Advanced security activities for eHealth Bernd Blobel

advertisement
Advanced security activities for
eHealth
Bernd Blobel
CEN/ISSS eHealth Standardization Focus Group
Fraunhofer Health Telematics Project Group
EFMI WG Security, Safety and Ethics
EFMI WG Electronic Health Records
PROREC-DE
Fraunhofer Institute for Integrated Circuits IIS,
Erlangen, Germany
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
Introduction All developed countries face the challenge to improve
quality, safety and efficiency of their health systems under
the conditions of
- demographic developments with aging and multidiseased citizens,
- increased expectations to quality of life with
increasing demands for health services,
- growing costs for advanced biomedical,
pharmaceutical and technical methods and
products for prevention, diagnosis and therapy,
- changing social and economical environment
moving towards globalisation combined with
increased flexibility and mobility of citizens, goods
and services,
- reduced insurance funds.
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
Solution (1)
Turning health systems to customisable,
comprehensive and completely integrated
care in close relation to efficient public
health.
Current development from organisationcentred to process-oriented has to
continue to personalised care (body map
area, patient monitoring). Emphasis of
prevention and home care.
Such development must be supported by
appropriate ICT to support health
telematics and telemedicine (eHealth).
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
Solution (2)
Different strategies have been followed
for realising a proper ICT approach
including effective infrastructural services:
a)
“Monolithic” architecture for
comprehensive solutions.
b)
Open, flexible, scalable, portable, userfriendly, standard-based, service-oriented,
knowledge-based, semantically
interoperable, and trustworthy solution.
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
Focus Group History
Call for FG
17 December 2003: Kick-off Meeting
Appointment of Chair, Steering Committee and
the Editors Ray Rogers and Francois Mennerat
16 August 2004:
1st draft of the FG Report for internal comments
22 November 2004: 1st draft of the FG Report for public comments
22 February 2005: Circulation of the final draft to eHSFG members
for endorsement
12 December 2005: Open Conference under Dutch EU Presidency
1 March 2005:
Final FG Report
4 March 2005:
Submission to the CEN/ISSS Forum
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
eHealth Europe
Strategic Objectives
Enabling patient mobility as well
as cross boundary access to
health services
Reducing clinical errors as well
as improving patient safety
Improving access to high quality
information for both patients and
health professionals
Improving efficiency of health
services
Critical Applications
Improving access to clinical records:
EHR incl. EHR architecture
Electronic exchange of health data
incl. electronic transfer of
prescriptions (ePrescriptions)
ePrescribing with decision support
Digital imaging and related services
requests and result reporting
Core Data Sets e.g. for health
surveillances
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
Infrastructure to underpin applications
Management of any principal’s identification, in the patient’s
context including:
- EU Health Insurance Card (enhanced by carrying medical
data and providing cross-border access control facilities);
- A common approach to patient identifiers;
- Access control and authentication;
Protecting personal information (based on PKI and data cards
(tokens) for professionals and citizens/patients);
Terminological systems for clinical records and medicines;
EU Health Data Cards.
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
FG Recommendations
• Main Recommendation: Establishing a permanent eHealth
Interoperability Platform
• Improving access to records
• Reducing medication-related errors, and e-prescribing
• Safety of health informatics products
• Improving access to quality health information - Metadata for
knowledge resources
• Efficiency of healthcare processes - Workflow models and clinical
pathways
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
FG Recommendations (cont.)
• Electronic transfer of prescriptions
• Information exchange to support inter-working and the mobile
citizen
• Case-mix groupers based on diagnoses and procedures
• Quality indicators
• Improving availability of standards
• Commission's support to European standardisation
• Towards an international multilingual reference terminology
• Security services
• Health cards
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
Architectural
Paradigms for
Future-Proof
Semantically
Interoperable
Health
Information
Systems
•
•
•
•
•
•
•
•
•
•
Distribution
Component-orientation (flexibility, scalability)
Separation of platform-independent and platform-specific
modelling Æ
Separation of logical and technological views (portability)
Specification of reference and domain models at metalevel
Interoperability at service level (concepts, contexts,
knowledge)
Enterprise view driven design (user acceptance)
Multi-tier architecture (user acceptance, performance,
etc.)
Appropriate multi-media GUI (illiteracy)
Common terminology and ontology (semantic
interoperability)
Appropriate security and privacy services
Domain n
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
Domain 2
Domain 1
Business Concepts
Basic Services/Functions
Component
Decomposition
Relations Network
Component View
Technology View
Engineering View
Computational View
Information View
Enterprise View
Basic Concepts
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
Data Security Concept of an Enterprise
• The data security concept is based on the
enterprise business concept, and is part of the
general data processing concept
• Security policies must be derived from
enterprise policies
vulnerability
threat
risk
protection
specification of protection objects
specification of attackers and their motivations
evaluation of probability and consequences of attack
specification of protection measures
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
Security Policy
• Security policy is a complex of legal,
organisational, functional, medical, social, ethical
and technical aspects, which must be considered
in the context of data protection and data security.
• Security policy defines the framework, rights and
duties of principals involved, but also
consequences and penalties in the case of
disregard of the fixings taken.
safety
security
accountability
authentication
integrity
confidentiality
non-repudiation
notary’s
functions
availability
services
concepts
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
communication
security
identification
quality
application
security
authorisation
access
control
confidentiality
audit
accountability
non-repudiation
notary’s
functions
availability
integrity
accuracy
digital
signature
hashing
key recovery
encryption
multiple
comp.
...
DES
IDEA
RSA
DSA
SHA-1
MD5
...
ELGAMAL
data
keys
certificates
digital
signature
encryption
hashing
...
multiple
comp.
fire protection
DES
IDEA
RSA
DSA
SHA-1
MD5
...
ELGAMAL
data
keys
certificates
data algorithms mechanisms
access
control
key escrowing
fire protection
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
L e g a l & E th ic al
Fram ework
P o lic y
P o lic y
C o u n c il
A c c e s s C o n tr o l R u le s
I n f o r m a tio n
S y s te m
A d m in is tr a to r
P r ivileg e s
A c c e s s C o n tr o l
TTP
A u th e n tic a tio n
P a tie n t C o n s e n t
A u d it
I n f o r m a tio n A c c e s s
User
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
Security-Related Use Case Types
•
•
•
•
•
•
•
•
•
•
•
PolicyManagement
UserManagement
RoleManagement
UserAuthentication
PatientConsent
CommunicationInitialisation
InformationRequest
AccessControl
InformationProvision
InformationTransfer
Audit
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
Models Used
• Domain Model
• Authentication Model
• Communication Model
- Secure Object
- Secure Channel
•
•
•
•
•
Policy Model
Role Model
Delegation Model
Control Model
Privilege Management and
Access Control Models
• Audit Model
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
P o lic y
p o lic y_ id e ntifie r : S E T< II>
p o lic y_ na m e : C S
p o lic y_ a utho rity_ ID : O ID
p o lic y_ a utho rity_ na m e : S T
p o lic y_ d o m a in_ id e ntifie r : S E T < O ID >
p o lic y_ d o m a in_ na m e : B A G
p o lic y_ ta rg e t_ lis t : L IS T < IN T>
B a s ic P o lic y
p o lic y_ s ub je c t_ ID : O ID
p o lic y_ s ub je c t_ na m e : S T
ta rg e t_ id e ntifie r : S E T< II>
ta rg e t_ na m e : E N
ta rg e t_ o b je c t : II
o p e ra tio n_ c o d e : C E
p e rm is s io n_ p o lic y : C D
c o ns tra int : O C L
M e ta P o lic y
m e ta _ e xp re s s io n
ra is e d _ a c tio n : C E
C o m p o s it e P o lic y
e ve nt : C V
p o lic y : C D
m p o lic y : C D
p o lic y_ g ro up : S E T< II>
c o ns tra int : O C L
R e la tio ns hip
r o le s : Ro le
R e fra inP o lic y
a c tio n : C E
R o le
s ub je ctD o m a in : OID
r ole _ id e ntifie r : S E T< II>
r ole _ na m e : C S
r ole _ d es c rip tio n : C D
O b lig a tio n P o lic y
e ve nt : C V
e xc e p tio n : E xc e p tio n
A utho ris a tio nP o lic y
D e le g a tio n P o lic y
g ra nte e : O ID
a c c es s R ight s : C E
A ut h+
a c tio n : C E
A utha c tio n : C E
D e le g +
D e le g -
M a na g e m e ntS truc ture
ro le s : R o le
re ls : R e l
m s truc ts : M s truc t
G ro up
gr o up _i d e nti fi e r : S E T< II>
gr o up _na m e : C S
gr o up _d e s c r ip ti o n : C D
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
Roles
• For managing role-relationships between
the entities, organisational and functional
roles can be defined.
• Organisational roles specify relations
between entities in the sense of
competence (RIM roles) often reflecting
organisational or structural relations
(hierarchies).
• Functional roles are bound to an act.
Functional roles can be assigned to be
performed during an act. They correspond
to the RIM participation.
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
Policy-Driven, Role-Based Access Control
Role_Hierarchy
SR_Policy
1
Structural_Role
Target_Policy
1..*
FR_Policy
1
1 1.. *
User_Assi gnm ent
Principal
0..*
Functional_Role
0..*
1..*
Permission_Assignment
0..*
0..*
1
Session_Role
User_Session
1..*
1..*
Session
Process_P oli cy
1..*
1
0..*
Target_Component
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
“Functional
Roles”
Established in the
CEN ENV 13606
Revision
• Subject of care (normally the patient)
• Subject of care agent (parent, guardian, carer, or
other legal representative)
• Responsible (personal) healthcare professional (the
healthcare professional with the closest relationship
to the patient, often his GP)
• Privileged healthcare professional
• nominated by the subject of care
• nominated by the healthcare facility of care (there is a
nomination by regulation, practice, etc.)
• Healthcare professional (involved in providing direct
care to the patient)
• Health-related professional (indirectly involved in
patient care, teaching, research, etc.)
• Administrator (and any other parties supporting
service provision to the patient)
TTP Functions and Requirements
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
A nonyV a lu e a d d e d
m is a tio n
S e rv ic e s
P ro f. re g is tra tio n
T im e s ta m p in g
In fra s tru c tu ra l
S e rv ic e s
B a s is
s e rv ic e s
S e rv ic e s re la te d to th e b u s in e s s
v a lu e o r s e c u rity o f d o c u m e n t o r
m e s s a g e e x c h a n g e , g iv e n b y a g re e m e n ts o r b y re g u la tio n .
R e g is tra tio n
C e rtific a te h a n d lin g
D ire c to rie s C a rd is s u in g
K ey m anagem ent
N a m in g
S e rv ic e s w h ic h fa c ilita te s
s e c u re c o m m u n ic a tio n s in
a la rg e s c a le in v o lv in g
m u tu a l d is tru s tfu l u s e rs .
A c c e s s c o n tro l
In te g rity
S e c u rity lo g g in g
C o n fid e n tia lity
Id e n tific a tio n & A u th e n tic a tio n N o n -re p u d ia tio n
S e rv ic e s d ire c tly
re la te d to th e s e c u re
c o m m u n ic a tio n
b e tw e e n tw o u s e rs .
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
Important eHealth Components (logical view)
Application
Services
Client
Services
Terminology
Services
EHR
Systems
PKI
Policy
Services
ID CA
Services
PMI
ACA
Services
Audit
Services
Directory
Services
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
Conclusions
European Commission and European SDOs
established a project for specifying
requirements for eHealth Interoperability, in
that context addressing the need for close
European and global collaboration of all
stakeholder communities, organisations, other
SDOs, etc.
Currently, the FG Report is under
implementation setting up the political and the
legal framework as well as establishing the
eHealth Interoperability Platform according to
the FG Main Recommendation.
ETSI Security Workshop, Sophia Antipolis, 16-17 January 2006
For further information about the CEN/ISSS eHealth Standardization Focus Group
look at
www.cenehealth.org
Contact:
Bernd Blobel Ph.D.
Associate Professor
Head of the Health Telematics Group
Fraunhofer Institut Integrierte Schaltungen
Am Wolfsmantel 33
91058 Erlangen
Email: bernd.blobel@iis.fraunhofer.de
Tel.: +49-9131-776-7350
Fax : +49-9131-776-7399
Download