UNKNOWN2011 - Ensuring The Security and Privacy of Information in Mobile Health-Care Communication Systems PDF
UNKNOWN2011 - Ensuring The Security and Privacy of Information in Mobile Health-Care Communication Systems PDF
UNKNOWN2011 - Ensuring The Security and Privacy of Information in Mobile Health-Care Communication Systems PDF
Research Article
The sensitivity of health-care information and its accessibility via the Internet and mobile
technology systems is a cause for concern in these modern times. The privacy, integrity and
confidentiality of a patients data are key factors to be considered in the transmission of medical
information for use by authorised health-care personnel. Mobile communication has enabled
medical consultancy, treatment, drug administration and the provision of laboratory results to
take place outside the hospital. With the implementation of electronic patient records and the
Internet and Intranets, medical information sharing amongst relevant health-care providers
was made possible. But the vital issue in this method of information sharing is security: the
patients privacy, as well as the confidentiality and integrity of the health-care information
system, should not be compromised. We examine various ways of ensuring the security and
privacy of a patients electronic medical information in order to ensure the integrity and
confidentiality of the information.
Introduction
Before the application of information and communication technology (ICT) in health-care delivery
systems, some of the problems faced were the incorrect recording of diagnoses, unavailability of
patient information, delays in accessing the information, space limitations for record-keeping
and insufficient personnel for patient monitoring. The paradigm shift in health information
technology has enabled a reduction in these hurdles and a more personalised service to be
delivered. Through the acceptance of the Internet as a tool for health-care providers, medical
organisations are establishing websites. In addition to being reservoirs of descriptive information
about the facilities and services of the organisations, these websites allow patients global access
to their medical information, such as clinical laboratory reports, appointment information, health
and prevention reports, billing information and other components of their patient record, via the
Internet.1,2
Acceptance of the Internet as a tool by health-care providers has not only enabled a transformation
from paper-based records to electronic patient records (EPRs), but has also facilitated the use of
sensor networks for remote patient monitoring, which allows for easy accessibility of medical
information by health-care practitioners. For example, Intels Integrated Digital Hospital
combines mobile point-of-care and other information technology concepts to integrate patient
and administrative information into a comprehensive digital view of a patients health.3 The
corollary for global access is that electronic use (from medical terminologies to networking
protocols) must be standardised. Another consideration when using this technology to enhance
health-care delivery is the need for security and privacy, so as to maintain fundamental medical
ethics and social expectations. Such considerations include data access rights; where, when and
how data are stored; security during transmission; data analysis rights; and governing policies.
In this paper, we examine various ways of implementing data security measures in a mobile
health-care environment when data are being transmitted and where they are stored in the
database repository. Data encryption, digital watermarking and steganography are various ways
to protect the integrity of the data (which may be in the form of text, image, video or audio) in
noisy communication channels during the transmission of patient data. Security for the database
server and central monitoring system (in the case of sensor networks or telemedicine) is necessary
to protect the integrity of the stored data in a mobile health-care communication system. We
also present the theoretical background to the issues of privacy and data protection and discuss
dynamism in health-care delivery systems, the storage of patient records and the transformation
from eHealth (electronic health) to mHealth (mobile health). Some real-life scenarios regarding
the privacy and security of patient records are given and recommendations for the improvement
of database security and privacy are discussed before we offer our conclusions.
http://www.sajs.co.za
Page 2 of 7
Research Article
Research Article
Page 3 of 7
Laboratory
information system
Pharmacy
Patient
registration
Orthopaedics
Appointment scheduling
Surgery
Radiology
information system
FIGURE 1: A depiction of the information sharing relationships (ecosystem) between patients and health-care services.
Patient records
A patient record may be defined as any relevant record made
by a health-care practitioner at the time of or subsequent to a
consultation and or examination or the application of health
management10. A patient record contains information about
the health of an identifiable individual recorded by healthcare professionals, either personally or at their direction.11
The patient record documents the trend of medical activities
over a particular period of time, including the treatments
prescribed for an ailment. An electronic medical record is the
record of the medical information of a patient for a specific
enterprise, such as a hospital, whereas the EPR contains
all the health-care-related information on one person, that
is, the integration of the patients health information from
diverse and disparate systems, as is practised in a distributed
environment.12
Patient records can be kept in paper or electronic form. Paperbased records require significantly more storage space than
digital records. Patient records should be kept for a certain
number of years and such retention incurs a storage cost.
Paper-based records also require collation, especially when
parts are stored in different locations, whereas electronic
records do not. Another problem associated with paperbased records is that of poor legibility, which may result
in serious medical error. The interpretation of standard
medical jargon and the standardisation of abbreviations are
unreliable in paper-based records, whereas these issues are
automatically addressed in electronic records because of the
standardisation of forms, terminologies and abbreviations
used for the input of data electronically.
EPRs take the current paper-based documents and convert
them to a digital format so that they are available in an
electronic form. When an EPR is initiated, information is
gathered from a patients record at a specific location and
the information is then shared via the Internet with the
authorised health-care practitioners who have the right to
http://www.sajs.co.za
Page 4 of 7
Research Article
Page 5 of 7
Encrypting
Encrypting prevents a third person from understanding
patient information if it is intercepted. A patients record
can be digitally scrambled such that only authorised people
who possess the key to the encryption can transform the
Research Article
Digital watermarking
Digital watermarking of data provides a means to protect
information in cases where access control to the information
may be compromised. It is the art of embedding data
(as a watermark) into a multimedia object, such that the
watermark can be detected or extracted later without
impairing the object. Watermarks are often inserted into
images that can be detected when the image is compared
TABLE 1: Comparison between symmetric encryption systems (stream algorithms) and asymmetric encryption systems (block algorithms).
Encryption type
Advantages
Disadvantages
Symmetric
Transformational speed is high because the symbol is encrypted without
(stream encryption algorithm) regard for any other plain text symbols each symbol is encrypted as soon
as it is read. Encryption algorithm is the factor that determines the time to
encrypt a symbol, but not the time it takes to receive the plain text.
Asymmetric
(block encryption algorithm)
Low error propagation: an error in the encryption process affects only that
character, because each symbol is separately encoded.
High diffusion: information from the plain text is diffused into several
cipher text symbols. One cipher text block may depend on several plain
text letters.
http://www.sajs.co.za
Page 6 of 7
Research Article
Database security
Database security refers to security within the server,
excluding data transmission across the network. An
advantage of database technology is the ability to perform
data mining a technique that involves the use of analytical
tools to study corporate data in order to increase the efficiency
of the organisation. Data mining allows for information
sharing with other organisations.34 However, information
sharing has security implications and so restricting access to
the database is essential. Restricting access can be achieved
by a multilevel security database, for which access is
controlled by policies that are enforced and limit the sharing
of information to only those who are authorised.35 Undesired
data mining is resolved by getting an integral part of the
data mining with some guiding rules so as to make data
manipulations difficult for an unauthorised user36; applying
such rules will reinforce the security of the database.
Prevention of unauthorised data mining can be achieved by:
Steganography
Steganography is the ancient art and science of hiding
information by embedding messages within other, seemingly
innocent-looking messages. The word steganography is
derived from a work by Trithemius (14621516) entitled
Steganographia a Greek word meaning cover writing.
Steganography (hiding the message being communicated)
differs from cryptography (obscuring the meaning of the
message). The communication medium is referred to as the
cover object, the stego object is the embedded message
and together they form the stegosystem. A stego key keeps
the operation secure and stego objects cannot be extracted
from cover objects within the stegosystem without the stego
key.32,33 Concealment of secret messages within a natural
language has been in existence as early as the 16th century.
However, the increase in digital information transmission
and distribution has resulted in the spread of steganography
from ordinary text to multimedia transmission. An example
of such communication is the null cipher.
The null cipher applies a series of characters and words
intended to confuse a hacker. The communication appears
as nonsense, but can be decoded to a meaningful message.
This is an ancient form of encrypted communication in
which a message is surrounded by a large number of
redundant characters (known as null ciphers). This form
of communication is, in fact, known to have been used by
the German army during World War II. The following is an
example of a null cipher form of steganography: Apparently
neutrals protest is thoroughly discounted and ignored.
Isman hard hit. Blockade issue affects pretext for embargo on
by-products, ejecting suets and vegetable oils. Decoding this
message by extracting the second letter in each word reveals
the message: Pershing sails from NY June 1.
http://www.sajs.co.za
Page 7 of 7
Conclusion
Methods of protecting electronic health data have been
discussed and weaknesses in real-world applications
have been highlighted. Many of the existing data security
techniques are not yet robust enough to prevent detection
and removal of embedded data. Notably, the quality of the
media should not noticeably be degraded upon addition of a
watermark; watermarks should be undetectable even in the
presence of the payload of the message (or message content),
multiple watermarks in a payload should not interfere with
each other, watermarks should survive hacking attacks and,
most importantly, digital watermarks should not degrade the
payload message. Hence, it is suggested that implementation
of digital watermarking should be complemented with
data encryption mechanisms to improve the assurance and
integrity of the data stored, retrieved or transmitted across
electronic devices. It is vital that both patients and healthcare workers have confidence in the confidentiality and
integrity of the information and data, and the security of the
transmission channels.
References
Research Article
8. Luft HS, Miller RH. FHF research studies results presented in Boston: The
role of information in the changing models of managed care. Federation of
Health Funds Newsletter; 1996.
9. Blobel B. Security requirements and solutions in distributed electronic
health records. Paper presented at: IFIP TC 11. Proceedings of the IFIP
TC 11 Thirteenth International Conference on Information Security; 1997
May 1416; Copenhagen, Denmark. London: Chapman and Hall; 1997. p.
337389.
10. De Klerk A. The right of patients to have access to their medical records:
The position in South African law. Med Law. 1993;12:7783. PMid:8377624
11. Making and keeping medical records. MPS Casebook 13 (International).
2000(July):68.
12. Kohn P. Computer-based patient record systems: The future of health care
is in digital technology. Inform. 1995:3846.
13. James MW, Pascale C. Health IT systems: From tasks to processes the case
for changing health information technology to improve health care. Health
Aff. 2009;28:24672477.
14. Wikipedia. Electronic medical record [homepage on the Internet]. No
date [cited 2011 June 30]. Available from: http://en.wikipedia.org/wiki/
Electronic_medical_record
15. Eysenbach G. What is eHealth? J Med Internet Res. 2001;3:20. doi:10.2196/
jmir.3.2.e20, PMid:11720962, PMCid:1761894
16. Agbele KK, Nyongesa HO, Adesina AO. ICT and information security
perspectives in e-health systems. J Mobile Commun. 2010;1(4):1722.
17. Blake G. What is eHealth?: A systematic review of published definitions. J
Med Internet Res. 2001;7:1.
18. Vital Wave Consulting.mHealth for Development: The opportunity of
mobile technology for healthcare in the developing world. Washington
D.C. and Newbury: UN FoundationVodafone Foundation Partnership;
2009.
19. Vensa Health. About TXT2Remind [homepage on the Internet]. No
date [cited 2011 June 30]. Available from: http://hp.vensahealth.com/
SolutionsServices/Txt2Remind/AboutTxt2Remind.aspx
20. Curioso WH. New technologies and public health in developing countries:
The cell PREVEN project. In: Murero M, Rice RE, editors. The internet and
health care: Theory research and practice. Mahwah: Lawrence Erlbaum
Associates, 2006; p. 375393.
21. Curioso WH, Mechael PN. Enhancing M-Health with south-tosouth collaborations. Health Aff. 2010;29(2):264267. doi:10.1377/
hlthaff.2009.1057, PMid:20348071
22. Tahir MN. A secure online medical information system in a distributed
and heterogenous computing environment. Inf Secur. 2004;15(2):211215.
23. Smith E, Eloff JHP. Security in health-care information systems current
trends. Int J Med Inform. 1999;54:3954. doi:10.1016/S1386-5056(98)001683
24. Calcote S. Developing a secure health-care information network on the
internet. Healthc Financ Manage. 1997;51(1):68.
25. Patel A, Kantzavelou I. Implementing network security guidelines in
health-care information systems. Paper presented at: MEDINFO 1995.
Proceedings of the Eighth World Congress on Medical Informatics;
1995 July 2327; Vancouver, Canada. Alberta: Healthcare Computing &
Communications Canada Inc; 1995. p. 671674.
26. Grant K, Lewis M, Nongogo N, Strode A. HIV/AIDS and the law: A
trainers manual. Cape Town: The Learning Network; 2005.
27. Yasser S, Mohamed A, Othman OK, Zaidan AA, Zaidan BB. A review
on multimedia communications cryptography. Res J Inf Technol. doi:
10.3923/rjit., 2011.
28. Health Professions Council of South Africa. Guidelines: The management
of patients with HIV infection or AIDS. Pretoria: Health Professions
Council of South Africa; 2001.
29. Carter G, Clark A, Dawson E, Nielsen L. Analysis of DES double key mode.
Paper presented at: IFIP TC 11. Proceedings of the IFIP TC 11 Eleventh
International Conference on Information Security; 1995 May 0812; Cape
Town, South Africa. London: Chapman and Hall; 1995. p. 13127.
30. Pfleeger CP. Security in computing. 2nd ed. Upper Saddle River: PrenticeHall; 1997.
http://www.sajs.co.za