Patient-Centric Secure-and-Privacy-Preserving Service-Oriented Architecture for Health Information Integration and Exchange



Similar documents
Use Cases for Argonaut Project. Version 1.1

OpenHRE Security Architecture. (DRAFT v0.5)

EHR Interoperability Framework Overview

Cesario Di Sarno. Security Information and Event Management in Critical Infrastructures

X-Road. egovernment interoperability framework

Clinical Document Exchange Integration Guide - Outbound

HL7 and SOA Based Distributed Electronic Patient Record Architecture Using Open EMR

Interoperability: White Paper. Introduction. PointClickCare Interoperability January 2014

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

D50323GC20 Oracle Database 11g: Security Release 2

HIPAA for HIT and EHRs. Latest on Meaningful Use and EHR Certification: For Privacy and Security Professionals

Supporting in- and off-hospital Patient Management Using a Web-based Integrated Software Platform

HYBRID ELECTRONIC HEALTH RECORDS

Oracle Database 11g: Security Release 2

EHR Standards Landscape

Setting the World on FHIR

Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days

Image Enabled EMR / EHR

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Developing Microsoft SQL Server Databases 20464C; 5 Days

Cloud-based Identity and Access Control for Diagnostic Imaging Systems

SINTERO SERVER. Simplifying interoperability for distributed collaborative health care

MS Designing and Optimizing Database Solutions with Microsoft SQL Server 2008

Data Security and Governance with Enterprise Enabler

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

NIST Big Data Public Working Group

ehr Solution for HKSAR GOVT ehealth Project

State of the EHR: The Vendor Perspective

Integrating EHR and EDC systems

Simplifying the Interface Challenge in Healthcare. Healthcare Software Provider or Medical Device Manufacturer s Approach to Healthcare Integration

Enterprise Content Management for Healthcare

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Group Management Server User Guide

Final Version of the Electronic Health Record (EHR) Survey Questionnaire

Writing Queries Using Microsoft SQL Server 2008 Transact-SQL

Developers Integration Lab (DIL) System Architecture, Version 1.0

Course 6232A: Implementing a Microsoft SQL Server 2008 Database

THE EHR4CR PLATFORM AND SERVICES

HIMSS Interoperability Showcase 2011

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Developing Microsoft SQL Server Databases MOC 20464

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

SOA for Healthcare: Promises and Pitfalls

GE Measurement & Control. Cyber Security for NEI 08-09

Cloud Courses Description

Develop HIPAA-Compliant Mobile Apps with Verivo Akula

RFP for Documentation and Development of Governance Process for Services Oriented Architecture

MIGRATIONWIZ SECURITY OVERVIEW

Herve Roggero 3/3/2015

Denodo Data Virtualization Security Architecture & Protocols

Administering the Web Server (IIS) Role of Windows Server

Security Development Tool for Microsoft Dynamics AX 2012 WHITEPAPER

InfoCenter Suite and the FDA s 21 CFR part 11 Electronic Records; Electronic Signatures

A MODEL OF OPENEHR-BASED ELECTRONIC MEDICAL RECORD IN INDONESIA

CoSign for 21CFR Part 11 Compliance

Getting Started with Multitenancy SAP BI 4.1

This three-day instructor-led course provides students with the tools to extend Microsoft Dynamics CRM 4.0.

Integration of Genetic and Familial Data into. Electronic Medical Records and Healthcare Processes

Privacy and Security Policies for Healthcare Solutions on the Cloud

ConnectVirginia EXCHANGE Onboarding and Certification Guide. Version 1.4

API Management: Powered by SOA Software Dedicated Cloud

Models Supporting Development of Complex Information Systems in Healthcare. Case study: an Obstetrics-Gynecology Department

Advanced Authentication

Genomics and the EHR. Mark Hoffman, Ph.D. Vice President Research Solutions Cerner Corporation

The Requirements Compliance Matrix columns are defined as follows:

How to Secure Your SharePoint Deployment

NIST s Guide to Secure Web Services

Health & Medical Billing System (RSystems)

E-HEALTH PLATFORMS AND ARCHITECTURES

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

SOA in the pan-canadian EHR

SQL Server 2012 Business Intelligence Boot Camp

Table of Contents. Introduction. Audience. At Course Completion

20464C: Developing Microsoft SQL Server Databases

Electronic Submission of Medical Documentation (esmd) CDA Digital Signatures. January 8, 2013

A Conceptual Model of Practitioner Authentication Prior to Providing Telemedicine Services in Developing Countries

MCTS Microsoft SQL Server 2005 Implementation & Maintenance

Configuring CQ Security

HIMSS Interoperability Showcase 2011

Version: January 2008 ASTM E-31: EHR and Informatics Standards Education For Health Professional Disciplines. Background

Momentum Enterprise Solution: Product Overview

Transcription:

Patient-Centric Secure-and-Privacy-Preserving Service-Oriented Architecture for Health Information Integration and Exchange Mahmoud Awad and Larry Kerschberg Center for Health Information Technology George Mason University http://hit.gmu.edu/

Presentation Outline Research Motivation Research Objectives and Key features Architecture Discussion Conclusion Future Work

Research Motivation Electronic Health Records (EHR) Concerns 1. Privacy HIPAA privacy provisions apply to healthcare providers such as hospitals, physicians and laboratories Companies that aggregate these health records in electronic format such as Google Health, Microsoft HealthVault and Indivo are not HIPAAcovered entities Online privacy policies established by the companies versus enforceable federal laws 2. Security EHRs aggregated online 3. Ownership Online EHR systems are fully owned by Google, Microsoft, etc. The patient and the individual healthcare providers own portions of the medical records 4. Lack of Standards (Lack of interoperability) Paper-based medical record systems or electronic systems in proprietary format that are hard to integrate

Research Objectives and Key features Develop a secure and privacy-preserving Service Oriented Architecture (SOA) for health information integration and exchange Health information exchanges have to be approved by the patient Avoids centralized online storage of EHRs Complete EHRs can be aggregated on-demand using web service requests EHR exchanges require: One-time use secure tokens for authentication, Privacy policies to control data elements exchanged, Security policies: role-based and fine-grained security policies Use EHR standards for interoperability (Health Level 7 (HL7) )

Architecture Hospital Web Services 1. Initiate Request 4. Request Results Health Level 7 (HL-7) - Based Privacy Policy Physician Web Services HL7 Filter 1 ALL HL7 Filter 2 All Hospitals HL7 Filter 3 All Labs HL7 Filter 4 Exam Date HL7 Filter 5 Block All 5. Audit Record Application Server Web Services Patient Application Privacy Policy Generator Security Policy Generator Secure Token Generator Public Key Infrastructure (PKI) Figure 1: Architecture

Architecture - Continued Privacy Ontology A B C D E F G HL7 CDA Templates Privacy Policy Generator Privacy Policy Security Policy Generator Privacy Policy Fine-Grained Security Policy EHR Request EHR Request + Privacy Policy EHR Request + Privacy Policy + Security Policy EHR Privacy policies affect data structure (which XML elements to include in the EHR) Security policies affect records retrieved Figure 2: Privacy and Security Policy Generators

Architecture - Continued Database; contains fine-grained historical audit trail of all data exchange requests among healthcare providers, which includes additions, modifications and deletions of health record structure or data The patient s medical history can be reconstructed using this audit trail but only the patient has privileges to initiate such request

Architecture - Continued Privacy Policy Generator (PPG) generates privacy policies by defining which data structure elements are allowed to be exchanged between healthcare entities The policy itself is represented using HL7 CDA (Clinical Document Architecture) syntax and acts as a filter between a web service and its data store Privacy policies can be generated manually or via templates such as Continuity of Care Record (CCR) which is an HL7 constraint

Architecture - Continued Security Policy Generator (SPG) generates security policies that restrict records retrieved by a database in response to an EHR query These security policies enforce fine-grained access

Architecture - Continued The architecture offers a clear separation between privacy policies and security policies in order to provide better flexibility in producing and applying the filters and predicates produced by the PPG and SPG respectively Privacy filters are applied first to restrict data elements in an XML response (or columns in case of relational tables), then security policies are applied to limit the data element values Implementation details depend on the architecture of the medical record system implemented internally at the healthcare providers or health insurance companies Systems that use relational database can use fine-grained access control to implement security policies and systems that use XML databases can use XML schemas to validate the XML document produced

Architecture - Continued Secure Token Generator (STG); Requests for EHR exchange are initiated but not executed until secure tokens are generated by the STG. The tokens are generated using PKI and use a random number to ensure they are used only once Privacy Ontology; Helps the PPG determine relationships among healthcare providers and between EHR data elements and provides a mapping between the healthcare providers and EHR data elements. Default privacy policy templates are generated using this privacy ontology

Architecture - Continued Privacy Ontology; (continued) An example of relationships between healthcare providers is all the hospitals and medical practices that use Quest Diagnostics as their diagnostic laboratory testing facility This knowledge simplifies the process of generating security policies that would allow lab results to be exchanged between these medical facilities and Quest Diagnostics Also, knowing that the patient s primary family physician is a registered practitioner at particular hospital helps establish the level of trust in data exchanges between the physician and various offices within the hospital

Figure 3: HL7 Privacy and Security Ontology

Figure 4: HL7 Privacy and Security Ontology

Figure 4: HL7 Privacy and Security Ontology

Figure 4: HL7 Privacy and Security Ontology

Applications are used to: Architecture - Continued 1. Monitor data exchange requests and audit logs; 2. Produce privacy policies and security policies; 3. Query an individual component of the EHR or produce a complete EHR by issuing EHR integration web service requests to all the registered healthcare providers; and 4. Review and correct individual components of the EHR by issuing correction requests to the systems holding the affected record

Discussion Any comprehensive solution for EHR integration and exchange has to be technologically feasible but also politically acceptable Healthcare providers will always claim ownership of all medical records in their possession, and as long they are HIPAA-compliant, we have to assume that they developed adequate internal security and privacy policies to protect these medical records Our proposed solution only requires a web services layer around existing systems while giving patients an active role in the EHR exchange instead of the current practice of providing their healthcare providers with a blank authorization to exchange their EHR with anybody

Discussion - Continued Also, fully centralized EHR integration solutions are prone to privacy and security lapses and disruptive hacker attacks such as Denial Of Service (DOS) Fully distributed solutions, on the other hand, are prone to data loss if they do not offer proper data redundancy and backup strategies (which is also a concern when the patients decide to purge their medical records) Our proposed solution maintains the existing distributed network of systems represented by the healthcare providers but offers a secure method for data integration on demand

Conclusion In this paper, we propose a secure and privacy-preserving SOA for health information integration and exchange in which patients are part owners of their medical records, have complete ownership of their integrated health information and decide when and how data is modified or exchanged between healthcare providers or insurance companies This architecture is different from integrated Electronic Health Record (EHR) such as Google Health and Microsoft HealthVault in that electronic health records are not stored in online databases but instead are aggregated on demand using web service requests Web service providers working on behalf of the patients do not keep copies of the complete EHR but instead provide a pass-through service, and would require PKI-based security certificates to initiate health information exchange

Future Work Develop adaptors that allow patient-initiated changes to be applied to healthcare provider systems Develop generic reusable privacy policy templates using standards such as Continuity of Care Record (CCR) [which acts as an HL7 constraint/filter] Expand privacy ontologies to include medical conditions and drug interactions to complement the initial ontology that simply links healthcare providers and EHR data elements

QUESTIONS QUESTIONS