260 likes | 412 Views
Exploring Security Techniques for Integrated Access of HIT Systems. Mohammed Baihan Computer Science & Engineering Department The University of Connecticut Mohammed.baihan@uconn.edu Spring 2014. Overview. Background Access Control Models Limitations w.r.t. HIT systems
E N D
Exploring Security Techniques for Integrated Access of HIT Systems Mohammed Baihan Computer Science & Engineering Department The University of Connecticut Mohammed.baihan@uconn.edu Spring 2014
Overview • Background • Access Control Models • Limitations w.r.t. HIT systems • Access Control for HIT systems • MG-RBAC • Towards Dynamic Access Control • A Dynamic, Context-Aware Security Infrastructure • Conclusion • Future work
Why Security in Healthcare • Verizon report 2014 • Data theft and loss • Insider misuse • Unintentional human error • Hackers target Boston Children’s Hospital • HIPAA data breaches increased from 2009 to 2012
Access Control Models (DAC) Discretionary Access Control • provides the resource’s owner with the discretion to control access to resources • For example, UNIX operating system implements files permission model to assign resources access rights • A user may restrict access to a file by assigning [rwxr-xr-x] to that file, for example.
Access Control Models (RBAC) Role-based Access Control • in RBAC-based system there are roles • Each role is associated with access rights for each resource • Each user has a role • To change user access rights, remove the current role from the user and assign him another role.
Access Control Models (RBAC) Role-based Access Control
Access Control Models (XML-based AC) Extensible Access Control Markup Language (XACML) • XACML is an access control language that enables designers to specify policies to secure XML documents • These polices can be used to control access to resources in one system or across multiple connected systems. • Users and resources have attributes and values. • XACML uses two components: the policy enforcement point or PEP and the policy decision point or PDP
Access Control Models (XML-based AC) Extensible Access Control Markup Language (XACML) • PEP creates an access request based on the user’s attributes and requested resource • PDP processes this request by querying it against applicable policy and system state using the policy access point or PAP • PAP returns (permit, deny, indeterminate, or not applicable) to PEP • PEP allows or rejects the user’s access request
Access Control Models (XML-based AC) Extensible Access Control Markup Language (XACML) XACML architecture
Limitations w.r.t. HIT systems The healthcare industry requires • Flexible, on-demand authentication • users are authenticated according to their task-specific situations • Extensible context-aware access control • enables administrators to specify more precise and fine-grain authorization polices for any application • Dynamic authorization enforcement • makes authorization decisions based upon runtime parameters rather than simply the role of the user • Emergency, or exceptions, access • if the normal access control mechanism won’t grant a user legitimate access, use exception mechanism to gain access to required information
MG-RBAC • MG-RBAC: • an enhanced access control mode combining RBAC with the use of Medical Guidelines • Medical guidelines contain temporal and contextual information that may be used to make more informed, dynamic access control decisions
Medical Guideline example • treatment of GDM, diabetes in pregnant women (blood sugar level is 140-200 mg/dl): • Glucose monitoring: patient verifies that glucose level < 140 mg/dl (1-hour post meals), < 100 mg/dl (fasting and pre-prandial). • Nutrition: solve it with diet. Regular follow-ups (every 1-4 weeks) different for each patient. • Insulin therapy: initiated if blood sugar is consistently high and diet modification has failed
Medical Guideline example • First: guideline is selected based on diagnosis (blood sugar measurement of 140-200 mg/dl) as following:
Medical Guideline example • One possibility is periodic consultations, then physician should be assigned a role to access patient data only at each visit as following:
Medical Guideline example • Another possibility is an event that triggers access needs, then physician should be assigned a role to access patient data only at that time as following:
MG-RBAC model • Based on the this example, an MG-RBAC model can be created as following:
MG-RBAC model • The Guideline Monitor receives triggered events and track time for next periodic event. • Then, the Access Control Monitor will be requested to activate roles. • Then, Access Control Monitor alerts users for their roles.
Dynamic Access Control • Workflow knowledge: • Medical guidelines • work plans and observed behavior • audit data • all contain information about workflow in healthcare
Medical Guidelines • The Guideline Monitor receives triggered events and track time for next periodic event. • Then, the Access Control Monitor will be requested to activate roles. • Then, Access Control Monitor alerts users for their roles.
Observational data Information needs in pre-rounds meeting
Observational data • Clinicians were observed at work in the pre-rounds meeting and ward rounds • The observed information are: • who were present • the subject of discussion (patient) • information sources (written/electronic and oral) • type of information used
Observational data • Patient NN is new to doctor • nurse fills in some background info. • Several information sources are used: • paper-based (the patient list and the patient chart) • computer-based information systems (the electronic patient record (EPR) and the radiology imaging system (IDS)) • observations may be used to uncover information needs in specific situations with a specific diagnosis and link these to roles
Usage patterns from audit logs • audit logs have traces of user actions: • the user's role at the time • what information was accessed • for which patient and what actions were performed • From these audit logs it is possible to create generalized usage patterns per role
Usage patterns from audit logs • this information can be used for access control as: • Examine the reasons for using exception access • Most frequent reasons are candidates for inclusion in the access control rule set
Usage patterns from audit logs • Look for common usage patterns that describe workflows inwards. Examples are: • Temporal patterns: • If action X occurs – then action Y occurs within Z time. • Responsibility patterns • If action X is performed by Role A – then action Y is performed by role B. • Location patterns • If action X is performed at ward 1 – then action Y is performed at ward 2. • Situation patterns • Role X is in situation S in a guideline, and requires specific information.
Future work • exploring MG-RBAC further by creating a more detailed model and developing a proof-of-concept implementation. • optimistic access control, based on analysis and learning from practice as intended and as enacted, is a first step towards both effective relevance ranking and optimal access control