RLUS and SOA Security German National Personal Health Record

advertisement
RLUS and SOA Security
German National Personal Health Record
Jörg Caumanns, Olaf Rode, Raik Kuhlisch (Fraunhofer ISST)
SOA in Healthcare Conference
Hyatt Dulles Hotel, Herndon, VA USA
July, 14th 2011
Agenda
Project Scope and Focus Areas
Key Concepts
Architectural Overview
Semantic Signifiers
SOA Security
2
Project Scope and Focus Areas
Project Scope
Research and Development (R&D) Project funded by the German Federal Ministry of Health
(BMG)
Investigate on concepts and technologies for the German National Personal Health Record
Infrastructure
»Open Minded« Approach: No preliminary constraints – anything can be put into doubt that
hinders innovative care scenarios, stable business models, and better patient participation
Project Participants
Fraunhofer Society (Fraunhofer ISST and Fraunhofer SIT)
Federation of German Clinical Research Networks (TMF)
German Hospital Federation (DKG) & German Medical Association (BÄK)
Society for Telematic Applications of the Healthcare Card (gematik)
Focus Areas
Assessment of implementation options for the German electronic Patient Record as outlined by
»health card act« (§ 291a SGB-V)
Usability and feasibility analysis to support a future implementation
Elaboration of additional use-cases and scenarios stretching beyond § 291a SGB-V with a
particular focus on enabling medical research
Patient Record as a platform for patient centric applications (medication plan, diary, ...)
Highly challenging wrt security, privacy and patient rights
Innovative information model to allow for semantic differentiation and data selection
5
Key Concepts
Key Concepts
Power of Disposal of the Citizens of their Data
Basic Idea:
The PHR acts as a »tool of the citizen« to support its medical care.
The citizen does not regularize flow of data between systems of health service providers, but
initializes, and
controls it.
Citizen as source and target of flows of data
Citizen as a beneficiary of his medical data
Approach:
No »virtual integration« of data from systems of health service providers
Transmission of copies from medical data objects to the citizen‘s record system
Optional user interface for the citizen to interactively control flow of data
7
Key Concepts (2)
Platform for Target-Group-Specific Record Systems
Basic Idea:
Every Citizen has specific needs wrt concrete definition of his record
Needs result from current living situation and mirror in expectations of record features
Vendors should be able to provide target-group-specific records systems and product
variants.
Approach:
Support of different interaction and communications patterns (synchronously /
asynchronously communication)
Support of different authorization mechanisms (ad hoc, in advance, interactively)
Offer maximum design flexibility for vendors
8
Key Concepts (3)
Binding of Online Records and Decentralized Data Storage
Basic Idea:
Individual requirements of citizens:
secure »online storage« or
decentralized storage devices (e. g., USB flash drives)
The project addresses such different requirements
Approach:
Solution for binding of online records AND decentralized storage devices
Difference not »in sight« of the primary system of the health care provider
9
Key Concepts (4)
Communication of Normalized Information Objects
Basic Idea:
Besides normalized interfaces, medical data objects needs to be interoperable, too
Approach:
Definition of a model for a unified handling of different content structures based on RLUS
Semantic Signifiers
Level-based concept for step-by-step implementation of normalized content structures (e.
g., for a medication summary or a vaccination certificate)
Basis: HL7 CDA with additional supply of fallback documents (e. g., PDF/A) for the
interoperable processing throug primary and record systems
10
Architectural Overview
Integration Platform
Separation of Application and Security Services
Objectives:
Reduce complexity of particular services SoD
Reuse services in other application contexts
Provide flexibility for operator models
Security Services:
Identity Provider (central)
Access Token Service (decentral)
Guarantor Token Service (decentral)
Application Services of the Integration Platform
PHR Communication Service
(HSP Mailbox Service)
(PHR Research Adapter)
12
Integration Platform (2)
Architectural Overview
13
Integration Platform (3)
Consistent Use of International Standards
Coding of Content Structures
HL7 CDA
Service Invocations of Application Services
HL7 SFM / OMG RLUS (Retrieve Locate and Update Service)
Security Standards
SAML – Security Assertion Markup Language
WS-Trust
WS-SecurityPolicy
WS-SecureConversation
XACML – Extensible Access Control Markup Language
14
Semantic Signifiers
Semantic Signifiers
Motivation
Communicated data with PHR must be described semantically as well as structurally
Background
For interoperability reasons, classification and description of the data must be available in
order to ensure the processing in primary systems
Requested data from a PHR must be identifiable and transferable into return types
The exchange format must not be exactly the same as the one stored in PHR
Search requests and filters should be pointed to the specific information model depending
on the content type
Analogy to WSDL
No service but rather underlying information model described
16
Semantic Signifiers
Content-Agnostic vs. Content-Aware
No statements about the data storage on PHR-side
PHR might be implemented in two flavours
Content-agnostic
No interpretation of the (medical) data by the PHR
Similar to IHE XDS.b Document retrieval with a document identifier
Characteristically for encrypted data
Content-aware
Data storage can be analysed in order to fulfill a semantic signifier
Requests as »Give me all DICOM X-ray images relevant to hip joint« are possible
Data Warehouse Online Analytical Processing
Medical terminologies and ontologies such as SNOMED CT might be contributed
17
Semantic Signifiers
Pros and Cons
Pros
[Implementation Independence]
No explicit requirements for data storage and information models
[Flexibility]
Any contents and structures might be described
Cons
[Implementation Independence]
Each vendor must implement an adapter functionality for the mapping between internal and
external structures defined by semantic signifiers
[Flexibility]
Each semantic signifier must be explained in detail in order to prevent unchecked
distribution
[Management]
A processing for the development of semantic signifiers must be introduced in order to
provide the max interoperability
18
Semantic Signifiers
Management
Supported Semantic Signifiers listed in capability list
Semantic Signifier Catalogue
Versions of semantic signifiers
Liability of semantic signifiers
References to implementation guidelines, schemas etc.
Maintenance by a working group that represents interests of HSPs, vendors and citizens
Level-based concept for step-by-step implementation of normalized content structures
Level 1: HL7 CDA R2 Level 3 with embedded PDF/A that is liable
Level 2: Tightening of L1; Primary systems MUST provide solely data the is conformant to
structures defined in voted implementation guidelines
Level 3: Tightening of L2; No embedding of representation objects allowed; Structured data
from CDA is liable
RLUS Meta Data Interface might be implemented
19
SOA Security
SOA Security
Authentication and Authorization
Fundamentally important security principles for loosely coupled services
1. Distinct separation of the security processes/sub-systems from the business functionality
The business services are not directly affected by potential changes in the security
infrastructure
Separation of the security functionalities yields a significantly higher flexibility along the
flow-of-control of a business application
Facilitates re-use of security subsystems for additional business application
2. Externalise security tasks such as: identification, authentication, and authorization
Decoupling the tasks of authentication and authorization requires the means to communicate
authenticated subject information to the authorization sub-systems
The abstraction of those security architecture principles leads to Security Token Services
21
Trust and Communication Relationships
Communication Relationship
Trust Relationship
Authentication Process
Central Infrastructure provides authentication service (Identity Provider) WS-Trust
Credential: electronic health professional card (HPC)
Authentication evidence by issued SAML v2.0 assertion
SAML assertion might be used for different health data services
WS-Security defines placement of SAML assertions
Authorization Processes
Ad hoc
Local authorization in medical care unit (practice clinic) by means of citizen‘s health card
Citizen digitaly signs a policy on the physican‘s permissions that can by used by the physican
for further requests (as long as the resp. policy token is valid)
In Advance
The citizen registers access rules in its PHR system
Without the presence of the citizen access might be granted
Interactively
In asynchronous mode, the citizen decides which data should be send to a HCP by the
creation of provisioning objects
A GUI is necessary in order to select the data accordingly
Thank you.
Download