Trust Realisation in Collaborative Clinical Trials Systems Oluwafemi Ajayi1, Richard Sinnott1, Anthony Stell1 1 National e-Science Centre, University of Glasgow, G12 8QQ Keywords: Trust Negotiations, Security, Clinical Trials Abstract Due to the sensitivity of data and risk of potential unauthorised information disclosure that exists in large distributed systems, there is the potential for sensitive clinical information to be compromised in terms of integrity, privacy and confidentiality. The dynamic nature and autonomy of large distributed health systems makes it difficult to define a centralised access control framework for secure interactions across organisational boundaries. Thus there is the need for a decentralised access control framework that will integrate credentials and access policies between organisations without compromising organisational autonomy. In this paper a framework is presented through which trust is discovered and realised based on an approach we call dynamic trust negotiation (DTN). In this approach, trust is realised by multiple negotiation and delegation hops of security credentials through mediated trust pathways. This approach solves cross boundary authorisation issues and provides an alternative to global (centralised) security models based on shared security ontologies. Introduction Distribution and heterogeneity has been a major issue when it comes to security or asserting control over resources across organisational boundaries. The e-health domain is no exception to this, and needs ways in which clinical researchers, health providers and associated IT staff can successfully and seamlessly share health records if they are to improve or make available quality health care services. One major area that aims to improve health care services is research into and support of epidemiological studies and clinical trials. Conducting such studies demands that detailed collaborative agreements between various health care providers, partners and researchers are in place. Usually, these collaborative agreements are given as specific agreements (protocols) governing who is involved, where and how collaboration is to be achieved, and importantly how the data collected can be used. These collaborations require data to be shared between parties and across boundaries; hence the need to control access to shared resources. A key concept often used in this context is federation. Federation is a term defined for organisations that come together to collaborate based on agreed standards that combine business and technological practices to enable access to resources and services across boundaries in a unified, secure and trustworthy way. A federation is built on trust, typically manifest through agreed standards, semantics and procedures being adopted. These agreements1,2 also called negotiations, are usually reached between sources of authority for given domains and govern what resources to share, what schemas are exposed, what non-functional requirements are needed, who provides what and who can access what. It is important to note that no federation can be realised without some level of trust and negotiations between the parties involved including defining and enforcing the level of trust. Currently there are numerous ways of controlling access to remote resources in a federation. Solutions such as global schemas for federation administration3 or centralised policies have been used to provide access control to remote resources. But access control across boundaries becomes complex when collaborating partners are autonomous as regards to what is shared, how it is shared, how it is described or structured and who can access it4. It becomes more challenging when dynamic sets of heterogeneous resources are to be federated. Then the problem really is how to relate and exchange security attributes and other essential security information to support the federation from one organisation to the other without weakening any given sites security policies or infrastructure more generally5. Another way this issue has been explored is through semantic heterogeneity2 of security credentials where the focus is on a credential's context realisation and how credentials relate with one another across boundaries6,7. The approach we propose here to address the heterogeneous and autonomous federation of policies is called Dynamic Trust Negotiation (DTN). This approach is based on trust delegations and provides dynamic negotiations of attributes, schemas or roles8,9 when objects (resources) are requested. It is achieved by negotiating security credentials through delegation of privileges. The rest of the paper introduces a trust negotiation framework for decentralised access control that is currently being developed and tested in the MRC funded Virtual Organisation for Trials of Epidemiological Studies (VOTES) project. Dynamic Trust Negotiation Dynamic Trust Negotiation (DTN) is an approach to establishing trust between strangers through the delegation of digital credentials by trusted intermediary entities and the use of access control policies that specify what credentials can be delegated to strangers. To support this DTN requires organisations (called nodes) to act as negotiators for other nodes. This concept presents a peer-topeer model where each organisation in the federation establishes trust and negotiates both statically and dynamically with neighbouring organisations forming what is known as peer trust for peered organisations. This peer trust permeates interactions between peered and non-peered organisations. These interactions between peered and non-peered organisations are the basis for dynamic negotiations, which has the following objectives: • To provide an alternative to the global schema approach; • To negotiate security credentials through delegation of privileges; • To solve cross boundary authorisation issues; • To dynamically discover chains of trust and establish trust; • To ultimately provide dynamic discovery and usage of distributed clinical data resources. In DTN we use a variant of the link state routing algorithm to discover chain of trusts or trust pathways, which are necessary before credentials can be negotiated. The algorithm uses weights on paths/links, which are cardinality of trusts-contract sets that exist between nodes. Since DTN is not about shortest paths to a destination, the algorithm is modified to accommodate the discovery of multiple paths to a destination. Similarly as broadcast messages are viewed as sensitive information, broadcasts are restricted to trust peers and messages are encrypted with shared keys or key pairs. Once each node collates routing information, nodes can judiciously select appropriate nodes with respect to destination nodes. Details on this routing algorithm are outside the scope of this paper. Scenario Dr Bond is a healthcare professional based at Glasgow Royal Infirmary (GRI) who is the principal investigator for Scottish coronary clinical trial (SCCT) with role Investigator. He logs into the trial portal and his credentials are pulled from his domain’s credential repository. He decides to query for consented patient records for prospective participants. The portal pushes his credentials and query to GRI Access Manger (GRI-AM). GRI-AM sends a request for data along with Bond’s Investigator credentials to peers that are in static trust relationship with (GRI) such as Southern General Glasgow Access Manager (SGG-AM). Query results are returned if applicable based on Bond’s credentials and delegated privileges at SGG. SGG-AM sends a request using credentials it has delegated to Bond through GRI to other peers that SGG is in a static trust relationship with such as Royal Infirmary of Edinburgh Access Manager (RIE-AM). RIE-AM responds with delegated credentials through SGG-AM to GRI-AM. In addition to that RIE-AM also sends a request using credentials it has delegated to Bond through SGG-AM to other peers that RIE is in static trust relationship with. GRI, SGG, RIE… are trust pathways. The request process continues with nodes joining the trust pathways until all possible trust paths are exploited. These negotiated credentials are forward to GRI-AM, which then makes query request with these credentials on behalf of Bond to each node’s Resource Manager (RM). Figure 1 shows an architectural view of DTN and figure 2 shows a DTN request sequence. Figure 1: Dynamic Trust Negotiation Figure 2: Trust Negotiation Sequence in a Health System VOTES The VOTES project (Virtual Organisations for Trials and Epidemiological Studies) is a 3-year project funded by the UK Medical Research Council (MRC) involving several UK universities: Glasgow, Oxford, Imperial, Manchester, Nottingham and Leicester. The project investigates the implementation of grid technology to the area of clinical trials and epidemiological studies to further enhance the value of data, and efficiency of data processing, in the clinical domain across local, regional and national boundaries10 (e.g. between the health boards in Scotland and England). The project addresses three key areas of clinical trials: Patient Recruitment, Data Collection and Study Management. The sensitive nature of the data involved naturally means that security must be paramount and that any method of federating this data must adhere rigorously to the security policies of the parties providing the data. However, the flexibility necessary for implementing cross-boundary data queries must also be maintained, hence a novel grid solution to provision data and operation security must be developed for the enterprise to succeed. To this end, the prototype portals currently under development as part of the VOTES project are being constructed with modular role-based access control as a means of allowing fine-grained access control as well as providing bases for trust negotiations11. Based on security policies written by privileged super-users within a given trial, data fields that are classed with different sensitivity levels are restricted or shown depending on the user’s role within the portal. The portal provides a unified interface to federated data, which are protected by data providers. For instance, a trial investigator should be able to see most identifying data (such as name, CHI number, etc.) about individuals, providing this has been consented and the security policy allows it. However, a nurse using the portal in the same trial should only be able to see statistical data (such as conditions) and not be able to tie this data to specific individuals. A parameter selection screens in the VOTES portal is shown in figure 3. In terms of underlying infrastructure, figure 4 shows the architecture of the VOTES portal system. Figure 3: Parameter selection for privileged role Figure 4: VOTES portal system architecture Once the parameters of interest have been selected, a distributed query over the relevant databases is constructed and executed through a grid service, a data service, and a driving database that guards a pool of auxiliary database resources. The data is retrieved from these databases, joined based on a common index, and returned to the user as one unified result. The security is applied at two levels in this process: • At the local resource level, a local manager denotes what roles are allowed to access the data in the local databases. • At the VO level, an access matrix is available that denotes what roles can access what data, before the query is executed. The construction of this matrix is achieved by querying the various database schemas and populating the matrix with a pre-set security policy. The infrastructure outlined so far details the design and operation of a virtual organisation of partner nodes sharing clinical data. In order for this to be achievable, these roles in form credentials must be negotiated and exchanged between nodes in a flexible and secure way. DTN provides a means for this by introducing a negotiation layer as shown in figure 1, where the local trust policies shown in figure 4 acts as Resource Managers (RM), which grants or deny access to their resources based on delegated privileges. Conclusion Currently negotiations are global and static and they reduce the independence or flexibility that each partner has because they try to reach a balance between autonomy and heterogeneity. However, DTN ensures that these negotiations do not have to be global and do not have to be static. This is achieved by (1) each collaborating member forming a peer-to-peer trust relationship with neighbouring partners through exchanging security information that make access possible to their users; (2) each collaborating member being allowed to delegate different trust information to other neighbouring partners; (3) all collaborating members sharing a common and overlapping sets of vocabularies that enables resource requests to be understood and used to trigger negotiations; (4) each collaborating member implementing a hierarchical access control model. References 1. Heimbigner D, McLeod D. A Federated Architecture for Information Management. ACM Trans. Inf. Syst. 1985; 3:253-78. 2. Sheth AP, Larson JA. Federated Database Systems for Managing Distributed, Heterogeneous, and Autonomous Databases. ACM Comput. Surv. 1990; 22:183-236. 3. Sandhu RS, Samarati P. Access Control: Principles and Practice. IEEE Communications Magazine. 1994; 32:40-48. 4. Becker MY. Cassandra: Flexible Trust Management and its Application to Electronic Health Records. University of Cambridge, Computer Laboratory, Technical Report; 2005 Oct. Report No.: UCAM-CL-TR 648. 5. Aslan G, McLeod D. Semantic heterogeneity resolution in federated databases by metadata implantation and stepwise evolution. The VLDB Journal. 1999; 8:120-32. 6. Boniface M, Wilken P. ARTEMIS: Towards a Secure Interoperability Infrastructure for Healthcare Information Systems. From Grid to HealthGrid, IOS Press; 2005. p. 181-9. 7. Ehrig M, Sure Y. Ontology Mapping - An Integrated Approach. In Proceedings of the First European Semantic Web Symposium, Lecture Notes in Computer Science. 2004; 3053:76-91. 8. Sandhu RS, Coyne EJ, Feinstein HL, Youman CE. Role-Based Access Control Models. IEEE Computer. 1996; 29:38-47. 9. Saunders G, Hitchens M, Varadharajan V. Role-based Access Control and the Access Control Matrix. SIGOPS Oper. Syst. Rev. 2001; 35:6-20. 10. Sinnott RO, Stell AJ, Ajayi OO. Initial Experiences in Developing e-Health Solutions across Scotland. Workshop on Integrated Health Records: Practice and Technology, Edinburgh. 2006. 11. Sinnott RO, Ajayi OO, Stell AJ. Development of Grid Frameworks for Clinical Trials and Epidemiological Studies. Proceedings of HealthGrid 2006 Conference; Valencia, Spain. New IOS Press; 2006. p. 117-30.