• Nenhum resultado encontrado

V ir tual H ealth C ard System

N/A
N/A
Protected

Academic year: 2019

Share "V ir tual H ealth C ard System"

Copied!
6
0
0

Texto

(1)

V ir t ual H

e

al t h C ar d Sy

s

t

e

m

T iago Pedrosa1;2, Carlos Costa2, Rui Pedro Lopes1, and Jose Lu s Oliveira2

1 Polytechnic Institute of Bragan¸ca, Portugal

2 University of Aveiro, IEETA, Portugal

A bst r act Electronic Health Records are key components to an efficient

exploitation of information technologies in health care institutions. Nev-ertheless, several barriers that hinder its wide adoption subsists. The co-existence of dissimilar and incompatible health information systems and the absence of a unique central repository for personal medical data are some examples. This paper, we propose a web-based health records repository that allow citizens to have a unique virtual card that inte-grates all their personal clinical data. Privacy policies and the access control mechanisms are also discussed.

R esu m o Os registos m´edicos electr´onicos s˜ao fundamentais para uma

utiliza¸c˜ao eficiente das tecnologias de informa¸c˜ao em institui¸c˜oes de sa´ude.

No entanto, existem v´arias barreiras que atrasam a sua implementa¸c˜ao

em larga escala. A co-existˆencia de sistemas de informa¸c˜ao de sa´ude

d´ıspares e incompat´ıveis, bem como a falta de um reposit´orio central de

informa¸c˜ao m´edica pessoal, s˜ao alguns dos exemplos. Propomos um

repo-sit´orio m´edico, baseado em tecnologia web, disponibiliza aos cidad˜aos um

cart˜ao virtual ´unico que agrega toda a sua informa¸c˜ao m´edica. Quest˜oes

relacionadas com a privacidade e mecanismos de controlo de acesso s˜ao

tamb´em abordados.

1

I nt rodu

c

t ion

T he use of Information Technologies (I T ) to support health care services is a reality commonly spread in the society. Nevertheless, one of the biggest c hal-lenges in the health informaticsis still the creation of an Integrated E lectronic Health Record (I E H R) - a patient longitudinal record that aggregates all ge n-erated information in clinical consultations. T he balance between privacy and accessibility issues isone of the reasons that makes health care a rich scenario

for security technologies [8]. On one hand, we must enforce the privacy of se n-sible information and, on the other, thequality of healthcare services demands sharing and remote accessto patient information [9,7].

(2)

normal one person to have several clinical appointments in diÞerent cities, re -gions and even countries. Citizens move their residence during lifetime, travel more regularly, for working, for leisure or even for medical care [12]. Hence, the information generated will be disperse along several institutional inf orma-tion systems. A unique view of the disperse E H R, would improve the quality of healthcare services. To create an integrated access to the information that is disperse amount severalsystems,a single patient identiþer should be necessary tosimplify theaggregation ofmedical data. However, thisisn't astraightforward tasksince each patient may have diÞerent identiþersin various systems.

As the information is spread in several organizations, its sharing has to re -spect rigid lawsand regulations that makesdi Žcult the I E H R implementation. O ther di Žculty isbased on thelack ofwellestablishedcommunicationstandards between diÞerent E H Rs systems,despitesome eÞorts[11].

2

M at

e

rial

s

and m

e

t hod

s

In most scenarios, theregulatory and law frameworkforsharing health records can besatisþed imposing the patient informed consent (several modelsuse this approach [5,1,3]). As the patient isentitled to request acopy of its recordsand sharewith anyone that hedecides,thesharing ismakeusing hisconsent instead of theorganization that storesthe records.

In thoseheterogeneousenvironment, involving diÞerent organizations,public or private, asecure authentication mechanism ismandatory. In thelast decade, the use of smart-cards in healthcare information systems has been consensual, as they provide a secure way for storing information and authentication cre -dentials for remote authentication [6]. T he E lectronic Health Card ( E H C) is basically a smart-card that is used for saving useful information for adminis -trative tasks,emergency medical information, security certiþcates and, insome cases, e-prescriptions. T his type of tokens are used in some countries like, for instance, Germany and A ustria to achieve a national I E H R solution.

Asdiscussed, the I E H R implementations needs to provide an integrated ac -cess mechanism to disperse information. So, the integrator system must know the data location, more precisely the query engine service to extract inf orma-tion ofaspeciþcpatient. T hislinkageinformationcan bestored in theintegrator database,howeversomeprojectsdecided toextendelectronichealthcard tos up-port thatservice. Hence,the V irtual Unique E lectronicPatient Card ( V U-E P R) appearsasa possiblesolution [4].

(3)

main beneþtsassociated to this solutioncan be characterized by highlyscattered geographical storage requirements. T his model empowers patient enabling the discretionary accessto remotedata,whencrossed V U-E P Rcard with health

pro-fessionalcard, and allowsan open access to the medical emergency data stored in the card. Upon this model, we developed a V U-E P R solution named Multi-Service Patient Data Card (MS-P D C). T he MS-P D C was modeled to provide þve complementary services and results from an extension of a þrst developed ( V U-E P R) model exclusively oriented to E lectronic Patient Records[5,4] inf or-mation: i) A dministrative data support; ii) E mergency Clinical data support; iii) Hyperlink base, build upon the U R L schema and that allow to link the pa-tient clinical and geneticdistributed information; iv) Patient digital credentials support and management; v) P D C owner veriþcation capability.

T he MS-P D C uses U R Ls to fetch the information on the disperse systems and present them to the user as a unique view of all distributed data. T his model copes well with mobility issues, such as the gathering of disperse data andcontrolling the accessto it. Nevertheless,in a widerconcept of mobility it's notfeasiblethat all patientswill hold thesametypeofcard world-widely. O ther discussable aspect istheneed of thepresenceof the physicalcard in thesystem whenever exists the need to access the patient E H R. T hus,weproposea model where asystem will hold the card in behalfof theuser.

3

R

e

s

ul t

s

T he V irtual Health Card System ( V H CS) proposed, appears as a solution to overcome the drawbacksassociated with physical token dependency. Instead of the E H C being hold by the patient ( F igure 1), it will be hold by a service ( F igure2). T heservicewill storeand provideaccessto the E H C when requested and only iftheauthorization isgranted by thepredeþned policies. T hereforethe information can be used after patient informed consent, since the links to the information will beon thesystem. T heinformedconsent will bealsostored in the card,visible to othersystemcomponentsthatcan read it and apply that policies controlling the access to the patient information. Moreover, other important advantagescould be identiþed in this proposal. F irst, it expedite the processes ofbackup and revalidation ofcredentials.Secondly,an important issue, it allows the dynamic update of links on the patient card whenever new information is created. Most ofthisfeaturesbecameavailabledueto the continuospresenceof the card in thesystem( F igure2).

(4)

Actor

Electronic Health Card

EHR EHR

EHR EHR

F igu re 1.Patient hold his electronic health

card

Actor

Virtual Health Card

EHR EHR

EHR EHR

F igu re 2. System holds patient electronic

health card

Our proposed model ( F igure3) iscomposed by 4 main components: the cre -dentials,theaccesspolicy and two typesofUniversal UniqueIdentiþers(U UI Ds). T he credentialcomponent isresponsibleforsecurelystoring theprivateand

pub-Actor

Virtual Health Card System Virtual Health Card Virtual Health Card Virtual Health Card

Credentials AccessPolicy UUIDs Private UUIDs

Protected

Authentication

Retrive VHC

F igu re 3.Virtual Health Card System

lic key of the user. T he access to the private-key container is only available to theauthenticated user (the actor), by the way of asecret (could be a password or other method [2]). T he private-key inside the container isthe credential that will be used internally for authentication, signing,cypher and de-cypher the

in-formation. T his modus operandi separates the credentialsfor authentication in thesystem from the credentials that theuser will use to logon.

In accesspolicycomponent,thepatient deþnestheinformedconsent to his

in-formation, identifying healthcareprofessional and grantingspeciþc permissions. E ach new entry is signed with thepatient'sprivate-key. Hence, each timeasys -tem component makes a request to access the patient information, the system checks if the requesting user has the necessary privileges (through the access policy), verifying alwaysif thepolicy wasreally signed by thepatient.

(5)

area (U UI D Protected) where are placed the references accessible to speciþc healthcare professionals.

T he Private U UI D may be used to handle references of very sensible and discriminatory information. On this component, the patient can manage the information that hedoesnot want accessible to any health professionals,in any occasion. Toenforcethisbehavior,thesystem willcypher thereferenceswith the userscorrespondent public-keyforcing that only with theprivate-key oftheuser this information could be read. T he access to this private information demands always the explicit patient consent.

T he Protected U UI D is theplacewhereother systemcomponents (orexte r-nal services) can update the U UI Ds, as new information is being produced in several healthsystems. Components that in the behalfof an authenticated and authorized user want to access the patient'sinformation, query thiscomponent to get information about remotepatient data location and how to accessit.

T he credentialcomponent willensurethat only an authorized usercan access hisprivate-key and that Private U UI Dswill only beaccessibleusing the correct private-key that is stored inside the credentialcomponent.It'salso proposethat theProtected U UI D and the AccessPolicy be cyphered using asystem key,that must be shared between the components that need to communicate with the V H CS. T herefore a component is obligated to register in the system to obtain theaccess key.

In a emergencyscenario, the patient could not beable to provide theintend consent. T he V H CS is prepared to handle this situation granting the prac ti-tioner accessto the patient E H R and bypassing theaccesspolicyfor the U UI D

Protected. T his " break-the-glass" mechanism will only give access to inf

orma-tion that isn't protect in the private area (U U I D Private component). T his

mechanism will generate auditing records for future analyze and detection of

misconducted access.

T he V H CS proposal providesan important indexing and retrieve service of

disperse information and the access control mechanisms to ensure the patient

data privacy and conþdentiality. It will also enable users to have an unique

authentication in the system, providing a single-sign-on behavior. T his service

will present the user credentials to other componentsas needed.

4

C on

c

lu

s

ion

s

T he proposed model copes well with requirements of mobile citizens E H Rs, it

separate the credentials used for authentication from the credentials used in

the indexing system. It enables the creation of a dynamic mechanism to

up-date references of remote patient information. It also copes with the existence

of diÞerent identiþers for the same patient, along diÞerent healthcare systems.

Moreover, it empowers patients with the capability to decide what information

is absolutely private from all the information that exists in the disperse E H Rs.

(6)

gula-tory framework for sharing of healthcare records between distinct professionals (or institutions) in diÞerent regionsor countries.

Further work will be need namely to decide how to implement the access control policy. T he idea is to have a central R B A C policy database [10] that deþnesthepermissionsforeach rolelike,forexample,thepermissionsto a prac -titioner or the permissions to a nurse. W ith the central R B A C policy database thepatient only have to decidewhich rolehe grants to each professional proþle in the accesspolicy component.

R

e

f

e

r

e

n

ce

s

1. Ankica Babic, Carlos Costa, Jos´e Lu´ıs Oliveira, Natalja Voznuka, Ilidio Oliveira, Markus Storm, Victor Maojo, Fernando Sanches, Miguel Santos, Antonio Sousa

Pereira. Confidentiality and security issues in web services managing patient

clin-ical and genetic data. Linkopings, Sweeden, 2004.

2. J. Basney, M. Humphrey, and V. Welch. The MyProxy online credential repository.

Software: Practice and Experience, 35(9):801–816, 2005.

3. J. Bergmann, O. Bott, D. Pretschner, and R. Haux. An e-consent-based shared

EHR system architecture for integrated healthcare networks.International Journal

of Medical Informatics, 76(2-3):130–136, 2007.

4. A. S. Carlos Costa, Jos´e Lu´ıs Oliveira. Electronic patient record virtually unique

based on a crypto smart card. Lecture Notes in Computer Science, Volume

2722/2003, 2003.

5. A. S. V. G. R. Carlos Costa, Jos´e Lu´ıs Oliveira. A new concept for an integrated

Healthcare Access Model. Studies in health technology and informatics, 95:101,

2003.

6. H. Chien, J. Jan, and Y. Tseng. An Efficient and Practical Solution to Remote

Authentication: Smart Card. Computers & Security, 21(4):372–375, 2002.

7. F. Colasanti. ICT for Health and i2010-Transforming the European healthcare landscape-Towards a strategy for ICT for Health [online]. June 2006. Luxembourg, 2006.

8. C. Dalton. The NHS as a proving ground for cryptosystems. Information Security

Technical Report, 8(3):73–88, 2003.

9. K. D. Mandl, P. Szolovits, I. S. Kohane, D. Markwell, and R. MacDonald. Public standards and patients’ control: how to keep electronic medical records accessible but private commentary: Open approaches to electronic patient records

commen-tary: A patient’s viewpoint. BMJ, 322(7281):283–287, 2001.

10. J. Reid, I. Cheong, M. Henricksen, and J. Smith. A Novel Use of RBAC to

Protect Privacy in Distributed Health Care Information Systems. Proceedings of

the Eighth Australasian Conference on Information Security and Privacy (ACISP 2003), LNCS, 2727:403–415, 2003.

11. Technical Committee ISO/TC 215. Health informatics — electronic health record — definition, scope, and context - iso/tr 20514:2005(e). Technical report, Interna-tional Organization for Standardization, 2005.

Referências

Documentos relacionados

Os objetivos terapêuticos são estabilizar o paciente (administrar oxigénio, colocar em local calmo se estiver dispneico), limitar a absorção de paracetamol em casos de

Competence, warmth, experience level, competition (rivalry), problem solving, employee relations (manager-employee relationship), interpersonal skills, connectedness,

térmica e de reflexão do calor; conjugar a inércia térmica com a cor das superfícies que estão em contacto direto com o ambiente interior, influencia também o seu

Na continuidade do documento importa descrever mais em pormenor três desses modelos: Sistema de Informação em que cada prestador de cuidados tem a sua base de dados, no qual a

Na parte empírica da investigação apontam-se as constatações referentes às fake news nas eleições presidenciais brasileiras de 2018 e, mediante método

To the question “Do you consider important the classification of the distributors based on certain criteria such as turnover, territorial presence or opening for

Embora tenha sido um estágio de carácter mais observacional, tive também a oportunidade de treinar a colheita de história clínica psiquiátrica e a avaliação do estado

After this study it was concluded that is possible to create a system, based on the blockchain technology, to store and share sensitive health data with more security and privacy