skip to main content
10.1145/2457317.2457345acmotherconferencesArticle/Chapter ViewAbstractPublication PagesedbtConference Proceedingsconference-collections
research-article

Biometric access control for e-health records in pre-hospital care

Published:18 March 2013Publication History

ABSTRACT

Efficient and privacy-preserved access to the health record of patients is necessary to correctly practice medicine. This research addresses two concerns in emerging health software systems. First, electronic health records are not yet remotely accessible without using a token (e.g. health card). Second, patients' privacy must be preserved even in special situations such as emergency cases. This paper proposes to exploit biometric identification to access a central health record database featured by privacy policies. The experiments implement a real world scenario in which an ambulance reaches an unconscious patient who needs pre-hospital medical care for which their health record is retrieved from the database and is modified to meet privacy policies. The results demonstrate an average response time of 19.8 seconds when over 200K patients are registered in the database.

References

  1. Futronic, FS88 FIPS201/PIV Compliant USB2.0 Fingerprint Scanner http://www.futronic-tech.com/product_fs88.htmlGoogle ScholarGoogle Scholar
  2. Griaule Java Software Development Kit 2009 http://www.griaulebiometrics.com/page/en-us/fingerprint_sdkGoogle ScholarGoogle Scholar
  3. Microsoft Health Vault http://www.healthvault.com/Personal/index.html.Google ScholarGoogle Scholar
  4. The MedicalAlert Key http://www.healthcentral.com/migraine/reviews-202629-5.htmlGoogle ScholarGoogle Scholar
  5. U.S. Department of Health & Human Services, HIPAA Privacy Rule Summary, http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/index.htmlGoogle ScholarGoogle Scholar
  6. Akinyele, J., Pagano M., Green, M., Lehmann, C., Peterson, Z., and Rubin, A. 2009. Securing electronic medical records on smart phone. SPIMACS '09 Proceedings of the 1st ACM workshop on Security and privacy in medical and home-care systems, (Hyatt Regency Chicago, IL, November 9- 13I, 2009), ACM New York, NY. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Cannoy, S. D. and Salam, A. F. A framework for health care information assurance policy and compliance. Communications of the ACM, vol. 53 Issue 3, March 2010. 126--131. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Dillema, F., and Lupetti, S. 2007. Rendezvous-based access control for medical records in the pre hospital environment. In HealthNet 07' Proceedings of the first ACM SIGMOBILE International Workshop on Systems and Networking Support for Healthcare and Assisted Living Environments, (San Juan, Puerto Rico), ACM New York, NY. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Hinkamp T. System providing medical personnel with immediate critical data for emergency treatments. Patent Application Publication 11/510,317, 2007.Google ScholarGoogle Scholar
  10. Kulkarni, S. and Agrawal, R. 2008. Smarphone driven healthcare system for rural communities in developing countries. HealthNet '08 Proceedings of the 2nd International Workshop on Systems and Networking Support for Health Care and Assisted Living Environments, (Breckenridge, Colorado, June 17, 2008), ACM New York, NY. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Salter, J. and Schroeder M. The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9), 278--1308 (1975).Google ScholarGoogle Scholar
  12. Sharma, D. and Kumar, A. Multi-Modal Biometric Recognition System: Fusion of Face and Iris Features using Local Gabor Patters. International Journal of Advanced Research in Computer Science; vol 2, No. 6, Nov-Dec 2011. 166--175.Google ScholarGoogle Scholar
  13. Shrili-Shahreza, S. New Anti Spam Protocol Using CAPTCHA. Networking Sensing and Control IEEE International 15-17, April 2007.Google ScholarGoogle Scholar
  14. Sukhai, N. 2004. Access Control & Biometrics. InfoSecCD '04 Proceedings of the 1st annual conference on Information security curriculum development, ACM New York NY. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Maltoni, D., Maio, D., Jain, A. K and Prabhakar, S. Handbook of Fingerprint Recognition 2nd. Springer Publishing Company, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Paik, M., Samdaria, N., Gupta, A., Weber, J., Bhatnagar, N., Batra, S., Bhardwaj, M., and Thies, W. 2010. A biometric attendance terminal and its application to health programs in India. NSDR '10 Proceedings 4th ACM Workshop on Networked Systems for Developing Regions, (San Francisco, CA, 15-18 June, 2010), ACM New York, NY. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Pankanti, S., Prabhakar S., and Jain, A. On the individuality of Fingerprints. IEEE Transactions on pattern analysis and machine intelligence, vol. 24, No. 8. August 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Prabhakar S., Pankanti, S., Jain, A. Biometrics Recognition: Security and Privacy Concerns. IEEE Security & Privacy, IEEE Computer Society, March- April 2003. 33--42. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Biometric access control for e-health records in pre-hospital care

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      EDBT '13: Proceedings of the Joint EDBT/ICDT 2013 Workshops
      March 2013
      423 pages
      ISBN:9781450315999
      DOI:10.1145/2457317

      Copyright © 2013 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 18 March 2013

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      EDBT '13 Paper Acceptance Rate7of10submissions,70%Overall Acceptance Rate7of10submissions,70%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader