HOW TO PRESERVE PATIENT'S PRIVACY AND ANONYMITY IN WEB-BASED ELECTRONIC HEALTH RECORDS

被引:0
作者
Slamanig, Daniel [1 ]
Stingl, Christian [1 ]
机构
[1] Carinthia Univ Appl Sci, Sch Med Informat Technol, Klagenfurt, Austria
来源
HEALTHINF 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON HEALTH INFORMATICS | 2009年
关键词
Anonymity; Cryptography; Electronic Health Record; Health Data; Information Security; Privacy;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, demographic change and increasing treatment costs demand the adoption of more cost efficient, highly qualitative and integrated health care processes. The rapid growth and availability of the Internet facilitate the development of eHealth services and especially of electronic health records (EHRs) which are promising solutions to meet the aforementioned requirements. Considering actual web-based EHR systems, patient-centric and patient moderated approaches are widely deployed. Besides these initiatives there is an emerging market of so called personal health record platforms, e.g. Google Health. Both concepts provide a central and web-based access to highly sensitive data of EHRs. Additionally, the fact that these EHR systems may be hosted by not fully trustworthy providers necessitates to thoroughly consider privacy issues. In this paper we define security and privacy objectives that play an important role in context of web-based EHRs. Furthermore, we discuss deployed Solutions as well as concepts proposed in the literature with respect to this objectives and point Out several weaknesses. Finally, we introduce a system which overcomes the drawbacks of existing Solutions by considering an holistic approach to preserve patient's privacy and discuss the applied methods in detail.
引用
收藏
页码:257 / 264
页数:8
相关论文
共 27 条
[1]  
Ateniese G, 2000, LECT NOTES COMPUT SC, V1880, P255
[2]  
Bishop M., 2002, Computer Security: Art and Science
[3]  
Boneh D, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P113, DOI 10.1145/319709.319725
[4]  
CHAUM D, 1991, LECT NOTES COMPUT SC, V547, P257
[5]   UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS [J].
CHAUM, DL .
COMMUNICATIONS OF THE ACM, 1981, 24 (02) :84-88
[6]  
*CSI, 2007, COMP CRIM SEC SURV 2
[7]   Mixminion: Design of a type III anonymous remailer protocol [J].
Danezis, G ;
Dingledine, R ;
Mathewson, N .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :2-15
[8]  
DANEZIS G, 2008, MSRTR200835 MICR SRE
[9]  
Demuynck L, 2005, LECT NOTES COMPUT SC, V3677, P150
[10]  
Dingledine R, 2004, USENIX ASS P 13 USEN, P303