| Literature DB >> 23485880 |
Nathan Regola1, Nitesh V Chawla.
Abstract
Electronic health records are being adopted at a rapid rate due to increased funding from the US federal government. Health data provide the opportunity to identify possible improvements in health care delivery by applying data mining and statistical methods to the data and will also enable a wide variety of new applications that will be meaningful to patients and medical professionals. Researchers are often granted access to health care data to assist in the data mining process, but HIPAA regulations mandate comprehensive safeguards to protect the data. Often universities (and presumably other research organizations) have an enterprise information technology infrastructure and a research infrastructure. Unfortunately, both of these infrastructures are generally not appropriate for sensitive research data such as HIPAA, as they require special accommodations on the part of the enterprise information technology (or increased security on the part of the research computing environment). Cloud computing, which is a concept that allows organizations to build complex infrastructures on leased resources, is rapidly evolving to the point that it is possible to build sophisticated network architectures with advanced security capabilities. We present a prototype infrastructure in Amazon's Virtual Private Cloud to allow researchers and practitioners to utilize the data in a HIPAA-compliant environment.Entities:
Mesh:
Year: 2013 PMID: 23485880 PMCID: PMC3636251 DOI: 10.2196/jmir.2076
Source DB: PubMed Journal: J Med Internet Res ISSN: 1438-8871 Impact factor: 5.428
Audit network security group rules.a
| Item # | Direction | Source or Destination Address | Port/Protocol | Purpose |
| 1 | IN | Data Handling Room | 22/TCP | SSH traffic for management |
| 2 | IN | Data Handling Room | 8000/TCP | Splunk SSL connection for management of monitoring software |
| 3 | IN | 10.0.1.0/24 | 10514/TCP | Syslog traffic from servers |
| 4 | OUT | 0.0.0.0/0 (any network) | 80/TCP | Retrieve operating system patches |
| 5 | OUT | 10.0.0.2/32 | 53/UDP | DNS lookup |
| 6 | OUT | 10.0.0.1/32 | 67/UDP | DHCP server in Amazon Virtual Private Cloud |
| 7 | OUT | 0.0.0.0/0 | 123/UDP | NTP servers for time synchronization |
aThe Security Group is composed of two rule sets, inbound and outbound. The order of the rules is not important, but they are numbered for convenience in the table. When the direction is “IN”, the address field represents a source address. When the direction is “OUT”, the address field represents a destination address. Amazon’s web-based tools automatically populate the type of address field since each type of security group (IN or OUT) is stateful and automatically has an accompanying rule in the opposite direction to enable the traffic specified in that particular rule. An “OUT” rule in a stateful firewall can only control traffic to a destination.
Security group for analytics servers.a
| Item # | Direction | Source or Destination Address | Port/Protocol | Purpose |
| 1 | IN | 129.74.0.0/16 | 22/TCP | SSH traffic for users at our campus |
| 2 | IN | 129.74.0.0/16 | 443/TCP | SSL access for Apache web server to support web applications |
| 3 | OUT | HIE_IP/32 | 443/TCP | SSL access to retrieve data from HIE |
| 4 | OUT | 10.0.0.10/32 | 10514/TCP | Syslog traffic to audit server |
| 5 | OUT | 10.0.0.2/32 | 53/UDP | DNS lookup |
| 6 | OUT | 10.0.0.1/32 | 67/UDP | DHCP server in Amazon Virtual Private Cloud |
| 7 | OUT | 0.0.0.0/0 | 123/UDP | NTP servers for time synchronization |
aThe Security Group is composed of two rule sets, inbound and outbound. The order of the rules is not important, but they are numbered for convenience in the table. When the direction is “IN”, the address field represents a source address. When the direction is “OUT”, the address field represents a destination address. Amazon’s web-based tools automatically populate the type of address field since each type of security group (IN or OUT) is stateful and automatically has an accompanying rule in the opposite direction to enable the traffic specified in that particular rule. An “OUT” rule in a stateful firewall can only control traffic to a destination.
Figure 1Our prototype environment for HIPAA data, utilizing two subnets, the “Data Network” for servers, and the “Audit Network” for an audit and monitoring server.
Audited events from servers.
| Item # |
| Source | Event | Notes |
| 1 | SSH login | iptables host based firewall | SSH connection containing the source IP address | Traffic is logged before being accepted, ideally capturing any login attempts that cause the SSH daemon to fail. |
| 2 | SSH login | SSH daemon | SSH login, including type of authentication, and username | Provides more detail than 1, but occurs after the TCP connection is allowed. |
| 3 | Standard Redhat Linux System Events | Various Applications and System Services |
|
|
| 4 | HTTPS request to HIE | Iptables host-based firewall |
| Establish baseline volume of requests and monitor for abnormal behavior |