Skip to main content
Log in

Emergency Access Authorization for Personally Controlled Online Health Care Data

  • Original Paper
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

Personally controlled health records (PCHR) systems have emerged to allow patients to control their own medical data. In a PCHR system, all the access privileges to a patient’s data are granted by the patient. However, in many emergency cases, it is impossible for the patient to participate in access authorization on site when immediate medical treatment is needed. To solve the emergency access authorization problem in the absence of patients, we consider two cases: a) the requester is already in the PCHR system but has not obtained the access privilege of the patient’s health records, and b) the requester does not even have an account in the PCHR system to submit its request. For each of the two cases, we present a method for emergency access authorization, utilizing the weighted voting and source authentication cryptographic techniques. Our methods provide an effective, secure and private solution for emergency access authorization, that makes the existing PCHR system frameworks more practical and thus improves the patients’ experiences of health care when using PCHR systems. We have implemented a prototype system as a proof of concept.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. The American Recovery and Reinvestment Act of 2009 (ARRA), P.L. 111C5, 6. 123 Stat 115, 17 February 2009.

  2. Agrawal, D., and Srikant, R., Privacy-preserving data mining. In: Proc. ACM SIGMOD. pp. 439–450, 2000.

  3. Grimson, W., Jung, B., van Mulligen, E. M., van Ginneken, A. M., Pardon, S., and Sottile, P. A., Extensions to the HISA standard—The SynEx computing environment. Methods Inf. Med. 41:401–10, 2002.

    Google Scholar 

  4. Blobel, B., Authorization and access control for electronic health record systems. Int. J. Med. Inform. 73(3):251–257, 2004.

    Article  Google Scholar 

  5. Brickell, J., and Shmatikov, V., Efficient anonymity-preserving data collection. In: Proc. of ACM KDD, 2006.

  6. Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., and Pinkas, B., Multicast security: A taxonomy and some efficient constructions. In: Proceedings of IEEE INFOCOM ’99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE. Vol. 2, pp. 708–716, 1999.

  7. Chen, K., and Liu, L., Privacy preserving data classification with rotation perturbation. In: Proceeding of ICDM’05. pp. 589–592. Washington: IEEE Computer Society, 2005.

    Google Scholar 

  8. Du, W., and Zhan, Z., Using randomized response techniques for privacy preserving data mining. In: Proceeding of SIGKDD’03. pp. 505–510, 2003.

  9. France, R., Security of health care records in Belgium application in a university hospital. Int. J. Med. Inform. 73(3):235–8, 2004.

    Article  Google Scholar 

  10. Grimson, W., Berry, D., Grimson, J., Stephens, G., Felton, E., Given, P., and O’Moore, R., Federated healthcare record server—The synapses paradigm. Int. J. Med. Inform. 52:3–27, 1998.

    Article  Google Scholar 

  11. Grimson, J., Grimson, W., Berry, D., Stephens, G., Felton, E., Kalra, D., Toussaint, P., and Weier, O. W., A CORBA-based integration of distributed electronic healthcare records using the synapses approach. IEEE Trans. Inf. Technol. Biomed. 2:124–138, 1998.

    Article  Google Scholar 

  12. HIPPA, National Standards to Protect the Privacy of Personal Health Information, [Online]. Available at: http://www.hhs.gov/ocr/hipaa/finalreg.html, 2006.

  13. Haaka, Mvd, Wolffa, A. C., Brandnera R, Dringsb P, Wannenmacherc M, and Wetter T., Data security and protection in cross-institutional electronic patient records. Int. J. Med. Inform. 70(2–3):117–130, 2003.

    Google Scholar 

  14. Lindell, Y., and Pinkas, B., Privacy preserving data mining. J. Cryptol. 15(3):177–206, 2002.

    Article  MathSciNet  MATH  Google Scholar 

  15. LeFevre, K., Dewitt, D. J., and Ramakrishnan, R., Incognito: Efficient full-domain k-anonymity. In: Proceedings of the 2005 ACM SIGMOD, 12–16 June 2005.

  16. Motta, G., and Furuie S., A contextual role-based access control authorization model for electronic patient record. IEEE Trans. Inf. Technol. Biomed. 7(3):202–7, 2003.

    Article  Google Scholar 

  17. Narayanan, A., and Shmatikov, V., Obfuscated databases and group privacy. In: Proc. of ACM CCS, 2005.

  18. The Personal Health Working Group, The personal health working group final report. Washington, DC: Connecting for Health: A Public–Private Collaborative, 2003.

    Google Scholar 

  19. Committee on Data Standards for Patient Safety, Board on Health Care Services, Key capabilities of an electronic health record system. Washington, DC: Institute of Medicine of the National Academies, 2003.

    Google Scholar 

  20. Sandhu, R. S., Coyne, E. J., and Youman, C. E., Role-based access control models. IEEE Comput. 29(2):38–47, 1996.

    Article  Google Scholar 

  21. Simons, W. W., Mandl, K. D., and Kohane, I. S., The PING personally controlled electronic medical record system: Technical architecture. J. Am. Med. Inform. Assoc. 12(1):47–54, 2005.

    Article  Google Scholar 

  22. Teng, Z., and Du, W., Comparisons of K-anonymization and randomization schemes under linking attacks. In: Proceedings of the 2006 ICDM. pp. 1091–1096, 2006.

  23. Tannenbaum, T., Excursions in modern mathematics, 6th Ed. Upper Saddle River: Prentice Hall, 48C83, 2006.

    Google Scholar 

  24. Thompson, T. G., and Brailer, D. J., The decade of health information technology: Delivering consumer-centric and information-rich health care. Available at: http://www.hsrnet.net/nhii/materials/strategic_framework.pdf, Accessed 24 August 2004.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sheng Zhong.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chen, T., Zhong, S. Emergency Access Authorization for Personally Controlled Online Health Care Data. J Med Syst 36, 291–300 (2012). https://doi.org/10.1007/s10916-010-9475-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10916-010-9475-2

Keywords

Navigation