LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Weerasinghe, D.; Rajarajan, M.; Elmufti, K.; Rakocevic, V. (2008)
Publisher: Schattauer
Languages: English
Types: Article
Subjects: QA75, RA
Identifiers:doi:10.3414/ME9116
Objective: The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. Methods: In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the patient identification. Healthcare service can identify the patient using separate temporary identities in each identification session and medical records are linked to these temporary identities. Temporary identities can be used to enable record linkage and reverse track real patient identity in critical medical situations. Results: The proposed protocol provides main security and privacy services such as user anonymity, message privacy, message confidentiality, user authentication, user authorization and message replay attacks. The medical environment validates the patient at the healthcare service as a real and registered patient for the medical services. Using the proposed protocol, the patient anonymous medical records at different healthcare services can be linked into one single report and it is possible to securely reverse track anonymous patient into the real identity. Conclusion: The protocol protects the patient privacy with a secure anonymous authentication to healthcare services and medical record registries according to the European and the UK legislations, where the patient real identity is not disclosed with the distributed patient medical records.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • 1. Wang J, Du H. Setting up a wireless local area network (WLAN) for a healthcare system. International Journal of Electronic Healthcare 2005; 1 (3); 335-348.
    • 2. Weerasinghe D, Elmufti K, Rajarajan M, Rakocevic V. Xml security based access control for healthcare information in mobile environment. Proceedings of the Pervasive Health Conference and Workshops, 2006; 2006 Nov 29; Innsbruck, Austria. IEEE Explore; 2006. pp 1-6.
    • 3. Gritzalis S, Lambrinoudakis C, Lekkas D, Deftereos S. Technical guidelines for enhancing privacy and data protection in modern electronic medical environments. IEEE Transactions on Information Technology in Biomedicine 2005; 9 (3): 413-423.
    • 4. Rindfleisch TC. Privacy, information technology, and healthcare. Commun. ACM 1997; 40 (8); 92-100.
    • 5. Data Protection & Medical Research, Parliamentary POSTnote, Parliamentary Office of Science and technology, January 2005 (cited 2007 Nov 10); 235. Available from: www.parliament.uk/ documents/upload/POSTpn235.pdf.
    • 6. Kerkri EM, Quantin C, Allaert FA, Cottin Y, et al. An approach for integrating heterogeneous information sources in a medical data warehouse. Journal of Medical Systems 2001; 25 (3): 167-176.
    • 7. Christen P. Privacy-preserving data linkage and geocoding: Current approaches and research directions. Proceedings of the Sixth IEEE International Conference on Data Mining. Hong Kong, 2006.
    • 8. Quantin C, Binquet C, Allaert FA, Gouyon B, Pattisina R, Le Teuff G, Ferdynus C, Gouyon JB. Decision analysis for the assessment of a record linkage procedure. Methods Inf Med 2005; 44; 72-79.
    • 9. Geller LN, Alper JS, Billings PR, Barash CI, Beckwith J, Natowicz MR. Individual, family, and societal dimensions of genetic discrimination: A case study analysis. Science and Engineering Ethics 1996; 2 (1); 71-88.
    • 10. Alan WM. Buying prescription drugs on the internet: Promises and pitfalls. Clevel Clin j med 2006; 73 (3); 282-288.
    • 11. Eysenbach G, Diepgen TL. Patients looking for information on the Internet and seeking teleadvice: motivation, expectations, and misconceptions as expressed in e-mails sent to physicians. Arch Dermatol 1999; 135: 151-156.
    • 12. Eysenbach G, Diepgen T. Responses to unsolicited patient email requests for medical advice on the World Wide Web. JAMA 1998; 280 (15); 1333-1335.
    • 13. KakizakiY,Yamamoto H, Tsuji H. A method of an anonymous authentication for flat-rate service. Journal of Computers 2006; 1 (8); 36-42.
    • 14. Leszczyna R. The solution for anonymous access of IT services and its application to e-health counselling. Proceedings of the 1st IEEE International Conference on Technologies for Homeland Security and Safety (TEHOSS '05), September 2005.
    • 15. Kelman CW, Bass AJ, Holman CD. Research use of linked health data - a best practice protocol. Aust N Z J Public Health 2002; 26: 251-255.
    • 16. Quantin C, Bouzelat H, Allaert FA, Benhamiche AM, Faivre J, Dusserre L: How to ensure data security of an epidemiological followup: quality assessment of an anonymous record linkage procedure. Int J Med Inf 1998; 49(1); 117-122.
    • 17. Quantin C, Bouzelat H, Allaert FA, Benhamiche AM, Faivre J, Dusserre L. Automatic record hash coding and linkage for epidemiological follow-up data confidentiality. Methods Inf Med 1998; 37: 271-277.
    • 18. Oberaigner W. Errors in Survival Rates Caused by Routinely Used Deterministic Record Linkage Methods. Methods Inf Med 2007; 46 (4): 420-424.
    • 19. Churches T. A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registers. BMC Medical Research Methodology 2003; 3 (1): 1-13.
    • 20. Galanti MR, Siliquini R, Cuomo L, Melero JC, Panella M, Faggiano F. Testing anonymous link procedures for follow-up of adolescents in a school-based trial: The EU-DAP pilot study. Prev Med 2007; 44 (2): 174-177.
    • 21. Quantin C, Allaert FA, Dussere L. Anonymous statistical methods versus cryptographic methods in epidemiology. Int J Med Inf 2000; 60: 177-183.
    • 22. Mitseva A, Imine M, Prasad NR. Contextaware privacy protection with profile management. Proceedings of the 4th international workshop on Wireless mobile applications and services on WLAN hotspots, New York, NY, USA. ACM Press; 2006. pp 53-62.
    • 23. Elmufti K, Weerasinghe D, Rajarajan M, Rakocevic V, Khan S. Privacy in mobile web services ehealth. Proceedings of the Pervasive Health Conference and Workshops, 2006; 2006 Nov 29; Innsbruck, Austria. IEEE Explore; 2006. pp 1-6.
    • 24. Hillenbrand M, Gotze J, Muller J, Mullar P. A Single Sign-On Framework for Web-Servicesbased Distributed Applications. Proceedings of the 8th International Conference on Telecommunications ConTEL; 2005 June 15-17; Zagreb, Croatia. IEEE Explore; 2005. pp 273-279.
    • 25. Liberty id-ff architecture overview. Technical report. Liberty Alliance, April 2003.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article