| Literature DB >> 35967078 |
Nattaruedee Vithanwattana1, Gayathri Karthick1, Glenford Mapp1, Carlisle George1, Ann Samuels2.
Abstract
The deployment of Internet of Things platforms as well as the use of mobile and wireless technologies to support healthcare environments have enormous potential to transform healthcare. This has also led to a desire to make eHealth and mHealth part of national healthcare systems. The COVID-19 pandemic has accelerated the requirement to do this to reduce the number of patients needing to attend hospitals and General Practitioner surgeries. This direction, however, has resulted in a renewed need to look at security of future healthcare platforms including information and data security as well as network and cyber-physical security. There have been security frameworks that were developed to address such issues. However, it is necessary to develop a security framework with a combination of security mechanisms that can be used to provide all the essential security requirements for healthcare systems. In addition, there is now a need to move from frameworks to prototypes which is the focus of this paper. Several security frameworks for eHealth and mHealth are first examined. This leads to a new reference model from which an implementation framework is developed using new mechanisms such as Capabilities, Secure Remote Procedure Calls, and a Service Management Framework. The prototype is then evaluated against practical security requirements.Entities:
Keywords: Capabilities; Healthcare systems; Information security frameworks for eHealth and mHealth; Secure remote procedure calls; Service management framework
Year: 2022 PMID: 35967078 PMCID: PMC9362615 DOI: 10.1007/s40860-022-00180-7
Source DB: PubMed Journal: J Reliab Intell Environ
Synthesis of security requirements
| Requirements | Author | ||||
|---|---|---|---|---|---|
| [ | [ | [ | [ | [ | |
| Confidentiality | * | * | * | * | * |
| Integrity | * | * | * | * | * |
| Availability | * | * | * | * | * |
| Non-repudiation | * | * | * | ||
| Authentication | * | * | * | ||
| Authorisation | * | * | |||
| Accountability | * | * | |||
| Auditability | * | * | * | ||
| Reliability | * | * | |||
Synthesis of healthcare environment components
| Components | Author | ||||
|---|---|---|---|---|---|
| [ | [ | [ | [ | [ | |
| Device | * | * | |||
| Hospital infrastructure | * | * | |||
| Digital data | * | * | * | * | |
| Cloud storage | * | * | * | ||
Fig. 1A proposed information security framework for healthcare systems [16]
Fig. 2Capability-based system components
Fig. 3Capability format
Fig. 4SYS field structure
Hospital environment capability list
| Object | Doctor | Nurse | Technician | IT Staff | |
|---|---|---|---|---|---|
| Device | Hand sanitiser Dispenser | C | C | C | C |
| Medical cart | R | R | x | x | |
| Blood pressure meter | R | R | x | x | |
| X-ray machine | R | x | R | x | |
| Personal computer | P | P | P | P | |
| Location | Main entrance | C | C | C | C |
| Parking | C | C | C | C | |
| Counselling room | R | R | x | x | |
| Operating theatre | R | R | x | x | |
| Laboratory | R | x | R | x | |
| Informatics unit | x | x | x | R | |
| Personal office | P | P | P | P | |
| Digital data | EHRs | R | R | x | x |
| Clinical photograph | R | R | R | x | |
| X-ray film | R | R | R | x | |
| Consent form | R | R | x | x | |
| Personal correspondences | P | P | P | P | |
| IT infrastructure | Public wifi | C | C | C | C |
| On-premise data storage | x | x | x | R |
Types supported by SRPC
| TYPE | PARAMETER_NO | NUMBER OF BYTES |
|---|---|---|
| INT | 1 | 4 |
| U_INT | 2 | 4 |
| SHORT | 3 | 2 |
| U_SHORT | 4 | 2 |
| CHAR | 5 | 1 |
| U_CHAR | 6 | 1 |
| LONG | 7 | 8 |
| U_LONG | 8 | 8 |
| FLOAT | 9 | 4 |
| DOUBLE | 10 | 8 |
| CAPABILITY | 11 | 16 |
| ARRAY | 12 | Size of array * Size of parameter type |
| USER_DEFINED_TYPE | 13 | Variable |
Examples of patient records
| ID | NAME | Gender | DoB | Contact_No | Address | Emergency_Contact_No |
|---|---|---|---|---|---|---|
| (INT) | (CHAR) | (CHAR) | (UCHAR) | (UCHAR) | (CHAR) | (UCHAR) |
| 1 | John Smith | Male | 130291 | 07648832990 | 23 Langdon Park, London SE166AP | 02080342615 |
| 2 | Rebecca Davis | Female | 030978 | 07466345613 | 4 Grove Road, Birmingham B145TX | 07988743214 |
| 3 | Nathan Omar | Male | 310195 | 07584421499 | Flat 1, 12 Green close, Oxford OX11AA | 07828234556 |
Encoding of a patient record using SRPC
| Field | Type | Value | Add type info | Add type value |
|---|---|---|---|---|
| Patient record | User defined type = 13 | 1 - application-specific | No. of entities | 7 (made up of 7 fields) |
| ID | INT = 1 | 1 | ||
| Name | ARRAY = 11 | No. of entities | 10 | |
| CHAR =5 | John Smith (includes space) | |||
| Gender | ARRAY = 11 | No. of entities | 4 | |
| CHAR = 5 | Male | |||
| DoB | ARRAY = 11 | No. of entities | 6 | |
| UCHAR = 6 | 130291 | |||
| Contact No. | ARRAY = 11 | No. of entities | 11 | |
| UCHAR = 6 | 07648832990 | |||
| Address | ARRAY = 11 | No. of entities | 32 | |
| CHAR = 5 | 23 Langdon Park, London SE16 6AP | |||
| Emergency contact no. | ARRAY = 11 | No. of entities | 11 | |
| UCHAR = 6 | 02080342615 |
Fig. 5SRPC format
Fig. 6Effect of introducing SMF in the client–server environment
Fig. 7Details of the service management framework
Registration service protocol for service providers
| Source ->Destination | Type of Message | Actions at Destination |
|---|---|---|
| Service Provider ->SManL | Register Service Request [Service name, Service version, Resource requirements (CPU, Memory, Network, Storage), Restriction list, Security level, QoS, Location Restrictions, Maximum Replicas, Actual binary of the service] | SManL first checks to see if the service and version are already registered. If not, it creates a new service structure and populates this structure with data passed by the service provider. It then creates a unique Server ID and a Service Capability. |
| SManL ->Service Provider | Reply to Register Service Request [Success = 1; Failure = 0; Server ID, Server Capability] | The Service Provider stores the returned parameters |
Request service protocol for applications
| Source ->Destination | Type of Message | Actions at Destination |
|---|---|---|
| Application ->SManL | Request Service Request [App Node ID, Service name, Service version, QoS Requirements, Node Location, and Network Interfaces] | SManL first looks to see if there is a registered service that meets the request. If a service structure is found, SManL then sees if there already is a server which runs the service close to the application. If there is no server available, then a Cloud System is selected, and a new server is started. |
| SManL ->Application | Reply to Request Service Request App Node ID, Service name, Service ID, Server Location, QoS Requirements and Server IP address, Service Capability] | The Application uses the Server IP address and Service Capability to contact the server and use the service. |
Fig. 8A new practical implementation framework
Fig. 9A proposed prototype for a secure healthcare service
Access to file/EHR based on role, rank, and specialist
| Role | Rank | Specialist | File/EHR |
|---|---|---|---|
| Doctor | Medical student | N/A | r– |
| Junior doctor | N/A | rw- | |
| Senior doctor | Anaesthetist | rw- | |
| Emergency med | rw- | ||
| Radiologist | rw- | ||
| Psychiatry | rw- | ||
| Surgery | rw- | ||
| Oncologist | rw- | ||
| Dermatologist | rw- | ||
| Haematologist | rw- | ||
| Consultant | Anaesthetist | rw- | |
| Emergency med | rw- | ||
| Radiologist | rw- | ||
| Psychiatry | rw- | ||
| Surgery | rw- | ||
| Oncologist | rw- | ||
| Dermatologist | rw- | ||
| Haematologist | rw- |
Fig. 11Filesystem structure
Fig. 12mHealth secure storage system
Fig. 13The mHealth secure storage filesystem directory
How the proposed framework achieves security for healthcare environment components
| Protection | (1) | (2) | (3) | (4) |
|---|---|---|---|---|
| Users of the system | * | |||
| Device and home access | * | * | ||
| Digital data | * | * | * | * |
| IT infrastructure | * | * | * | |
| Access to physical space | * |
How the proposed framework achieves security requirements
| Security requirements | (1) | (2) | (3) | (4) |
|---|---|---|---|---|
| Confidentiality | * | * | ||
| Integrity | * | * | ||
| Availability | * | * | ||
| Non-repudiation | * | |||
| Authentication | * | * | ||
| Authorisation | * | * | ||
| Accountability | * | * | ||
| Auditability | * | |||
| Reliability | * | * | * | * |