140 likes | 273 Views
Securing a Web-based EPR An approach to secure a centralized EPR within a hospital. Ana Ferreira [amlaf@med.up.pt] Ricardo Correia Altamiro da Costa Pereira. Outline. Introduction Objective & Scope Security Assessment Confidentiality Integrity Availability Discussion.
E N D
Securing a Web-based EPRAn approach to secure a centralized EPR within a hospital Ana Ferreira [amlaf@med.up.pt] Ricardo Correia Altamiro da Costa Pereira
Outline • Introduction • Objective & Scope • Security Assessment • Confidentiality • Integrity • Availability • Discussion ICEIS2004
Introduction (1) • EPR (Electronic Patient Record) “The EHR will ensureappropriate informationis availablestreamliningcare process… Thisreducesthe likelihood ofcomplaintsorlitigation” “Some projects found that security is not as big a worry for patients as expected. Yet patient organisations express that suchfearexists, it may be fear of the unknown, which isalleviatedwhen it is clear thatsecurityarrangements are adequate to supportconfidentiality.” NHS Information Authority: ERDIP - EHR issues and Lessons Learned Report (October 2002) “Deve ser promovida a intensa articulação entre os vários níveis de cuidados de saúde, reservando a intervenção dos mais diferenciados para as situações deles carecidas e garantindo permanentementea circulação recíproca e confidencial da informação clínica relevante sobre os utentes. …………… Ter rigorosamente respeitada a confidencialidade sobre os dados pessoais revelados.” Lei nº 48/90 De 24 de Agosto Lei de Bases da Saúde ICEIS2004
Introduction (2) • EPR (Electronic Patient Record) • Fundamental part of healthcare information systems • Information Security (CIA - confidentiality, integrity and availability) is essential for its success BUT • Usually an afterthought • Difficult to integrate afterwards ICEIS2004
Objective & Scope • Biostatistics and Medical Informatics Department: • Build a centralized EPR (HSJ.ICU) • Hospital S. João, Porto - 1350 beds and 56 departments • Integrate heterogeneous information from several departments (11 to start with) • Main concerns: • Think security from the beggining • Security issues that are mainly user-driven • Use web technology (cost-effective, easy & fast to integrate, many standards available) ICEIS2004
General Assessment • Infrastructure HSJ.ICU • People’s concerns • Unauthorized access notification (confidentiality) • Valid and reliable reports (integrity) • Authorized access whenever needed (availability) ICEIS2004
Provide for confidentiality (1) • Security mechanisms: • Access control mechanisms • Encipherment (secure communications) Access Control Mechanisms • Microsoft Active Directory • LDAP protocol • Standards – ENV 12251 • - Separation of concerns • - Better management • - Easy to apply standards ICEIS2004
Provide for confidentiality (2) Encipherment - Secure Communications • Encryption provides non-understandable information • Protects against eavesdropping, sniffing, tampering or message forgering • Protects information whilst in transit • Web technology PROTOCOL: • TLS – Transport Layer Security standard (SSL V3) • Widely used for secure client/server web transactions • Most used browsers (IE & Netscape) support it ICEIS2004
Provide for integrity • Security mechanisms Digital signatures • Reliable and valid reports • Integrity (hash + timestamp) • GnuPG - Automatic process • Only one key pair BUT • Performance issues • Revocation issues ICEIS2004
Provide for availability Verify mechanisms for: • Redundancy • Auditing • Automatic notification • Automatic backups • Redundancy (equipment/power) • Backups regularly made • Session, user and error logging • Monitoring for system’s correction • Monitoring for system’s misuse ICEIS2004
Discussion • Information security from the beginning • Structured thought – CIA • People involved all the way – security awareness • Rooted security • Use of Standards along with Internet technology • Most difficult: - Define policies in such a big, heterogeneous place • Future work: • Real production environment • Testing (performance; security; usability) ICEIS2004
Bibliography • Barrows, C., 1996. Barrows C, Clayton P. Privacy, Confidentiality and electronic medical records. JAMIA. 3:139-148. • Bemmel, V., 1997. Handbook of Medical Informatics. M. A. Musen Editors. Springer. • Benson, T., 2002. Why general practitioners use computers and hospital doctors do not-Part2: scalability. BMJ. 325:1090-1093. • CEN/TC251, 2000. ENV 12251: Health Informatics - Secure user identification for health care management and security of authentication by passwords. • Correia, R., 2001. Acquisition, processing and storage of vital signals in an electronic patient record system. Presented at Mednet 2001. • Ferreira, A., 2002. Electronic Patient Record Security. Msc in Information Security. Information Security Group. Royal Holloway, University of London. • GnuPG, 2003. Gnu Privacy Guard, Open PGP. Available at: http://www.gnupg.org. • Godoy, C., 2002. A privacidade e o registro informatizado na Faculdade de Medicina de Marília. Encontro Paulista de Pesquisa em Ética Médica 2002. • Hassey, A., 2001. A survey of validity and utility of electronic patient records in a general practice. BMJ. 322:1401-1405. • IETF, 1999. TLS – Transport Layer Security. RFC 2246. Internet Engineering Task Force - IETF. Available at: ftp://ftp.rfc-editor.org/in-notes/rfc2246.txt. • IETF, 2003. LDAP – Lightweight Directory Access Protocol . RFC 2251. Internet Engineering Task Force - IETF. Available at: http://www.ietf.org/internet-drafts/draft-ietf-ldapbis-protocol-18.txt. • Kurtz, G., 2003. EMR confidentiality and information security. Journal of Healthcare information management. 17(3):41-48. • MSDN, 2003. Microsoft Active Directory. Available at: http://msdn.microsoft.com/library/default.asp?url=/library/en-us/netdir/ad/active_directory.asp. • PHP, 2003. PHP Hypertext Preprocessor. Available at: http://www.php.net. • Salazar-Kish, J., 2000. Development of CPR Security Using Impact Analysis. AMIA Annual Symposium. • Shortliffe, E., 1999. The Evolution of Electronic Medical Records. Academic Medicine;74(4):414-419. • Silverman, R., 2000. A Cost-Based Security Analysis of Symmetric and Asymmetric Key Lengths. RSA Laboratories Bulletin, 13. • Stausberg, J., 2003. Comparing paper-based with Electronic Patient Records: Lessons Learned during a Study on Diagnosis and Procedure Codes. J Am Med Inform Assoc. 10:470-477. ICEIS2004