Alternative Approaches for Supporting Lattice-Based Access Control (LBAC) in the Fast Healthcare Interoperability Resources (FHIR) Standard

Alternative Approaches for Supporting Lattice-Based Access Control (LBAC) in the Fast Healthcare Interoperability Resources (FHIR) Standard

Alternative Approaches for Supporting Lattice-based Access Control (LBAC) in the Fast Healthcare Interoperability Resources (FHIR) Standard Steven Demurjian1, Thomas Agresta2, Eugene Sanzi1 and John DeStefano3 1Department of Computer Science & Engineering, University of Connecticut, 371 Fairfield Way, Storrs, Connecticut, U.S.A. 2Department of Family Medicine, University of Connecticut Health Center, 263 Farmington Avenue, Farmington, Connecticut, U.S.A. 3SMC Partners, LLC, 10 Columbus Boulevard,, Hartford, Connecticut, U.S.A. [email protected], [email protected], [email protected], [email protected] Keywords: Healthcare, Multi-level Security, Lattice based Access Control, FHIR, Sensitivity Level. Abstract: A major challenge in the healthcare industry is the selective availability, at a fine-grained level of detail, of a patient’s data to the various clinicians, nurses, specialists, home health aides, family members, etc. where the decision of who can see which information at which times is controlled by a patient. The information includes: contact and demographics, current conditions, medications, test results, past medical history, history of substance abuse and treatment, mental health information, sexual health information, records relating to domestic violence, reproductive health records, and genetic information. To control sensitivity, multi-level security (MLS) using lattice-based access control (LBAC) can be used to extend the traditional linear sensitivity levels of mandatory access control with the ability to define a complex lattice of sensitivity categorizations suitable for the wide variety of the aforementioned information types. This paper applies and extends our prior work on multi-level security for healthcare using LBAC by exploring alternative approaches to integrate this approach into the Fast Healthcare Interoperability Resources (FHIR) standard at the specification level of the standard. 1 INTRODUCTION broaden the sharing of a person’s health data beyond traditional boundaries. One of the major challenges in the healthcare industry In this situation, the information that needs to be is to ensure that a patient’s healthcare information is controlled has many different levels of permissions securely accessible to a wide range of stakeholders due to its sensitivity and confidentiality: controlled by (e.g., physicians, clinicians, medical specialists, the various types and granularity of information to nurses, non-medical staff, home health care which patients want to control access (Caine & providers, pharmacists, patients, family members, Hanania, 2013); providing fine grained access etc.) to administer patient care in a variety of settings control to allow a patient to define: who may such as physician offices, hospitals, rehab facilities, view/modify what (Sujansky, et al., 2010); and, emergency rooms, home based care settings, etc. The providing a way for patients to provide their data to challenge from a data security perspective is to an emergency physician in time critical situations provide fine-grained access control to a patient’s (Peleg, et al., 2008). Of particular relevance, the work healthcare information that is able to precisely define of (Caine & Hanania, 2013) identified 11 medical which portions of the information should be available information items that are partitioned into 5 protected to which stakeholders at what time. Granular sharing items such as: contact information and demographics, of medical, health, and fitness data is becoming an information relevant to current conditions, increasingly important aspect of patient care, medications (prescribed and over-the-counter), test considering new government initiatives which aim to results (blood pressure, blood tests, imaging tests, etc.), and past medical history; and, 6 sensitive items such as: history of substance abuse and treatment, mental health information, sexual health information, Data is accessed through resources utilizing a records relating to domestic violence, reproductive location URL as part of a REST API in conjunction health records, and genetic information. with a logical ID. This allows data that resources Given the variety and scope of a patient’s describe to sync between separate FHIR systems. We healthcare information, one security approach that focus on the FHIR base resources (e.g., patients, may address the granularity issue for fine-grained practitioners, and family relationships; organizations, control is multi-level security (MLS), which has its services, appointments, and encounters) and clinical origins in the lattice-based access control model resources which are for a patient’s health history. (LBAC) (Denning, 1976) and the mandatory access Note that these alternative approaches are described control model (MAC) (Bell & LaPadula, 1976). Both at the specification level of the FHIR resources and models rely on sensitivity levels (e.g., unclassified U, not from an implementation perspective. confidential C, secret S, top secret TS, etc.) that are The main objective of this paper is to explore the assigned to objects (termed classifications) and users utilization of our prior work (Demurjian et al., 2017) (termed clearances). Access to objects depends on a on multi-level security for healthcare to incorporate comparison of a user’s clearance against an object’s the lattice and our security approach into the classification based on the type of operation (read, resources of FHIR. Section 2 provides background on write, etc.). MAC utilizes a strict linear order while healthcare, multi-level security, and FHIR. Section 3 LBAC utilizes a lattice. reviews our prior work in LBAC in the health care In fact, our recent work (Demurjian et al., 2017) domain. Section 4 applies our prior LBAC work to explored the use of multi-level security for healthcare FHIR by discussing the way that Level/Categories using an LBAC approach to define five sensitivity can be assigned at the schema level to a resource and levels from least secure to most secure, further its components. This includes exploring two subdivided by different categories to replace the four approaches that utilize various FHIR capabilities and traditional ones (TS, S, C, U): features and reviewing our LBAC implementation Level 0: Basic Demographic Data such as strategy. Finally, Section 5 concludes our paper. city, state, general health condition, fitness data. Level 1: Medical History Data such as patient 2 BACKGROUND name, address, day/month of birth, weight, height, next of kin, history, immunization, This section provides background material on and a separate mental health history. concepts used in the rest of this paper. Section 2.1 Level 2: Summary Clinical Data such as R and x reviews the different kinds of healthcare information OTCs, allergies, diagnoses, treatment plan, and systems. Section 2.2 briefly summarizes the and, for mental health, separate diagnoses, history of MLS as realized by the MAC and LBAC and treatment plan. access control models. Section 2.3 briefly reviews the Level 3: Detailed Clinical Data such as FHIR specification. Section 2.4 briefly discusses imaging studies, laboratory tests, mental multi-level security in healthcare. health encounters (excluding psychotherapy notes), and clinical data (e.g., heart rate, blood oxygen level, blood pressure, etc.). 2.1 Healthcare Information & Systems Level 4: Sensitive Clinical Data used by medical specialists on genetics, substance Caine and Hanania (Caine & Hanania, 2013) abuse, mental health psychotherapy notes, organized the recipients and information in the reproductive health, and domestic violence. context of patients managing and sharing their Different categories of information at the same medical data into 11 data items: contact information sensitivity level can be authorized to users based on and demographics, information relevant to current required Level/Category combinations. conditions, medications, test results, past medical The main focus of this paper is to apply our prior history, history of substance abuse and treatment, work (Demurjian et al., 2017) on multi-level security mental health information, sexual health information, for healthcare that we developed and explore records relating to domestic violence, reproductive alternative approaches to integrate this approach into health records, and genetic information. These data Fast Healthcare Interoperability Resources (FHIR) categories have parallels to what we have loosely (HL7 International, 2020). FHIR provides structures characterized as medical/health/fitness data in this for sharing EHR data between healthcare providers. paper. However, there are three categories of data that we believe are missing from this list: fitness data collected by patients utilizing fitness devices and From a definition and management perspective, a mobile apps; medical data collected by patients using security administrator would set the clearance level of their own medical devices and mobile apps; and, users following the predefined sensitivity levels (e.g., medical data collected by patients at the direction of TS, S, C, and U) to establish the levels for both their physician (e.g., Holter Cardiac Monitor) that subjects and objects. These levels are then augmented may record data or feed data to the physician via a on a user-by-user basis by assigning the ability to read phone link, the web, or a mobile app. Thus, we and/or to write an object. Once this has all been propose adding Patient-Supplied

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    12 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us