Protecting privacy during peer-to-peer exchange of medical documents

被引:14
|
作者
Weber-Jahnke, Jens H. [1 ]
Obry, Christina [1 ]
机构
[1] Univ Victoria, Dept Comp Sci, Victoria, BC, Canada
关键词
Security and privacy; eHealth; Peer-to-peer interoperability; CDA; Consent management; Disclosure directives; Access control; Auditing; Non-repudation;
D O I
10.1007/s10796-011-9304-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy is an important aspect of interoperable medical information systems. Governments and health care organizations have established privacy policies to prevent abuse of personal health data. These policies often require organizations to obtain patient consent prior to exchanging personal information with other interoperable systems. The consents are defined in form of so-called disclosure directives. However, policies are often not precise enough to address all possible eventualities and exceptions. Unanticipated priorities and other care contexts may cause conflicts between a patient's disclosure directives and the need to receive treatments from informed caregivers. It is commonly agreed that in these situations patient safety takes precedence over information privacy. Therefore, caregivers are typically given the ability to override the patient's disclosure directives to protect patient safety. These overrides must be logged and are subject to privacy audits to prevent abuse. Centralized "shared health record" (SHR) infrastructures include consent management systems that enact the above functionality. However, consent management mechanisms do not extend to information systems that exchange clinical information on a peer-to-peer basis, e.g., by secure messaging. Our article addresses this gap by presenting a consent management mechanism for peer-to-peer interoperable systems. The mechanism restricts access to sensitive, medical data based on defined consent directives, but also allows overriding the policies when needed. The overriding process is monitored and audited in order to prevent misuse. The mechanism has been implemented in an open source project called CDAShip and has been made available on SourceForge.
引用
收藏
页码:87 / 104
页数:18
相关论文
共 50 条
  • [1] Protecting privacy during peer-to-peer exchange of medical documents
    Jens H. Weber-Jahnke
    Christina Obry
    [J]. Information Systems Frontiers, 2012, 14 : 87 - 104
  • [2] Simple Peer-to-Peer SIP Privacy
    Koskela, Joakim
    Tarkoma, Sasu
    [J]. SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 226 - +
  • [3] Protecting Peer-to-Peer Network with Roaming Agents
    Banik, Shankar M.
    Urey, Hugh
    [J]. IEEE SOUTHEASTCON 2015, 2015,
  • [4] Protecting Anonymity in Dynamic Peer-to-Peer Networks
    Puttaswamy, Krishna P. N.
    Sala, Alessandra
    Wilson, Christo
    Zhao, Ben Y.
    [J]. 16TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS: ICNP'08, 2008, : 104 - 113
  • [5] Peer-to-Peer Collaboration over XML Documents
    Ignat, Claudia-Lavinia
    Oster, Gerald
    [J]. COOPERATIVE DESIGN, VISUALIZATION, AND ENGINEERING, PROCEEDINGS, 2008, 5220 : 66 - 73
  • [6] A Peer-to-Peer Recommender System with Privacy Constraints
    Pussep, Konstantin
    Kaune, Sebastian
    Flick, Jonas
    Steinmetz, Ralf
    [J]. CISIS: 2009 INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, VOLS 1 AND 2, 2009, : 409 - 414
  • [7] Preserving location Privacy in Peer-to-Peer Environments
    Deb, Rupam
    Kazary, Sumaya
    Islam, Kazi Rafiqul
    Ahmed, Reaz
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA STORAGE AND DATA ENGINEERING (DSDE 2010), 2010, : 49 - 53
  • [8] Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks
    Freudiger, Julien
    Jadliwala, Murtuza
    Hubaux, Jean-Pierre
    Niemi, Valtteri
    Ginzboorg, Philip
    [J]. MOBILE NETWORKS & APPLICATIONS, 2013, 18 (03): : 413 - 428
  • [9] Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks
    Julien Freudiger
    Murtuza Jadliwala
    Jean-Pierre Hubaux
    Valtteri Niemi
    Philip Ginzboorg
    [J]. Mobile Networks and Applications, 2013, 18 : 413 - 428
  • [10] A privacy-enhanced peer-to-peer reputation system
    Kinateder, M
    Pearson, S
    [J]. E-COMMERCE AND WEB TECHNOLOGIES, PROCEEDINGS, 2003, 2738 : 206 - 215