| Literature DB >> 30813642 |
Mario Vega-Barbas1, Fernando Seoane2,3,4, Iván Pau5.
Abstract
Emerging information and communication technologies are expected to foster new, efficient and accessible services for citizens, while guaranteeing the core principles of equality and privacy. Telehealth services are a clear example of a service in which technology can help enhance efficiency. The security of telehealth services is essential due to their critical nature. However, although ample efforts have been made to characterize security requirements for healthcare facilities, users are often worried because they are not aware of or do not understand the guarantees provided by the technology they are making use of. This paper describes the concept of User-Centered Security and characterizes it in the form of requirements. These requirements have been formalized in the form of a security architecture that should be utilized for each telehealth service during its design stage. Thus, such sensitive services will adequately manage patient fears regarding their correct operation. Finally, these requirements and the related security architecture have been validated by means of a test-case that is based on a real home telehealth service in order to ensure their consistency, completeness, realism and verifiability.Entities:
Keywords: personalization; sensitive services; technology acceptance; telehealth; usability; user-centered Security
Mesh:
Year: 2019 PMID: 30813642 PMCID: PMC6427719 DOI: 10.3390/ijerph16050693
Source DB: PubMed Journal: Int J Environ Res Public Health ISSN: 1660-4601 Impact factor: 3.390
Figure 1Generic representation of some user fears related to inclusion and deployment of telehealth services in the digital home [5,6].
Figure 2Graphic overview of a reference service-based architecture proposed as a formalization of the User-Centered security concept.
Description of the services that comprise the reference architecture.
| Service | Name | Description |
|---|---|---|
| 1 | Secure management of user information | This is the location where the user can deposit all information considered critical from the point of view of security. The safe user space must protect information to safeguard the rights of the user. |
| 2 | Credentials management | This manages all the necessary credentials to guarantee the identity of the user and the services accessed. It must offer mechanisms for obtaining new credentials, updating them and classifying them according to their usefulness. |
| 3 | Evidence management | It gathers all the necessary functionalities to create a system of evidence that guarantees security for users. It will also provide adequate storage and facilitate the recovery of evidence. |
| 4 | User acceptance management | This service formalizes the mechanisms necessary to improve psychological acceptance of the user. To do this, the elements must be incorporated in a way that improves the understanding of the transaction by the user, increases confidence that the service is being provided properly, and ensures the continuity of the service at any time. |
| 5 | User Confirmation management | This encompasses all functionality required for user confirmation (user interaction) to be conducted in a secure environment. The user must perform this confirmation in a centralized manner and with secure devices. |
| 6 | User Support management | Using this service, the user may request help from third parties prior to a transaction. |
Figure 3Information exchange model based on the concept of the Contract-Document.
Figure 4Overall graphic depiction of the components of the new security manager based on the User-Centered security architecture and the relationships between these and the telenephrology system.
Analysis of which elements in the new security manager address each User-Centered security requirement that has been proposed.
| Requirement | Elements Involved | Description |
|---|---|---|
| 1 | All | Security is not an aim in itself but should be customized to the final application. The C-D format must be specific to telenephrology. |
| 2, 3, 5, 6, 7, 8 | USE | The USE enables users to manage their own clinical documents. For a telenephrology system, this implies the management of medications and the entities to which they have been sent. Also, this enables the disclosure of data to third parties under previously agreed conditions. |
| 4 | C-D, S/MIME | The security services discussed are provided at two levels: first, the C-D must be designed to satisfy security requirements; and second, the S/MIME wrapping also provides several of the security services that are required. |
| 9 | C-D | By its very nature, the C-D describes all the events in a transaction. |
| 10 | UPM | The UPM is implemented using Smart Cards as a way to enhance the security and usability of the system for users. |
| 11 | UPM and USD | Devices responsible for interacting with the user must be reliable and trusted. Both the UPM and the USD must be constructed according to established computing principles. |
| 12 | UPM and USD | Using the personalization information in the UPM, the USD adapts to the patient’s capacity in terms of accessibility and comprehension. |