skip to main content
10.1145/1882992.1883093acmotherconferencesArticle/Chapter ViewAbstractPublication PagesihiConference Proceedingsconference-collections
poster

A comprehensive privacy-aware authorization framework founded on HIPAA privacy rules

Published:11 November 2010Publication History

ABSTRACT

Health care entities publish privacy polices that are aligned with government regulations such as Health Insurance Portability and Accountability Act (HIPPA) and promise to use and disclose health data according to the stated policies. However actual practices may deliberately or unintentionally violate these policies. To ensure enforcement of such policies and ultimately HIPAA compliancy there is a need to develop an enforcement mechanism. In this paper we extend our work on IT-enforceable policies, submitted to the International Journal of Medical Informatics. The submitted work involved a detailed analysis of HIPPA privacy rules to extract object related conditions needed to make a disclosure decision. In this paper we extend this work to propose machine enforceable policies that embody HIPAA privacy disclosure rules and a health care entity access control rules. We also propose a comprehensive access/privacy control architecture that enforces the proposed polices. The architectural model is designed to allow for a dynamic configuration of policies without reconfiguring the architecture responsible for enforcement. Both the proposed policies and the architecture allow for multiple stakeholders to adjust the privacy preferences to manage the disclosure of data by adjusting the designated parameters in their respective policies. The objective of this study is to provide a comprehensive model for privacy protection, access and logging of PHI, that is HIPAA compliant.

References

  1. OASIS eXtensible access control markup language (XACML) TC. http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml.Google ScholarGoogle Scholar
  2. The health information technology for economic and clinical health act (hitech). http://www.hipaasurvivalguide.com/hipaa-regulations/164-524.php, January 6, 2009.Google ScholarGoogle Scholar
  3. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In Proceedings of the 28th international conference on Very Large Data Bases, pages 143--154, Hong Kong, China, 2002. VLDB Endowment. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. F. C. Bourgeois, P. L. Taylor, S. J. Emans, D. J. Nigrin, and K. D. Mandl. Whose personal control? creating private, personally controlled health records for pediatric and adolescent patients. Journal of the American Medical Informatics Association: JAMIA, 15(6):737--743, Dec., 2008. PMID: 18755989.Google ScholarGoogle ScholarCross RefCross Ref
  5. J. Byun and N. Li. Purpose based access control for privacy protection in relational database systems. The VLDB Journal, 17(4): 603--619, July, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J.-W. Byun, E. Bertino, and N. Li. Purpose based access control of complex data for privacy protection. In SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies, pages 102--110, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. P. C. Hung. Towards a privacy access control model for e-Healthcare services. In Proceedings of Annual Conference on Privacy, Security and Trust, 2004.Google ScholarGoogle Scholar
  8. M. Lutes. Privacy and security compliance in the e-healthcare marketplace. Healthcare Financial Management: Journal of the Healthcare Financial Management Association, 54(3): 48--50, Mar. 2000. PMID: 10847915.Google ScholarGoogle Scholar
  9. M. Meingast, T. Roosta, and S. Sastry. Security and privacy issues with health care information technology. In Proceedings of the 8th Annual International Conference of the IEEE Engineering in Medicine and Biology, pages 5453--5458, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  10. A. R. Miller and C. E. Tucker. Privacy, network eects and electronic medical record technology adoption. In Proceedings of WEIS, 2007.Google ScholarGoogle Scholar
  11. G. Neumann and M. Strembeck. A scenario-driven role engineering process for functional RBAC roles. In Proceedings of the seventh ACM symposium on Access control models and technologies, page 42, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Q. Ni, A. Trombetta, E. Bertino, and J. Lobo. Privacy-aware role based access control. In Proceedings of the 12th ACM symposium on Access control models and technologies, pages 41--50, Sophia Antipolis, France, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. U. S. D. of Health and H. S. O. P. Brief. Summary of the HIPAA privacy rule. http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/index.html, May, 2003. Summary of the HIPAA Privacy Rule.Google ScholarGoogle Scholar
  14. D. Raths. Policy tech trends 2010. trend: privacy. Healthcare Informatics: The Business Magazine for Information and Communication Systems, 27(2): 20, 22--23, Feb. 2010. PMID: 20218064.Google ScholarGoogle Scholar
  15. J. Reid, I. Cheong, M. Henricksen, and J. Smit. A novel use of RBAC to protect privacy in distributed health care information systems. In Information Security and Privacy, page 220. Springer Berlin / Heidelberg, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. Sandhu, V. Bhamidipati, E. Coyne, S. Ganta, and C. Youman. The ARBAC97 model for role-based administration of roles: preliminary description and outline. In Proceedings of the second ACM workshop on Role-based access control, pages 41--50, Fairfax, Virginia, United States, 1997. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Xu and D. Wijesekera. A role-based XACML administration and delegation profile and its enforcement architecture. In Proceedings of the 2009 ACM workshop on Secure web services, pages 53--60, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. N. Yang, H. Barringer, and N. Zhang. A Purpose-Based access control model. In Information Assurance and Security, 2007. IAS 2007. Third International Symposium on, pages 143--148, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A comprehensive privacy-aware authorization framework founded on HIPAA privacy rules

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              IHI '10: Proceedings of the 1st ACM International Health Informatics Symposium
              November 2010
              886 pages
              ISBN:9781450300308
              DOI:10.1145/1882992

              Copyright © 2010 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 11 November 2010

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • poster

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader