A Security and Privacy Validation Methodology for e-Health Systems

被引:10
作者
Amato, Flora [1 ]
Casola, Valentina [1 ]
Cozzolino, Giovanni [1 ]
Benedictis, Alessandra De [1 ]
Mazzocca, N. Icola [1 ]
Moscato, Francesco [2 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol, Via Claudio 21, I-80125 Naples, NA, Italy
[2] Univ Salerno, Dept Informat Technol & Elect Engn & Appl Math, Via Giovanni Paolo II 132, I-84084 Fisciano, SA, Italy
关键词
e-Health management systems; security and privacy for e-Health data; security and privacy validation; formal methods for security validation; MODEL-CHECKING; VERIFICATION;
D O I
10.1145/3412373
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
e-Health applications enable one to acquire, process, and share patient medical data to improve diagnosis, treatment, and patient monitoring. Despite the undeniable benefits brought by the digitization of health systems, the transmission of and access to medical information raises critical issues, mainly related to security and privacy. While several security mechanisms exist that can be applied in an e-Health system, they may not be adequate due to the complexity of involved workflows, and to the possible inherent correlation among health-related concepts that may be exploited by unauthorized subjects. In this article, we propose a novel methodology for the validation of security and privacy policies in a complex e-Health system, that leverages a formal description of clinical workflows and a semantically enriched definition of the data model used by the workflows, in order to build a comprehensive model of the system that can be analyzed with automated model checking and ontology-based reasoning techniques. To validate the proposed methodology, we applied it to two case studies, subjected to the directives of the EU GDPR regulation for the protection of health data, and demonstrated its ability to correctly verify the fulfillment of desired policies in different scenarios.
引用
收藏
页数:22
相关论文
共 27 条
[1]   Methods and Tools for Policy Analysis [J].
Abu Jabal, Amani ;
Davari, Maryam ;
Bertino, Elisa ;
Makaya, Christian ;
Calo, Seraphin ;
Verma, Dinesh ;
Russo, Alessandra ;
Williams, Christopher .
ACM COMPUTING SURVEYS, 2019, 51 (06)
[2]   A THEORY OF TIMED AUTOMATA [J].
ALUR, R ;
DILL, DL .
THEORETICAL COMPUTER SCIENCE, 1994, 126 (02) :183-235
[3]   MODEL-CHECKING IN DENSE REAL-TIME [J].
ALUR, R ;
COURCOUBETIS, C ;
DILL, D .
INFORMATION AND COMPUTATION, 1993, 104 (01) :2-34
[4]   Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services [J].
Amato, Flora ;
Casola, Valentina ;
Cozzolino, Giovanni ;
De Benedictis, Alessandra ;
Moscato, Francesco .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) :4655-4665
[5]   Security policy monitoring of BPMN-based service compositions [J].
Asim, Muhammad ;
Yautsiukhin, Artsiom ;
Brucker, Achim D. ;
Baker, Thar ;
Shi, Qi ;
Lempereur, Brett .
JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2018, 30 (09)
[6]   Monitoring Metric First-Order Temporal Properties [J].
Basin, David ;
Klaedtke, Felix ;
Mueller, Samuel ;
Zalinescu, Eugen .
JOURNAL OF THE ACM, 2015, 62 (02)
[7]  
Behrmann G, 2004, LECT NOTES COMPUT SC, V3185, P200
[8]   Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies [J].
Ben Attia, Hasiba ;
Kahloul, Laid ;
Benhazrallah, Saber ;
Bourekkache, Samir .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (02) :163-187
[9]   Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing [J].
Chenthara, Shekha ;
Ahmed, Khandakar ;
Wang, Hua ;
Whittaker, Frank .
IEEE ACCESS, 2019, 7 :74361-74382
[10]   Medical Information Protection Frameworks for Smart Healthcare based on IoT [J].
Choi, Junho ;
Choi, Chang ;
Kim, SungHwan ;
Ko, Hoon .
PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, MINING AND SEMANTICS (WIMS 2019), 2019,