Skip to main content

Enhancing Health Information Systems Security: An Ontology Model Approach

  • Conference paper
  • First Online:
Health Information Science (HIS 2023)

Abstract

This study explores the implications of integrating Health Information System (HIS) on the security and privacy of sensitive patient information. It identifies existing gaps in research and proposes a novel security ontology model aimed at strengthening the defence of health information systems. The model revolves around the Ontology Conceptual Security Model, which comprehensively captures the intricate relationships between different components of HIS security. By incorporating elements such as Health Information, HIS Security Conditions, and Semantic Web Rule Language (SWRL) rules, the model promotes the establishment of rule-based access policies. It effectively combines various access control strategies, including Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and Mandatory Access Control (MAC). This integration ensures both flexibility and compliance with regulatory requirements. While the model represents a significant advancement in the field, it recognizes the need for further validation and addresses future challenges. Specifically, it highlights the importance of exploring advanced access control mechanisms and seamless integration with existing systems. In essence, this study presents a comprehensive framework for a robust security ontology model designed to enhance the protection of patient data within HIS systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alvarez-Rodríguez, J.M., Mendieta, R., Cibrián, E., Llorens, J.: Towards a method to quantitatively measure toolchain interoperability in the engineering lifecycle: a case study of digital hardware design. Comput. Stand. Interfaces 86, 103744 (2023)

    Article  Google Scholar 

  2. Bai, T., et al.: Integrating knowledge from case report: a medical-ontology based multimodal information system with structured summary (2022)

    Google Scholar 

  3. Blanco, J., Miguel, B., Rossi, T.: A comparative study of energy domain ontologies. In: Marchiori, M., Dominguez Mayo, F.J., Filipe, J. (eds.) WEBIST WEBIST 2020 2021. LNCS, vol. 2020, pp. 43–58. Springer, Cham (2020). https://doi.org/10.1007/978-3-031-24197-0_3

    Chapter  Google Scholar 

  4. Cerqueira, J.: An ontology for context-aware middleware for dependable medical systems. In: Proceedings of the 11th Latin-American Symposium on Dependable Computing, pp. 79–83 (2022)

    Google Scholar 

  5. Ge, Y.F., Orlowska, M., Cao, J., Wang, H., Zhang, Y.: MDDE: multitasking distributed differential evolution for privacy-preserving database fragmentation. VLDB J. 31, 1–19 (2022). https://doi.org/10.1007/s00778-021-00718-w

    Article  Google Scholar 

  6. Huang, T., Gong, Y.J., Kwong, S., Wang, H., Zhang, J.: A niching memetic algorithm for multi-solution traveling salesman problem. IEEE Trans. Evol. Comput. 24(3), 508–522 (2019)

    Google Scholar 

  7. Kabir, E., Mahmood, A., Wang, H., Mustafa, A.: Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing. IEEE Trans. Cloud Comput. 8(2), 408–417 (2015). https://doi.org/10.1109/TCC.2015.2469649

    Article  Google Scholar 

  8. Kernstock, P., Przybilla, L., Thatcher, J., Krcmar, H.: Can’t Get No Satisfaction?"-The Case for Broadening Information Systems Research on E-Commerce (2023)

    Google Scholar 

  9. Khalyasmaa, A.I., Stepanova, A.I., Stanislav, A., Eroshenko, P.V.: Matrenin: review of the digital twin technology applications for electrical equipment lifecycle management. Mathematics 11(6), 1315–1315 (2023)

    Article  Google Scholar 

  10. Lambrix, P.: Database and Web Information Systems Group: Publications (2023)

    Google Scholar 

  11. Lee, J.: The use of telehealth during the coronavirus (COVID-19) pandemic in oral and maxillofacial surgery - a qualitative analysis. ICST Trans. Scalable Inf. Syst. (2021). https://doi.org/10.4108/eai.2-12-2021.172361

  12. Lwin, H.N.N., Punnakitikashem, P., Thananusak, T.: E-Health research in Southeast Asia: a bibliometric review. Sustainability 15(3), 2559–2559 (2023)

    Article  Google Scholar 

  13. Matos, D., Everton, E., Viegas, R., Hessel, F.: Context-aware security in the internet of things: a review. In: Barolli, L. (ed.) AINA 2023. LNCS, vol. 3, pp. 518–531. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-28694-0_49

    Chapter  Google Scholar 

  14. Mcgagh, D., et al.: A novel ontological approach to track social determinants of health in primary care. In: Polovina, R., Polovina, S., Kemp, N. (eds.) MOVE 2020. Communications in Computer and Information Science, vol. 1694, pp. 227–240. Springer, Cham (2020). https://doi.org/10.1007/978-3-031-22228-3_10

    Chapter  Google Scholar 

  15. Minardi, R., Villani, M.L., De Nicola, A.: Semantic reasoning for geolocalized assessment of crime risk in smart cities. Smart Cities 6(1), 179–195 (2023)

    Article  Google Scholar 

  16. Nowrozy, R., Ahmed, K., Wang, H., Mcintosh, T.: Towards a universal privacy model for electronic health record systems: an ontology and machine learning approach. In: Informatics, vol. 10, p. 60. MDPI (2023)

    Google Scholar 

  17. Ojino, R., Mich, L., Mvungi, N.: Hotel room personalization via ontology and rule-based reasoning. Int. J. Web Inf. Syst. 18(5/6), 369–387 (2022)

    Article  Google Scholar 

  18. Ovono, G.: Sihlemoyo: conceptual linked data model for south African municipalities public services domain. In: Silhavy, R., Silhavy, P., Prokopova, Z. (eds.) CoMeSySo 2022. LNCS, vol. 2, pp. 197–208. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-21438-7_17

    Chapter  Google Scholar 

  19. Pereira, T.F., et al.: A web-based voice interaction framework proposal for enhancing information systems user experience. Procedia Comput. Sci. 196, 235–244 (2022)

    Article  Google Scholar 

  20. Pileggi, S.F.: Ontology in Hybrid Intelligence: a concise literature review (2023)

    Google Scholar 

  21. Prawira, K.T., Hindarto, D., Indrajit, E.: Application of enterprise architecture in digital transformation of insurance companies, 856–865 (2023)

    Google Scholar 

  22. Qian, J., Liu, Y.: Quantitative scenario construction of typical disasters driven by ontology data. J. Safety Sci. Resilience 4(2), 159–166 (2023)

    Article  Google Scholar 

  23. Ren, Z., Shi, J., Imran, M.: Data evolution governance for ontology-based digital twin product lifecycle management. IEEE Trans. Ind. Inf. 19(2), 1791–1802 (2022)

    Article  Google Scholar 

  24. Rezaei, Z., Vahidnia, M.H.: Effective medical center finding during COVID-19 pandemic using a spatial DSS centered on ontology engineering. GeoJournal 88, 1–15 (2022)

    Article  Google Scholar 

  25. Rousseau, J.F., Oliveira, E., Tierney, W.M., Khurshid, A.: Methods for development and application of data standards in an ontology-driven information model for measuring, managing, and computing social determinants of health for individuals, households, and communities evaluated through an example of asthma. J. Biomed. Inf. 136, 104241 (2022)

    Article  Google Scholar 

  26. Sánchez-Zas, C., Villagrá, V.A., Vega-Barbas, M., Larriva-Novo, X., Moreno, J.I., Berrocal, J.: Ontology-based approach to real-time risk management and cyber-situational awareness. Future Gener. Comput. Syst. 141, 462–472 (2023)

    Article  Google Scholar 

  27. Sansone, C., Sperlí, G.: Legal information retrieval systems: state-of-the-art and open issues. Inf. Syst. 106, 101967–101967 (2022)

    Article  Google Scholar 

  28. Sarki, R., Ahmed, K., Wang, H., Zhang, Y.: Automated detection of mild and multi-class diabetic eye diseases using deep learning. Health Inf. Sci. Syst. 8(1), 1–9 (2020). https://doi.org/10.1007/s13755-020-00125-5

    Article  Google Scholar 

  29. Sharma, A., Kumar, S.: Ontology-based semantic retrieval of documents using Word2vec model. Data Knowl. Eng. 144, 102110–102110 (2023)

    Article  Google Scholar 

  30. Singh, R., et al.: Antisocial behavior identification from Twitter feeds using traditional machine learning algorithms and deep learning. ICST Trans. Scalable Inf. Syst. 10, e17 (2023). https://doi.org/10.4108/eetsis.v10i3.3184

    Article  Google Scholar 

  31. Sun, X., Li, M., Wang, H., Plank, A.: An efficient hash-based algorithm for minimal k-anonymity. In: Conferences in Research and Practice in Information Technology (CRPIT), vol. 74, pp. 101–107 (2008)

    Google Scholar 

  32. Sun, X., Wang, H., Li, J.: Injecting purpose and trust into data anonymisation. In: Proceedings of the 18th ACM Conference on Information and Knowledge Management, pp. 1541–1544 (2009)

    Google Scholar 

  33. Sun, X., Wang, H., Li, J., Zhang, Y.: Satisfying privacy requirements before data anonymization. Comput. J. 55(4), 422–437 (2012)

    Article  Google Scholar 

  34. Tagde, P., et al.: Blockchain and artificial intelligence technology in e-health. Environ. Sci. Pollut. Res. 28, 52810–52831 (2021)

    Article  Google Scholar 

  35. Tahar, K., Martin, T., Mou, Y., Verbuecheln, R., Graessner, H., Krefting, D.: Rare diseases in hospital information systems-an interoperable methodology for distributed data quality assessments. Methods Inf. Med. AAM (2023)

    Google Scholar 

  36. Thuan, N.H., Dang-Pham, D., Le, H.S., Bhattacharya, P., Phan, T.Q: Introduction to Information Systems Research in Vietnam: A Shared Vision. In: Hoang Thuan, N., Dang-Pham, D., Le, H.S., Phan, T.Q. (eds.) Information Systems Research in Vietnam, pp. 1–16. Springer, Cham (2023). https://doi.org/10.1007/978-981-19-3804-7_1

  37. Wang, H., Cao, J., Zhang, Y.: A flexible payment scheme and its role-based access control. IEEE Trans. Knowl. Data Eng. 17, 425–436 (2005). https://doi.org/10.1109/TKDE.2005.35

    Article  Google Scholar 

  38. Wang, H., Sun, L.: Trust-involved access control in collaborative open social networks. In: 2010 Fourth International Conference on Network and System Security, pp. 239–246. IEEE (2010)

    Google Scholar 

  39. Wang, H., Wang, Y., Taleb, T., Jiang, X.: Special issue on security and privacy in network computing. World Wide Web 23, 951–957 (2020)

    Article  Google Scholar 

  40. Wang, H., Yi, X., Bertino, E., Sun, L.: Protecting outsourced data in cloud computing through access management. Concurrency Comput.: Pract. Exp. 28(3), 600–615 (2016)

    Article  Google Scholar 

  41. Wang, H., Zhang, Y., Cao, J.: Effective collaboration with information sharing in virtual universities. IEEE Trans. Knowl. Data Eng. 21, 840–853 (2009). https://doi.org/10.1109/TKDE.2008.132

    Article  Google Scholar 

  42. Wang, Y., Shen, Y., Wang, H., Cao, J., Jiang, X.: MtMR: ensuring MapReduce computation integrity with Merkle tree-based verifications. IEEE Trans. Big Data 4(3), 418–431 (2016)

    Article  Google Scholar 

  43. Wawrzik, F., Rafique, K.A., Rahman, F., Grimm, C.: Ontology learning applications of knowledge base construction for microelectronic systems. Information 14, 176–176 (2023)

    Article  Google Scholar 

  44. Zhang, F., Wang, Y., Liu, S., Wang, H.: Decision-based evasion attacks on tree ensemble classifiers. World Wide Web 23(5), 2957–2977 (2020). https://doi.org/10.1007/s11280-020-00813-y

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raza Nowrozy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nowrozy, R., Ahmed, K. (2023). Enhancing Health Information Systems Security: An Ontology Model Approach. In: Li, Y., Huang, Z., Sharma, M., Chen, L., Zhou, R. (eds) Health Information Science. HIS 2023. Lecture Notes in Computer Science, vol 14305. Springer, Singapore. https://doi.org/10.1007/978-981-99-7108-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-7108-4_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-7107-7

  • Online ISBN: 978-981-99-7108-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics