200+ healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten moble threats, the threat of “Insecure Data Storage.”  We find that many of the applications are storing personally identifying information (PII) in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data.


2014 ◽  
Vol 8 (2) ◽  
pp. 13-24 ◽  
Author(s):  
Arkadiusz Liber

Introduction: Medical documentation ought to be accessible with the preservation of its integrity as well as the protection of personal data. One of the manners of its protection against disclosure is anonymization. Contemporary methods ensure anonymity without the possibility of sensitive data access control. it seems that the future of sensitive data processing systems belongs to the personalized method. In the first part of the paper k-Anonymity, (X,y)- Anonymity, (α,k)- Anonymity, and (k,e)-Anonymity methods were discussed. these methods belong to well - known elementary methods which are the subject of a significant number of publications. As the source papers to this part, Samarati, Sweeney, wang, wong and zhang’s works were accredited. the selection of these publications is justified by their wider research review work led, for instance, by Fung, Wang, Fu and y. however, it should be noted that the methods of anonymization derive from the methods of statistical databases protection from the 70s of 20th century. Due to the interrelated content and literature references the first and the second part of this article constitute the integral whole.Aim of the study: The analysis of the methods of anonymization, the analysis of the methods of protection of anonymized data, the study of a new security type of privacy enabling device to control disclosing sensitive data by the entity which this data concerns.Material and methods: Analytical methods, algebraic methods.Results: Delivering material supporting the choice and analysis of the ways of anonymization of medical data, developing a new privacy protection solution enabling the control of sensitive data by entities which this data concerns.Conclusions: In the paper the analysis of solutions for data anonymization, to ensure privacy protection in medical data sets, was conducted. the methods of: k-Anonymity, (X,y)- Anonymity, (α,k)- Anonymity, (k,e)-Anonymity, (X,y)-Privacy, lKc-Privacy, l-Diversity, (X,y)-linkability, t-closeness, confidence Bounding and Personalized Privacy were described, explained and analyzed. The analysis of solutions of controlling sensitive data by their owner was also conducted. Apart from the existing methods of the anonymization, the analysis of methods of the protection of anonymized data was included. In particular, the methods of: δ-Presence, e-Differential Privacy, (d,γ)-Privacy, (α,β)-Distributing Privacy and protections against (c,t)-isolation were analyzed. Moreover, the author introduced a new solution of the controlled protection of privacy. the solution is based on marking a protected field and the multi-key encryption of sensitive value. The suggested way of marking the fields is in accordance with Xmlstandard. For the encryption, (n,p) different keys cipher was selected. to decipher the content the p keys of n were used. The proposed solution enables to apply brand new methods to control privacy of disclosing sensitive data.


Author(s):  
J. Hyma ◽  
Moulica Sudamalla ◽  
Dharma Teja Vanaparthi ◽  
Koushik Vinnakota ◽  
Vamsi Krishna Choppavarapu

Author(s):  
Mustafa Yuksel ◽  
Asuman Dogac ◽  
Cebrail Taskin ◽  
Anil Yalcinkaya

The PHR systems need to be integrated with a wide variety of healthcare IT systems including EHRs, electronic medical devices, and clinical decision support services to get their full benefit. It is not possible to sustain the integration of PHRs with other healthcare IT systems in a proprietary way; this integration has to be achieved by exploiting the promising interoperability standards and profiles. This chapter provides a survey and analysis of the interoperability standards and profiles that can be used to integrate PHRs with a variety of healthcare applications and medical data resources, including EHR systems to enable access of a patient to his own medical data generated by healthcare professionals; personal medical devices to obtain the patient’s instant physiological status; and the clinical decision support services for patient-physician shared decision making.


Author(s):  
Demosthenes Vouyioukas ◽  
Ilias Maglogiannis

This book chapter provides a systematic analysis of the communication technologies used in healthcare and homecare, their applications and the utilization of the mobile technologies in the healthcare sector by using in addition case studies to highlight the successes and concerns of homecare projects. There are several software applications, appliances, and communication technologies emerging in the homecare arena, which can be combined in order to create a pervasive mobile health system. This study highlights the key areas of concern and describes various types of applications in terms of communications’ performance. A comprehensive overview of some of these homecare, healthcare applications and research are presented. The technologies regarding the provision of these systems are described and categorised in two main groups: synchronous and asynchronous communications’ systems and technologies. The recent advances in homecare using wireless body sensors and on/off-body networks technologies are discussed along with the provision of future trends for pervasive healthcare delivery. Finally, this book chapter ends with a brief discussion and concluding remarks in succession to the future trends.


Author(s):  
Anukul Pandey ◽  
Butta Singh ◽  
Barjinder Singh Saini ◽  
Neetu Sood

The primary objective of this chapter is to analyze the existing tools and techniques for medical data security. Typically, medical data includes either medical signals such as electrocardiogram, electroencephalogram, electromyography, or medical imaging like digital imaging and communications in medicine, joint photographic experts group format. The medical data are sensitive, subject to privacy preservation, and data access rights. Security in e-health field is an integrated concept which includes robust combination of confidentiality, integrity, and availability of medical data. Confidentiality ensures the data is inaccessible to unauthorized access. Integrity restricts the alteration in data by the unauthorized user. Whereas availability provides the readiness of the data when needed by the authorized user. Additionally, confidentiality, integrity and availability, accountability parameter records the back action list which answers the why, when, what, and whom data is accessed. The selected tools and techniques used in medical data security in e-health applications is discussed.


Author(s):  
Antonio Coronato ◽  
Luigi Gallo ◽  
Giuseppe De Pietro

Pervasive healthcare is the field of application emerging from the combination of healthcare with pervasive computing, which is the computing paradigm that provides users with access to services in a transparent way, wherever they are and whichever their interacting device is. In this paper, a software infrastructure for pervasive healthcare is presented. Such an infrastructure aims at supporting medical practitioners with advanced pervasive access to medical data, which is also context-aware in the sense that the modality to fruit data depends on the device used by the operator and on his or her physical position within the environment. The paper also describes a service for high quality 3D rendering of medical volume data, which takes advantage of the software infrastructure to distribute the computational load upon the devices available in the environment in a completely transparent way to users.


2009 ◽  
pp. 2085-2099
Author(s):  
Boštjan Bercic ◽  
Carlisle George

In recent years, various national medical databases have been set up in the EU from disparate local databases and file systems. Medical records contain personal data and are as such protected by EU and member states’ legislation. Medical data, in addition to being personal data, is also defined in the EU legislation as being especially sensitive and warrants special measures to protect it. It therefore follows that various legal issues and concerns arise in connection with these processes. Such issues relate to the merits of compiling a nationwide database, deciding on who has access to such a database, legitimate uses of medical data held, protection of medical data, and subject access rights amongst others. This chapter examines some of these issues and argues that such databases are inevitable due to technological change; however there are major legal and information security caveats that have to be addressed. Many of these caveats have not yet been resolved satisfactorily, hence making medical databases that already exist problematic.


Sign in / Sign up

Export Citation Format

Share Document